Patents by Inventor Dmitry Andreev
Dmitry Andreev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7523092Abstract: A computer-implemented method for optimizing an aspect of an Information Technology (IT) structure of an IT system, the aspect of the IT structure is optimized with respect to at least one control parameter. The IT structure includes a plurality of elements. Each element independently is a hardware element, a software element, or a combination of a hardware element and a software element. Each control parameter has a value that is specific to each element of the IT structure.Type: GrantFiled: October 31, 2005Date of Patent: April 21, 2009Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
-
Patent number: 7496953Abstract: A method for single-sign on of a user on a client machine to one or more target applications on target application servers in a computer information-processing network, including: accessing an access server from the client machine; entering user-specific access server logon credentials for logon and access to the access server; selecting a target application; presenting to the target application by the access server, previously stored user-specific target application logon credentials for logon and access to the target application in a form and according to a protocol recognizable by the target application thereby logging into the target application on behalf of the user and establishing a target application session; sending from the access server to the client machine, information for establishing a connection from the client machine to the target application; and establishing a target application session, bypassing the access server, between the client machine and the target application.Type: GrantFiled: April 29, 2003Date of Patent: February 24, 2009Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Gregory Vilshansky
-
Publication number: 20090019363Abstract: A method for generating and prioritizing multiple search results is disclosed. A database stores search results in an information storage and retrieval system. A search program executes on a computer system coupled to the database. The search program receives a search request from a user input. The search program parses the search request into at least one search term. The search program performs a loop comprising steps associating a priority adjustment value with each search term, generating a search result, calculating a priority adjustment sum of the generated search result, inserting the at least one search term, the generated search result, and the calculated priority adjustment sum in the search result list, and modifying the at least one search term and the priority adjustment value associated with each search term to perform a next iteration of the loop.Type: ApplicationFiled: July 12, 2007Publication date: January 15, 2009Inventors: Dmitry Andreev, Franklin Charles Breslau
-
Publication number: 20080189261Abstract: A method and system for searching and retrieving reusable assets is disclosed. An index file in a database stores reusable assets. A search request history in the database stores past search requests and corresponding past search results. A search program performs a search upon receiving a new search request within the index file and generates a new search result. The search program correlates past search requests to the new search request by comparing search terms in past search requests to search terms in the new search request. Search terms in past search requests are replaced with semantically similar terms based on taxonomy level and synonyms and results of highly correlated past search requests are added to the new search result. Reusability of each reusable asset in the new search result is appraised.Type: ApplicationFiled: February 2, 2007Publication date: August 7, 2008Inventors: Dmitry Andreev, Thomas Michael Dauffenbach, Galina Grunin, Gregory Vilshansky
-
Publication number: 20080181259Abstract: A method and system for dynamically adjusting packet size to decrease a delay of a streaming data transmission. A measurement is obtained by a measuring computing unit (i.e., data transmission server or client computing unit). The first measurement is either (1) a delay of a streaming data transmission being sent from the data transmission server to the client computing unit via a plurality of packets or (2) a frequency of damaged packets of the plurality of packets. The damaged packets contribute to the delay of the streaming data transmission. The packet size is adjusted by the data transmission server. The packet size adjusting includes utilizing the measurement and facilitating a reduction of the streaming data transmission delay. The delay results from noise on one or more communication link segments used by the streaming data transmission.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20080180449Abstract: A method and system for estimating a screen refresh rate of a computing unit participating in an Internet-based collaboration. The computing unit receives a test image that includes pixels located at predefined positions and blinking at predefined frequencies. Measurements of the number of blinks of the pixels in a specified time period are collected. An average of the measurements summed over the predefined frequencies is calculated. A screen refresh rate is estimated by comparing the calculated average to a sum of multiple sums of simulated blinks of pixels in the specified time period. The average is closer to the sum than any of the other sums and the sum is associated with the estimated screen refresh rate.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventors: Dmitry Andreev, Thomas Michael Dauffenbach, Galina Grunin, Gregory Vilshansky
-
Publication number: 20080183889Abstract: A method and system for preventing a detection of web crawling. A randomizing HTTP proxy server receives a first request from a web crawler to scan a website and forwards the first request to a randomly selected first proxy computer. The first proxy computer utilizes a first network address translation (NAT)-enabled router to forward the first request to the website. A NAT algorithm associates a first source Internet Protocol (IP) address with the first request. The randomizing HTTP proxy server receives a second web crawler-initiated request to scan the website and forwards the second request to a randomly selected second proxy computer. The second proxy computer utilizes a second NAT-enabled router to forward the second request to the website. The NAT algorithm associates a second source IP address with the second request. The web server identifies the first and second source IP addresses as being different.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20080183782Abstract: A method and system for consolidating N elements of an enterprise IT structure that consists of L elements (N?L). All combinations of M elements of the N elements are generated (M<N). M is a specified positive integer of at least 1 and less than N. One or more pairs of combinations selected from all of the combinations are ascertained such that each ascertained pair consists of IT structures S1 and an IT structure S2 which are specifically congruent with respect to each other. Specifically congruent means composition congruent, topologically congruent, interface congruent, composition congruent and topologically congruent, composition congruent and interface congruent, topologically congruent and interface congruent, or fully congruent. At least one pair of combinations selected is consolidated. Consolidating each pair P reduces a goal function G that is a function of a total cost of ownership (TCO) of the enterprise IT structure.Type: ApplicationFiled: January 25, 2007Publication date: July 31, 2008Inventors: Dmitry Andreev, Paul Gregory Greenstein
-
Publication number: 20070300204Abstract: A method performed in an Information Technology (IT) development environment and an associated computer system. Business requirements are translated into functional requirements. An abstract IT structure is generated by translating the functional requirements into the abstract IT structure.Type: ApplicationFiled: June 27, 2006Publication date: December 27, 2007Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul Gregory Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20070289008Abstract: Method and system for verifying correctness of networking aspects of an Information Technology (IT) system that includes a host network of hosts. The hosts include servers and firewalls. A firewall connectivity indication of whether the host network includes an isolated firewall or a cross-zone connected firewall is determined. Determining for each host whether the host is isolated from a communication network to which the IT system is connected determines whether isolated network segments exit within the host network. For each host determined to be isolated from the communication network, the method identifies all network segments of the host network to which each host is connected, determines the unique network segments of the identified network segments, and designates the unique network segments as a set of isolated network segments. The firewall connectivity indication and the set of isolated network segments are stored in a storage medium of a computer system.Type: ApplicationFiled: April 30, 2007Publication date: December 13, 2007Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
-
Patent number: 7269599Abstract: A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.Type: GrantFiled: December 1, 2005Date of Patent: September 11, 2007Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul Gregory Greenstein, Galina Grunin, Gregory Vilshansky
-
System, method, and program product for providing local load balancing for high-availability servers
Publication number: 20070150594Abstract: The present invention is directed to a method, system, and computer program product for providing local load balancing for high-availability servers. In particular, the present invention is based on the use of an HACMP cluster of servers (for high availability) each running an instance of a TCP splitter (for load balancing). A cluster of servers is provided, wherein a Transport Control Protocol (TCP) splitter runs on each of the servers. Each TCP splitter is configured to split an incoming data stream to a respective server among a plurality of the servers for processing. Each server in the cluster has a different routable Internet Protocol (IP) address. Upon a failure of a server, the IP address of the failed server is reassigned to another server in the cluster.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Thomas Dauffenbach, Galina Grunin, Gregory Vilshansky -
Publication number: 20070130097Abstract: A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.Type: ApplicationFiled: December 1, 2005Publication date: June 7, 2007Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20070100676Abstract: A method and system for optimally scheduling an activity managed by a web application. Date and time ranges are initialized with predefined values. A tentative start date included in the date range and a tentative start time included in the time range are automatically calculated, and are included in a tentative schedule for the activity. A time period is determined by the tentative schedule and a duration of the activity. The automatic calculation prevents the time period from overlapping a time interval during which the web application is to experience a peak load. The tentative schedule is presented to the user via the interface, and is recalculated and redisplayed in response to the user updating a load-related parameter. The user selects a final schedule, which is the tentative schedule or a user-specified schedule different from the tentative schedule.Type: ApplicationFiled: October 27, 2005Publication date: May 3, 2007Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20060253609Abstract: A method and system is presented for bypassing a local Domain Name Server (DNS) when using edge caching servers. Domain names of frequently used business applications that are known to rely upon edge servers, together with the corresponding authoritative DNSs, are listed in both local hosts file and user defined FSFD local configuration file fsfd.conf. When the client computer's browser attempts to resolve a domain name, a File System Filtering Driver (FSFD) in the client computer intercepts the browser's request. If the domain name which is being resolved is found in a local FSFD configuration file fsfd.conf, then the FSFD initiates a DNS request directly to the appropriate authoritative DNS whose IP address gets extracted from the fsfd.conf record, thus bypassing the local DNS. The authoritative DNS returns the IP address for an edge caching server that is topographically proximate to the client computer's browser.Type: ApplicationFiled: May 3, 2005Publication date: November 9, 2006Inventors: Dmitry Andreev, Galina Grunin, Luu Nguyen, Gregory Vilshansky
-
Publication number: 20060248546Abstract: A method and system for adapting an Information Technology (IT) structure to maintain service levels. An IT structure is deployed in an IT delivery environment. A service level associated with the IT structure is specified. At least one operational characteristic of the IT structure corresponding to the specified service level is identified. For each identified operational characteristic, a corresponding threshold is established in such that if the corresponding threshold is violated then the specified service level is not sustained. After establishing the thresholds, operation of the IT structure is monitored. The monitoring detects a condition wherein a measured value of a first operational characteristic has violated the corresponding threshold associated with the first operational characteristic such that the specified service level is not sustained by the measured value of the first operational characteristic, causing degradation of the specified service level.Type: ApplicationFiled: June 13, 2006Publication date: November 2, 2006Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul Greenstein, Galina Grunin
-
Publication number: 20060248501Abstract: A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.Type: ApplicationFiled: June 13, 2006Publication date: November 2, 2006Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul Greenstein, Gregory Vilshansky
-
Publication number: 20060167969Abstract: A novel method and structure in which data caching is based on data contents. The method comprises the steps of (a) sending a data request from a processing circuit to a target server; (b) in response to the target server receiving the data request, sending a first response portion of a data response from the target server to the processing circuit; and {circle around (c)} in response to the processing circuit receiving the first response portion, using the processing circuit to examine the first response portion so as to determine whether the processing circuit contains a copy of the data response; and (d) in response to the processing circuit determining that the processing circuit contains a copy of the data response, sending the copy of the data response from the processing circuit to a client machine.Type: ApplicationFiled: January 25, 2005Publication date: July 27, 2006Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Marina Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20060156274Abstract: A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, a method for detecting an unauthorized change in an operating instance X of an IT structure R, a method for verifying conformance of an IT structure to an IT delivery environment, associated computer program products, and associated processes for integrating computing infrastructure. The method for verifying correctness of an IT structure instance D determines whether a reverse specification RD for D differs from R. The method for detecting an unauthorized change in an operating instance X of an IT structure R determines whether authorized changes in R have occurred. The method for verifying conformance of an IT structure to an IT delivery environment verifies compliance of the IT structure relating to: product standard compliance, compliance of software elements of the IT structure primitive composition, software application type compliance, and network traffic compliance.Type: ApplicationFiled: May 23, 2005Publication date: July 13, 2006Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20060150143Abstract: A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.Type: ApplicationFiled: December 14, 2004Publication date: July 6, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky