Patents by Inventor Edward Klein

Edward Klein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8732357
    Abstract: A method for dynamically enabling and disabling use of XFR_RDY is disclosed herein. In one embodiment of the invention, such a method includes receiving a write command at a target and determining whether XFR_RDY is enabled or disabled for the write command. In the event XFR_RDY is disabled, the method determines whether one or more buffers are available at the target. If at least one buffer is available, the method processes the write command by writing data associated with the write command to the one or more buffers. The method then returns information indicating the number of buffers that are still available at the target after completing the write command. A corresponding apparatus and computer program product are also disclosed and claimed herein.
    Type: Grant
    Filed: October 28, 2010
    Date of Patent: May 20, 2014
    Assignee: International Business Machines Corporation
    Inventors: Steven Edward Klein, Matthew Joseph Kalos, Sherman Daniel Wayne, Dung Ngoc Dang
  • Publication number: 20130279898
    Abstract: A method for verifying the integrity of a communication link is disclosed herein. In selected embodiments, such a method may include detecting, during normal operation of a communication link, a condition indicative of a high failure rate (HFR) on the communication link. The method may further include placing the communication link in an HFR state as a result of the condition. While in HFR state, the method may repeatedly transmit test I/Os over the communication link. The method may then automatically exit HFR state and resume normal operation on the communication link when one or more of the following has occurred: a selected number of test I/Os have been successfully transmitted over the communication link, and a number of test I/Os have been successfully transmitted over the communication link for a selected period of time. A corresponding system, apparatus, and computer program product are also disclosed and claimed herein.
    Type: Application
    Filed: June 14, 2013
    Publication date: October 24, 2013
    Inventors: Dung Ngoc Dang, Daniel W. Fok, Steven Edward Klein, Gail Andrea Spear
  • Publication number: 20130282996
    Abstract: Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN) configured to store protected data, a processor, and memory configured to store a peer-to-peer remote copy (PPRC) application. The processor is configured to execute the PPRC application to modify the protection in transmitted data and received data. One method includes receiving unprotected data, utilizing a PPRC application to add protection to the data to generate protected data, and storing the protected data in a protected SCSI LUN. Another method includes receiving, at a protected SCSI LUN, a request to transmit protected data, utilizing a PPRC application to strip the protection from the protected data to generate unprotected data, and transmitting the unprotected data to an unprotected SCSI LUN.
    Type: Application
    Filed: April 20, 2012
    Publication date: October 24, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthew Joseph KALOS, Steven Edward KLEIN, Jared Michael MINCH
  • Patent number: 8483071
    Abstract: A method for verifying the integrity of a communication link is disclosed herein. In selected embodiments, such a method may include detecting, during normal operation of a communication link, a condition indicative of a high failure rate (HFR) on the communication link. The method may further include placing the communication link in an HFR state as a result of the condition. While in HFR state, the method may repeatedly transmit test I/Os over the communication link. The method may then automatically exit HFR state and resume normal operation on the communication link when one or more of the following has occurred: a selected number of test I/Os have been successfully transmitted over the communication link, and a number of test I/Os have been successfully transmitted over the communication link for a selected period of time. A corresponding system, apparatus, and computer program product are also disclosed and claimed herein.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: July 9, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dung Ngoc Dang, Daniel W. Fok, Steven Edward Klein, Gail Andrea Spear
  • Publication number: 20130111973
    Abstract: In a method and apparatus for determining the level of dynamic force required to cause damage to an electronic device, the electronic device may be placed beneath a ram assembly of a dynamic impact testing device. Thereafter, the ram assembly may be used to impact the electronic device to determine a threshold level of dynamic force that will cause damage to the electronic device. The ram assembly may then be used to impact a load cell with the threshold level of dynamic force so that the load cell generates a data output.
    Type: Application
    Filed: November 3, 2011
    Publication date: May 9, 2013
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Jake Edward Klein, Ronald Robert Madsen
  • Patent number: 8438332
    Abstract: A method to maintain write operation atomicity where a write operation crosses a data storage medium track boundary. The method supplies a storage controller comprising a host adapter, a processor, and a NVS. The host adapter receives from a host computer a write request and data. The method determines if the write request will cross a data storage medium track boundary. If the write request will cross a data storage medium track boundary, the method indicates to the host adapter that the write request comprises a two-track transfer, and writes the data to the NVS as the data is received. If the host computer fails prior to providing all the data to the storage controller, the method discards the data written to the NVS to ensure write operation atomicity.
    Type: Grant
    Filed: June 22, 2009
    Date of Patent: May 7, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kevin John Ash, Jeffrey Michael Barnes, Michael Thomas Benhase, Shachar Fienblit, Matthew Joseph Kalos, Steven Edward Klein, Gail Andrea Spear
  • Publication number: 20120144157
    Abstract: There is disclosed a system and method for allocation of mainframe computing resources using distributed computing. In particular, the present application is directed to a system whereby a mainframe process intended for execution on a metered processor may be identified as executable on a non-metered processor. Thereafter, the mainframe computer may initiate execution of the remote process on the remote non-metered processor. If necessary, high-speed access to data available to the metered processor is provided to the non-metered processor. The process operates directly on data available to the metered processor. Once completed, the process signals the mainframe computer that the process is complete. Both metered and non-metered processor configuration and management may be accomplished using the administrative interface.
    Type: Application
    Filed: December 6, 2010
    Publication date: June 7, 2012
    Inventors: James Reginald Crew, Pradeep Kumar Reddy Gundavarapu, Balaji Swaminathan, William Donald Pagdin, Lary Edward Klein
  • Patent number: 7979897
    Abstract: Provided are a system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: July 12, 2011
    Assignee: International Business Machines Corporation
    Inventors: Steven Edward Klein, James Chien-Chiung Chen, Patricia Ching Lu, Minh-Ngoc Le Huynh
  • Patent number: 7962780
    Abstract: A method, system, and computer program product to preserve data integrity in a mirror and copy environment is disclosed herein. In one embodiment, a method may include receiving a write command and data from a host device. The method may further include writing the data to a primary storage device and attaching a primary sequence number associated with the primary storage device to the write command, thereby providing a numbered write command with a command sequence number. The numbered write command may then be transmitted to a secondary storage device. The method may further include comparing the command sequence number to a secondary sequence number associated with the secondary storage device. If the command sequence number matches the secondary sequence number, then the command may be executed. Otherwise, it may be ignored.
    Type: Grant
    Filed: August 22, 2008
    Date of Patent: June 14, 2011
    Assignee: International Business Machines Corporation
    Inventors: Theodore Timothy Harris, Jr., Matthew Joseph Kalos, Steven Edward Klein, Gail Andrea Spear
  • Publication number: 20100325376
    Abstract: A method to maintain write operation atomicity where a write operation crosses a data storage medium track boundary. The method supplies a storage controller comprising a host adapter, a processor, and a NVS. The primary host adapter receives from a host computer a write request and data. The method determines if the write request will cross a data storage medium track boundary. If the write request will cross a data storage medium track boundary, the method indicates to the host adapter that the write request comprises a two-track transfer, and writes the data to the primary NVS as the data is received. If the host computer fails prior to providing all the data to the storage controller, the method discards the data written to the NVS to ensure write operation atomicity.
    Type: Application
    Filed: June 22, 2009
    Publication date: December 23, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: KEVIN JOHN ASH, JEFFREY MICHAEL BARNES, MICHAEL THOMAS BENHASE, SHACHAR FIENBLIT, MATTHEW JOSEPH KALOS, STEVEN EDWARD KLEIN, GAIL ANDREA SPEAR
  • Patent number: 7853726
    Abstract: A method for performing a data exchange between an initiator and a receiver in a fiber channel protocol (FCP) is provided. A control flag is set in a write command to indicate the presence of an identifier. The identifier is copied into a command descriptor block (CDB) of the write command and appended to a data frame. The write command and data frame, including the identifier, is sent from the initiator to the receiver.
    Type: Grant
    Filed: October 6, 2008
    Date of Patent: December 14, 2010
    Assignee: International Business Machines Corporation
    Inventors: Dung Ngoc Dang, Chung Man Fung, Steven Edward Klein, Patricia Ching Lu
  • Patent number: 7730343
    Abstract: Provided are techniques for determining a link speed. When a link between two computing devices is operational, a link speed for use in communicating across the link is stored and a remembered indicator is set to TRUE. After any event occurs that causes the link to become inoperational, in response to determining that the remembered indicator is TRUE, the stored link speed is used when attempting to make the link become operational.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: June 1, 2010
    Assignee: International Business Machines Corporation
    Inventors: Mark Steven Bayus, Mark P. Bendyk, Roger Gregory Hathorn, Steven Edward Klein
  • Publication number: 20100088434
    Abstract: A method for performing a data exchange between an initiator and a receiver in a fibre channel protocol (FCP) is provided. A control flag is set in a write command to indicate the presence of an identifier. The identifier is copied into a command descriptor block (CDB) of the write command and appended to a data frame. The write command and data frame, including the identifier, is sent from the initiator to the receiver.
    Type: Application
    Filed: October 6, 2008
    Publication date: April 8, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dung Ngoc DANG, Chung Man FUNG, Steven Edward KLEIN, Patricia Ching LU
  • Patent number: 7562137
    Abstract: A first device determines a possibility of an invalidation of a second device, wherein the first device is coupled to the second device via a fabric. A query is sent from the first device to validate the second device, in response to determining the possibility of the invalidation of the second device. A determination is made, at the first device, whether to continue I/O operations from the first device to the second device based on receiving a response to the query within a time period.
    Type: Grant
    Filed: November 20, 2003
    Date of Patent: July 14, 2009
    Assignee: Internatioal Business Machines Corporation
    Inventors: Steven Edward Klein, James Chien-Chiung Chen, Patricia Ching Lu, Matthew Joseph Kalos
  • Publication number: 20080256385
    Abstract: Provided are techniques for determining a link speed. When a link between two computing devices is operational, a link speed for use in communicating across the link is stored and a remembered indicator is set to TRUE. After any event occurs that causes the link to become inoperational, in response to determining that the remembered indicator is TRUE, the stored link speed is used when attempting to make the link become operational.
    Type: Application
    Filed: April 11, 2007
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Steven Bayus, Mark P. Bendyk, Roger Gregory Hathorn, Steven Edward Klein
  • Patent number: 7412718
    Abstract: Provided are a method, system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port.
    Type: Grant
    Filed: November 20, 2003
    Date of Patent: August 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: Steven Edward Klein, James Chien-Chiung Chen, Patricia Ching Lu, Minh-Ngoc Le Huynh
  • Publication number: 20080189771
    Abstract: Provided are a system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port.
    Type: Application
    Filed: April 22, 2008
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Edward Klein, James Chien-Chiung Chen, Patricia Ching Lu, Minh-Ngoc Le Huynh
  • Publication number: 20080077952
    Abstract: In response to a user selection of a media item, such as a video clip, from a website for online sharing of media, the website selects an advertisement to pair with the requested media item. The selection of the advertisement may be based on information known about the requested media item, thereby resulting in a more targeted advertisement based on the own identification of content that interests the user. The website may pair the advertisement as an overlay with the media item. The paired item and advertisement are delivered to the user, who can view them on a local device.
    Type: Application
    Filed: September 25, 2007
    Publication date: March 27, 2008
    Inventors: Randy St. Jean, Edward Klein, Mitchell Linden, Cynthia Francis
  • Publication number: 20070148365
    Abstract: A method for forming paper or paperboard includes applying a plurality of nanofibers to a web of cellulose paper fibers using an electrospinning device comprising a plurality of meniscus initiators. The paper or paperboard may also be coated with a top coating to provide desired print properties.
    Type: Application
    Filed: December 28, 2005
    Publication date: June 28, 2007
    Inventors: David Knox, Edward Klein, Vladislav Babinsky, Sharon Klein
  • Publication number: 20070033653
    Abstract: A system and method for managing sensitive information. A portable memory device is adapted to be operatively connected to a client computer, which includes a thin client. The portable memory device can be adapted to store the sensitive information transferred via the thin client to the network server. The network server can be adapted to process the inputted sensitive information received via any number of thin clients.
    Type: Application
    Filed: August 8, 2005
    Publication date: February 8, 2007
    Inventor: Edward Klein