Patents by Inventor Elizabeth S. Richards

Elizabeth S. Richards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8655623
    Abstract: Disclosed are system and method embodiments for determining the root-causes of a performance objective violation, such as an end-to-end service level objection (SLO) violation, in a large-scale system with multi-tiered applications. This determination is made using a hybrid of component-level snapshots of the state of the system during a period in which an abnormal event occurred (i.e., black box mapping) and of known events and their causes (i.e., white-box mapping). Specifically, in response to a query about a violation (e.g., why did the response time for application a1 increase from r1 to r2), a processor will access and correlate the black-box and white-box mappings to determine a short-list of probable causes for the violation.
    Type: Grant
    Filed: February 13, 2007
    Date of Patent: February 18, 2014
    Assignees: International Business Machines Corporation, National Security Agency
    Inventors: Linda M. Duyanovich, Kristal T. Pollack, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Patent number: 8260622
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for complaint-based service level objectives. More specifically, a method of deducing undefined service level objectives receives complaints regarding behavior of a system. The complaints could include a severity parameter, an entity parameter, a nature-of-complaint parameter, a timestamp parameter, and/or an identification parameter. Next, system details representing a current state of the system are recorded for each of the complaints. The method then automatically analyzes a history of the system details and the complaints to produce a historical compilation of the system details. The analyzing can include weighing each of the system details by a severity parameter value.
    Type: Grant
    Filed: February 13, 2007
    Date of Patent: September 4, 2012
    Assignees: International Business Machines Corporation, National Security Agency
    Inventors: Edward G. Chron, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Patent number: 7953705
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: May 31, 2011
    Assignees: International Business Machines Corporation, National Security Agency
    Inventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Patent number: 7752239
    Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: July 6, 2010
    Assignees: International Business Machines Corporation, The United States of America as represented by National Security Agency
    Inventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
  • Patent number: 7552131
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.
    Type: Grant
    Filed: March 5, 2007
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Patent number: 7552152
    Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
    Type: Grant
    Filed: March 5, 2007
    Date of Patent: June 23, 2009
    Assignees: International Business Machines Corporation, The United States of America as represented by the National Security Agency
    Inventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
  • Publication number: 20080222075
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.
    Type: Application
    Filed: March 5, 2007
    Publication date: September 11, 2008
    Inventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Publication number: 20080222225
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.
    Type: Application
    Filed: March 31, 2008
    Publication date: September 11, 2008
    Applicant: International Business Machines Corporation
    Inventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Publication number: 20080222218
    Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
    Type: Application
    Filed: March 5, 2007
    Publication date: September 11, 2008
    Inventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
  • Publication number: 20080222644
    Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
    Type: Application
    Filed: April 3, 2008
    Publication date: September 11, 2008
    Applicant: International Business Machines Corporation
    Inventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
  • Publication number: 20080195369
    Abstract: Disclosed are system and method embodiments for determining the root-causes of a performance objective violation, such as an end-to-end service level objection (SLO) violation, in a large-scale system with multi-tiered applications. This determination is made using a hybrid of component-level snapshots of the state of the system during a period in which an abnormal event occurred (i.e., black box mapping) and of known events and their causes (i.e., white-box mapping). Specifically, in response to a query about a violation (e.g., why did the response time for application a1 increase from r1 to r2), a processor will access and correlate the black-box and white-box mappings to determine a short-list of probable causes for the violation.
    Type: Application
    Filed: February 13, 2007
    Publication date: August 14, 2008
    Inventors: Linda M. Duyanovich, Kristal T. Pollack, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Publication number: 20080195404
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for complaint-based service level objectives. More specifically, a method of deducing undefined service level objectives receives complaints regarding behavior of a system. The complaints could include a severity parameter, an entity parameter, a nature-of-complaint parameter, a timestamp parameter, and/or an identification parameter. Next, system details representing a current state of the system are recorded for each of the complaints. The method then automatically analyzes a history of the system details and the complaints to produce a historical compilation of the system details. The analyzing can include weighing each of the system details by a severity parameter value.
    Type: Application
    Filed: February 13, 2007
    Publication date: August 14, 2008
    Inventors: Edward G. Chron, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani