Patents by Inventor Elizabeth S. Richards
Elizabeth S. Richards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8655623Abstract: Disclosed are system and method embodiments for determining the root-causes of a performance objective violation, such as an end-to-end service level objection (SLO) violation, in a large-scale system with multi-tiered applications. This determination is made using a hybrid of component-level snapshots of the state of the system during a period in which an abnormal event occurred (i.e., black box mapping) and of known events and their causes (i.e., white-box mapping). Specifically, in response to a query about a violation (e.g., why did the response time for application a1 increase from r1 to r2), a processor will access and correlate the black-box and white-box mappings to determine a short-list of probable causes for the violation.Type: GrantFiled: February 13, 2007Date of Patent: February 18, 2014Assignees: International Business Machines Corporation, National Security AgencyInventors: Linda M. Duyanovich, Kristal T. Pollack, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Patent number: 8260622Abstract: The embodiments of the invention provide methods, computer program products, etc. for complaint-based service level objectives. More specifically, a method of deducing undefined service level objectives receives complaints regarding behavior of a system. The complaints could include a severity parameter, an entity parameter, a nature-of-complaint parameter, a timestamp parameter, and/or an identification parameter. Next, system details representing a current state of the system are recorded for each of the complaints. The method then automatically analyzes a history of the system details and the complaints to produce a historical compilation of the system details. The analyzing can include weighing each of the system details by a severity parameter value.Type: GrantFiled: February 13, 2007Date of Patent: September 4, 2012Assignees: International Business Machines Corporation, National Security AgencyInventors: Edward G. Chron, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Patent number: 7953705Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.Type: GrantFiled: March 31, 2008Date of Patent: May 31, 2011Assignees: International Business Machines Corporation, National Security AgencyInventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Patent number: 7752239Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.Type: GrantFiled: April 3, 2008Date of Patent: July 6, 2010Assignees: International Business Machines Corporation, The United States of America as represented by National Security AgencyInventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
-
Patent number: 7552131Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.Type: GrantFiled: March 5, 2007Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Patent number: 7552152Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.Type: GrantFiled: March 5, 2007Date of Patent: June 23, 2009Assignees: International Business Machines Corporation, The United States of America as represented by the National Security AgencyInventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
-
Publication number: 20080222075Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.Type: ApplicationFiled: March 5, 2007Publication date: September 11, 2008Inventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Publication number: 20080222225Abstract: The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items.Type: ApplicationFiled: March 31, 2008Publication date: September 11, 2008Applicant: International Business Machines CorporationInventors: Edward G. Chron, Joseph P. McCloskey, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Publication number: 20080222218Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.Type: ApplicationFiled: March 5, 2007Publication date: September 11, 2008Inventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
-
Publication number: 20080222644Abstract: The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.Type: ApplicationFiled: April 3, 2008Publication date: September 11, 2008Applicant: International Business Machines CorporationInventors: Elizabeth S. Richards, Sandeep M. Uttamchandani, Li Yin
-
Publication number: 20080195369Abstract: Disclosed are system and method embodiments for determining the root-causes of a performance objective violation, such as an end-to-end service level objection (SLO) violation, in a large-scale system with multi-tiered applications. This determination is made using a hybrid of component-level snapshots of the state of the system during a period in which an abnormal event occurred (i.e., black box mapping) and of known events and their causes (i.e., white-box mapping). Specifically, in response to a query about a violation (e.g., why did the response time for application a1 increase from r1 to r2), a processor will access and correlate the black-box and white-box mappings to determine a short-list of probable causes for the violation.Type: ApplicationFiled: February 13, 2007Publication date: August 14, 2008Inventors: Linda M. Duyanovich, Kristal T. Pollack, Elizabeth S. Richards, Sandeep M. Uttamchandani
-
Publication number: 20080195404Abstract: The embodiments of the invention provide methods, computer program products, etc. for complaint-based service level objectives. More specifically, a method of deducing undefined service level objectives receives complaints regarding behavior of a system. The complaints could include a severity parameter, an entity parameter, a nature-of-complaint parameter, a timestamp parameter, and/or an identification parameter. Next, system details representing a current state of the system are recorded for each of the complaints. The method then automatically analyzes a history of the system details and the complaints to produce a historical compilation of the system details. The analyzing can include weighing each of the system details by a severity parameter value.Type: ApplicationFiled: February 13, 2007Publication date: August 14, 2008Inventors: Edward G. Chron, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani