Patents by Inventor Frank Schmuck
Frank Schmuck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907170Abstract: Provided are a computer program product, system, and method for switching serialization techniques for handling concurrent write requests to a shared file. A first node serializes write requests from client nodes to write to the shared file. The first node determines whether to switch to a second node to manage write quests to the shared file based on a pattern of write requests to the shared file. The client nodes are notified to direct write requests to the shared file to the second node in response to determining to switch to the second node. The second node processes write requests to the shared file to serialize writes to the shared file after the client nodes are notified to submit the write requests to the shared file to the second node.Type: GrantFiled: June 14, 2021Date of Patent: February 20, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Enci Zhong, Frank Schmuck, Felipe Knop, Owen T. Anderson, Huzefa Pancha, Abhishek Jain
-
Patent number: 11803317Abstract: A method for executing operation requests includes formatting one or more storage devices and selecting one or more labeled replicas and one or more distinguished replicas, receiving an operation request with respect to a set of data blocks, identifying a preferred replica corresponding to the received operation request, determining whether the replication-pending bits for the preferred replica are set, and executing the received operation request with respect to the corresponding distinguished replica. A method for executing a write operation request additionally includes setting replication-pending bits with respect to the labeled replica, wherein the replication-pending bits indicate an incomplete write request, writing data to both a labeled replica and a distinguished replica, and clearing the replication-pending bits with respect to the labeled replica to indicate the completion of the write operation.Type: GrantFiled: December 15, 2020Date of Patent: October 31, 2023Assignee: International Business Machines CorporationInventors: Owen T. Anderson, Felipe Knop, Enci Zhong, Frank Schmuck, Deepavali M. Bhagwat, Hai Zhong Zhou
-
Publication number: 20230342063Abstract: A method and a computer system for asymmetric replication of data are provided. Storage of a set of data is organized as a first copy and as a second copy in non-volatile storage. The second copy is reliable and stored so as to be readable at a speed slower than for the first copy. A read instruction regarding the set of data is received and performed preferentially via the first copy such that the asymmetric replication achieves enhanced performance speed. A request to execute a write operation is received. The write operation is executed to the first copy and to the second copy. In response to determining that the write operation to the first copy was unsuccessful, a label for the first copy is set as stale.Type: ApplicationFiled: April 22, 2022Publication date: October 26, 2023Inventors: Frank Schmuck, Owen T. Anderson, DEEPAVALI M. BHAGWAT, Enci Zhong, Felipe Knop, John Lewars, Hai Zhong Zhou, D Scott Guthridge
-
Patent number: 11782630Abstract: A method and a computer system for asymmetric replication of data are provided. Storage of a set of data is organized as a first copy and as a second copy in non-volatile storage. The second copy is reliable and stored so as to be readable at a speed slower than for the first copy. A read instruction regarding the set of data is received and performed preferentially via the first copy such that the asymmetric replication achieves enhanced performance speed. A request to execute a write operation is received. The write operation is executed to the first copy and to the second copy. In response to determining that the write operation to the first copy was unsuccessful, a label for the first copy is set as stale.Type: GrantFiled: April 22, 2022Date of Patent: October 10, 2023Assignee: International Business Machines CorporationInventors: Frank Schmuck, Owen T. Anderson, Deepavali M. Bhagwat, Enci Zhong, Felipe Knop, John Lewars, Hai Zhong Zhou, D Scott Guthridge
-
Patent number: 11698965Abstract: A computer-implemented method includes monitoring file access activity and generating an audit log based on the file access activity. The method also includes collecting samples of file usage activity, running a pattern recognition algorithm on the samples of the file usage activity for detecting malware activity, and, in response to detecting malware activity, restoring at least one file based on the audit log. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: GrantFiled: April 9, 2020Date of Patent: July 11, 2023Assignee: International Business Machines CorporationInventors: M Corneliu Constantinescu, Frank Schmuck, Deepavali M. Bhagwat
-
Patent number: 11593309Abstract: Embodiments include a method for fault tolerance in the delivery of event information within a file system cluster. One or more processors to determine event information associated with file system activity performed by a node of the cluster. The one or more processors add the event information to an event log buffer in memory. The one or more processors receive a first log sequence number (LSN) associated with flushing of recovery information from a recovery log buffer. The one or more processors determine the event information in the event log buffer having a log sequence number less than or equal to the first log sequence number, and determining the event information includes log sequence numbers less than or equal to the first log sequence number, the one or more processors flush the corresponding event information from the event log buffer to disk storage.Type: GrantFiled: November 5, 2020Date of Patent: February 28, 2023Assignee: International Business Machines CorporationInventors: John T. Olson, Deepavali M. Bhagwat, Frank Schmuck, Shekhar Amlekar, Luis Teran, Jacob Morris Tick, April Brown
-
Publication number: 20220398223Abstract: Provided are a computer program product, system, and method for switching serialization techniques for handling concurrent write requests to a shared file. A first node serializes write requests from client nodes to write to the shared file. The first node determines whether to switch to a second node to manage write quests to the shared file based on a pattern of write requests to the shared file. The client nodes are notified to direct write requests to the shared file to the second node in response to determining to switch to the second node. The second node processes write requests to the shared file to serialize writes to the shared file after the client nodes are notified to submit the write requests to the shared file to the second node.Type: ApplicationFiled: June 14, 2021Publication date: December 15, 2022Inventors: Enci ZHONG, Frank SCHMUCK, Felipe KNOP, Owen T. ANDERSON, Huzefa PANCHA, Abhishek JAIN
-
Publication number: 20220342815Abstract: Provided are a computer program product, integrated cache manager, and method for maintaining data in a first level memory and buckets representing regions of memory devices to extend data cache. A plurality of buckets represent distinct regions of memory devices. The buckets are associated with different threshold access count ranges. Data having an access count is stored in one of the buckets associated with a threshold access count range including the access count of the data to store. Data evicted from a first level memory is copied to an initial bucket comprising one of the buckets. Data is moved from a source bucket comprising one of the buckets, including the initial bucket, to a target bucket of the buckets having a target threshold access count range including an access count of the data to move.Type: ApplicationFiled: April 22, 2021Publication date: October 27, 2022Inventors: Subashini BALACHANDRAN, Frank SCHMUCK, Owen T. ANDERSON, Wayne A. SAWDON
-
Patent number: 11436158Abstract: A computer-implemented method includes using a cache replacement algorithm to forcefully evict target data from a cache. Using the cache replacement algorithm includes selectively accessing data in the cache. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: GrantFiled: May 29, 2020Date of Patent: September 6, 2022Assignee: International Business Machines CorporationInventors: Shashank Gugnani, D Scott Guthridge, Frank Schmuck, Owen T. Anderson, Deepavali M. Bhagwat
-
Publication number: 20220187990Abstract: A method for executing operation requests includes formatting one or more storage devices and selecting one or more labeled replicas and one or more distinguished replicas, receiving an operation request with respect to a set of data blocks, identifying a preferred replica corresponding to the received operation request, determining whether the replication-pending bits for the preferred replica are set, and executing the received operation request with respect to the corresponding distinguished replica. A method for executing a write operation request additionally includes setting replication-pending bits with respect to the labeled replica, wherein the replication-pending bits indicate an incomplete write request, writing data to both a labeled replica and a distinguished replica, and clearing the replication-pending bits with respect to the labeled replica to indicate the completion of the write operation.Type: ApplicationFiled: December 15, 2020Publication date: June 16, 2022Inventors: Owen T. Anderson, Felipe Knop, Enci Zhong, Frank Schmuck, DEEPAVALI M. BHAGWAT, Hai Zhong Zhou
-
Publication number: 20220138158Abstract: Embodiments include a method for fault tolerance in the delivery of event information within a file system cluster. One or more processors to determine event information associated with file system activity performed by a node of the cluster. The one or more processors add the event information to an event log buffer in memory. The one or more processors receive a first log sequence number (LSN) associated with flushing of recovery information from a recovery log buffer. The one or more processors determine the event information in the event log buffer having a log sequence number less than or equal to the first log sequence number, and determining the event information includes log sequence numbers less than or equal to the first log sequence number, the one or more processors flush the corresponding event information from the event log buffer to disk storage.Type: ApplicationFiled: November 5, 2020Publication date: May 5, 2022Inventors: John T. Olson, DEEPAVALI M. BHAGWAT, Frank Schmuck, Shekhar Amlekar, Luis Teran, Jacob Morris Tick, April Brown
-
Publication number: 20210374073Abstract: A computer-implemented method includes using a cache replacement algorithm to forcefully evict target data from a cache. Using the cache replacement algorithm includes selectively accessing data in the cache. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: May 29, 2020Publication date: December 2, 2021Inventors: Shashank Gugnani, D Scott Guthridge, Frank Schmuck, Owen T. Anderson, Deepavali M. Bhagwat
-
Publication number: 20210319103Abstract: A computer-implemented method includes monitoring file access activity and generating an audit log based on the file access activity. The method also includes collecting samples of file usage activity, running a pattern recognition algorithm on the samples of the file usage activity for detecting malware activity, and, in response to detecting malware activity, restoring at least one file based on the audit log. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Inventors: M Corneliu Constantinescu, Frank Schmuck, Deepavali M. Bhagwat
-
Patent number: 8653376Abstract: A composite insulator comprises a rod with an insulating jacket and ribs and at least one end fitting and at least one corona shield. The latter is integrally manufactured from plastic material. It is configured to be coaxially disposed on the composite insulator at the transition from the rod to the end fitting. The corona shield forms a cavity, which is open towards the inside and which can be filled with sealant compound through at least one filling channel and which comprises a closing cuff in axial direction on both sides for sealing the cavity. The diameter of the rod side closing cuff is adapted to the diameter of the insulating jacket, and the diameter of the fitting side closing cuff is adapted to the diameter of the end fitting. The filling channel leads to the cavity from the outside.Type: GrantFiled: August 4, 2009Date of Patent: February 18, 2014Assignee: Pfisterer Sefag AGInventors: Thomas Birrer, Hansruedi Gassmann, Werner Albisser, Leo Arnet, Frank Schmuck
-
Publication number: 20110030993Abstract: A composite insulator comprises a rod with an insulating jacket and ribs and at least one end fitting and at least one corona shield. The latter is integrally manufactured from plastic material. It is configured to be coaxially disposed on the composite insulator at the transition from the rod to the end fitting. The corona shield forms a cavity, which is open towards the inside and which can be filled with sealant compound through at least one filling channel and which comprises a closing cuff in axial direction on both sides for sealing the cavity. The diameter of the rod side closing cuff is adapted to the diameter of the insulating jacket, and the diameter of the fitting side closing cuff is adapted to the diameter of the end fitting. The filling channel leads to the cavity from the outside.Type: ApplicationFiled: August 4, 2009Publication date: February 10, 2011Inventors: Thomas Birrer, Hansruedi Gassmann, Werner Albisser, Leo Arnet, Frank Schmuck
-
Publication number: 20080091680Abstract: Asynchronous messages are used to prefetch and/or relinquish tokens used in providing locking of shared resources. A message is sent to prefetch one or more tokens, and prior to receiving a reply for the message, another message (e.g., an acquire) is sent for at least one of those tokens. Similarly, a message is sent indicating a voluntary relinquish of one or more tokens and without having acknowledgment that the relinquish request was processed, a further message (e.g., an acquire) is sent for at least one of the tokens. Multiple tokens may be acquired and/or relinquished in a single message to the token server. This reduces message delays and overall message traffic.Type: ApplicationFiled: December 20, 2007Publication date: April 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marc ESHEL, Frank SCHMUCK
-
Patent number: 7325867Abstract: The invention relates to a jack bracket (12) for a motor vehicle, which is fixed to a sill of the motor vehicle with flanges and an opening (16) for a receiving element in which the jack is placed. The invention also relates to a method for the production of said bracket (12). In order to simplify the production and configuration of the bracket (12) without comprising its stability, the bracket (12) is comprised of a tubular hollow profile (6) and a lid (13), which is fixed on the end (10) opposite the sill of the hollow profile (6) covering said end (10) and which has the opening (16) for the receiving element.Type: GrantFiled: May 18, 2004Date of Patent: February 5, 2008Assignee: DaimlerChrysler AGInventors: Juergen Gade, Heinz Koslowski, Joachim Neumann, Rudolf Nowak, Frank Schmuck
-
Publication number: 20070271979Abstract: A punch designed for producing holes in the walls of hollow parts, the part being subjected to the action of high pressure in the interior by a medium during the punching. In particular when producing hollow parts by the internal high pressure forming process, it is normal practice, following the forming and with the part still located in the forming tool, to make holes in the wall. In order to avoid a drop in the internal high pressure when cutting through the wall of the part, the punch is designed so as to taper at an angle toward the cutting edge in its region plunging into the part to be punched. As a result, sealing of the hole occurs during the punching.Type: ApplicationFiled: November 17, 2004Publication date: November 29, 2007Applicant: DaimlerChrysler AGInventors: Stephan Kuschel, Frank Schmuck, Jens Schult
-
Publication number: 20070029842Abstract: The invention relates to a jack bracket (12) for a motor vehicle, which is fixed to a sill of the motor vehicle with flanges and an opening (16) for a receiving element in which the jack is placed. The invention also relates to a method for the production of said bracket (12). In order to simplify the production and configuration of the bracket (12) without comprising its stability, the bracket (12) is comprised of a tubular hollow profile (6) and a lid (13), which is fixed on the end (10) opposite the sill of the hollow profile (6) covering said end (10) and which has the opening (16) for the receiving element.Type: ApplicationFiled: May 18, 2004Publication date: February 8, 2007Inventors: Juergen Gade, Heinz Koslowski, Joachim Neumann, Rudolf Nowak, Frank Schmuck
-
Publication number: 20070011136Abstract: Access to data stored on shared storage media is facilitated by providing a user with uniform access to the user's data regardless from which administrative domain the user is accessing the data. An identifier for the user is created. The identifier corresponds to one account in one administrative domain, but is used in another administrative domain to access data owned by the user, but managed by the one administrative domain. This allows the user running an application in either administrative domain to access its data with the same permissions.Type: ApplicationFiled: July 5, 2005Publication date: January 11, 2007Applicant: International Business Machines CorporationInventors: Roger Haskin, Frank Schmuck, Yuri Volobuev, James Wyllie