Patents by Inventor Glenn Wightwick

Glenn Wightwick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070299809
    Abstract: A method and system are provided for managing requests to access data in a computer environment. In one aspect of the present invention, a request manager receives a request associated with meta data corresponding to data that is maintained separately from the meta data. In another aspect, the request manager informs a data object manager of an anticipated request that will be received by the data object manager to enable it to prepare for the anticipated request. The data object manager commences preparing for the anticipated request in response to being informed of the anticipated request to facilitate a reduction in data access time. In one example of a computing environment utilizing one or more aspects of the invention, a storage subsystem comprising a data object manager prepares for the anticipated request by pre-fetching data blocks from storage media into a cache.
    Type: Application
    Filed: September 12, 2007
    Publication date: December 27, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael BROWNE, Glenn WIGHTWICK
  • Publication number: 20070038913
    Abstract: A method for improving the reliability of host data stored on Fibre Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source.
    Type: Application
    Filed: July 26, 2005
    Publication date: February 15, 2007
    Applicant: International Business Machines Corporation
    Inventors: James Allen, Thomas Mathews, Ravi Shankar, Satya Sharma, Glenn Wightwick
  • Publication number: 20070011495
    Abstract: A first logical partition in a first processing complex of a server cluster is operated in an active mode and a second logical partition in the processing complex is operated in a standby mode. Upon detection of a failure in a second processing complex of the server cluster. the standby mode logical partition in the first processing complex is activated to an active mode. In one embodiment, partition resources are transferred from an active mode logical partition to the logical partition activated from standby mode. Other embodiments are described and claimed.
    Type: Application
    Filed: June 28, 2005
    Publication date: January 11, 2007
    Inventors: William Armstrong, Michael Hartung, Yu-Cheng Hsu, Glenn Wightwick
  • Publication number: 20060294337
    Abstract: A first logical partition in a first processing complex of a server cluster is operated at a first level of a software code. Software code in a second logical partition in the same processing complex is changed to a second level. Processing operations are transferred from the first logical partition in the first processing complex to a third logical partition in a second processing complex of the server cluster. In another aspect, the transferring of processing operations includes quiescing the first logical partition to cause a failover of processing operations from the first logical partition in the first processing complex, to the third logical partition in the second processing complex. In yet another aspect, a failback operation is performed and a first portion of the processing operations are transferred from the third logical partition in the second processing complex, to the second logical partition in the first processing complex.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventors: Michael Hartung, Yu-Cheng Hsu, Glenn Wightwick
  • Publication number: 20060294323
    Abstract: A first logical partition in a first processing complex of a server cluster is operated at a first level of a software code. Software code in a second logical partition in the same processing complex is updated to a second level. Processing operations are assumed by the second logical partition operating at the second level of software code. Other embodiments are described and claimed.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventors: William Armstrong, Michael Hartung, Yu-Cheng Hsu, Glenn Wightwick
  • Publication number: 20060259708
    Abstract: Provided are a method, system and program for dumping data in processing systems to a shared storage. A plurality of processing systems receive a signal indicating an event. Each of the processing systems write data used by the processing system to a shared storage device in response to receiving the signal, wherein each processing system writes the data to the shared storage device.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Inventors: Yu-Cheng Hsu, David Mannenbach, Glenn Wightwick
  • Publication number: 20060168397
    Abstract: A method for processing a point-in-time copy of data associated with a logical storage volume where the data to be copied is stored in a striped or parallelized fashion across more than one physical source volume. The method includes receiving a point-in-time copy command concerning a logical volume and distributing the point-in-time copy command in-band to each of the physical source volumes containing a portion of the striped data. The method also includes establishing a point-in-time copy relationship between each physical source volume and one of a corresponding set of multiple physical target volumes. The method further includes copying the data stored on each physical source volume to the corresponding physical target volume. The in-band copy command and the striped data may be distributed over I/O channels between a server and the physical storage and processed sequentially.
    Type: Application
    Filed: January 21, 2005
    Publication date: July 27, 2006
    Applicant: International Business Machines (IBM) Corporation
    Inventors: Glenn Wightwick, Carl Jones, Steven Wilson
  • Publication number: 20050149562
    Abstract: A method and system are provided for managing requests to access data in a computer environment. In one aspect of the present invention, a request manager receives a request associated with meta data corresponding to data that is maintained separately from the meta data. In another aspect, the request manager informs a data object manager of an anticipated request that will be received by the data object manager to enable it to prepare for the anticipated request. The data object manager commences preparing for the anticipated request in response to being informed of the anticipated request to facilitate a reduction in data access time. In one example of a computing environment utilizing one or aspects of the invention, a storage subsystem comprising a data object manager prepares for the anticipated request by pre-fetching data blocks from storage media into a cache.
    Type: Application
    Filed: December 31, 2003
    Publication date: July 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Michael Browne, Glenn Wightwick