Patents by Inventor Gordan G. Greenlee

Gordan G. Greenlee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140164817
    Abstract: An approach is provided for internet protocol (IP) address failover. An application on a primary site is assigned a private IP address. This private IP address is accessible within a local network. This private IP address is mapped to a public IP address, which is accessible to users outside the local network. The application is then replicated to a backup site with the same private IP address used to access it on the primary site. In case of a disaster recover event on the primary site, the replicated application can be accessed on the backup site by way of the public IP address.
    Type: Application
    Filed: December 11, 2012
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Erik Bartholomy, Frank J. Giordano, Gordan G. Greenlee, Gourishankar R. Menon, Victor L. Walter
  • Publication number: 20140137186
    Abstract: Mechanisms are provided for performing centralized control of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session control operation to control the application sessions associated with a specified user account identifier across the plurality of application servers in the distributed computing environment is received. A plurality of application instances upon which to perform the requested application session control operation are identified. An application session control request is transmitted to a plurality of session control clients associated with the application instances on the plurality of application servers of the distributed computing environment.
    Type: Application
    Filed: November 12, 2012
    Publication date: May 15, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gordan G. Greenlee, Richard J. McCarty
  • Publication number: 20140136681
    Abstract: Mechanisms are provided for performing centralized monitoring of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session monitoring operation to monitor at least one of input or output streams of application sessions associated with a specified user account identifier is received. A plurality of application instances upon which to perform the requested application session monitoring operation are identified. An application session monitoring request is transmitted to a plurality of session control clients associated with the application instances on a plurality of application servers of the distributed computing environment.
    Type: Application
    Filed: November 12, 2012
    Publication date: May 15, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gordan G. Greenlee, Richard J. McCarty
  • Publication number: 20140122926
    Abstract: An approach is provided for determining disaster recovery capacity. A simulation hypervisor receives streaming metric data, which represents the current production workload of a primary site, from the primary site. The metric data is combined with production data of the backup site by the simulation hypervisor to simulate a recovery event. Using data from the simulating, disaster recovery planning can be performed.
    Type: Application
    Filed: October 31, 2012
    Publication date: May 1, 2014
    Applicant: Internation Business Machines Corporation
    Inventors: Erik Bartholomy, Christopher P. Evans, Frank J. Giordano, Gordan G. Greenlee, Paul W. Novak, Richard J. Sheftic, Victor L. Walter
  • Publication number: 20140006614
    Abstract: A method and system for measuring performance and balancing workload of sites and servers is provided. The method includes measuring performance of one or more servers located at different sites of the network and computing a performance metric for each of the sites or one or more servers at each of the sites. The method further includes providing a bias to the performance metric and routing a request to one of the different sites or one of the one or more servers based on the biased performance metric.
    Type: Application
    Filed: September 4, 2013
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bahri B. BALI, Gordan G. GREENLEE, Richard E. WEINGARTEN
  • Publication number: 20130326035
    Abstract: An approach is provided for managing an enterprise computer system. Management functions are coordinated from a central control point. The central control point can direct one or more agents to be deployed to establish a connection to an element in its unmodified form within the enterprise system. Agents can be directed by the central control point to establish this connection in accordance with a profile that corresponds to the element. Once the connection has been established, the agent can perform a management task with respect to the element.
    Type: Application
    Filed: May 30, 2012
    Publication date: December 5, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gordan G. Greenlee, Paul W. Novak
  • Patent number: 8539075
    Abstract: A method and system for measuring performance and balancing workload of sites and servers is provided. The method comprises measuring performance of one or more servers located at different sites of the network and computing a performance metric for each of the sites or one or more servers at each of the sites. The method further comprises providing a bias to the performance metric and routing a request to one of the different sites or one of the one or more servers based on the biased performance metric.
    Type: Grant
    Filed: August 11, 2006
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Bahri B Bali, Gordan G Greenlee, Richard E Weingarten
  • Patent number: 8387074
    Abstract: An apparatus and method provides directory service to software applications throughout an enterprise. Directory entries are kept in a data store. A web server having one or more API's is coupled to the data store. The web server may have an API locator for selecting an appropriate API. An enterprise software application such as a purchasing or accounts payable transaction requests directory information by sending a query to an appropriate wrapper based on the programming language, protocol or format of the application. The wrapper sends the request to the appropriate API which then sends a request to the data store. A directory entry is received and returned to the enterprise.
    Type: Grant
    Filed: November 9, 2001
    Date of Patent: February 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: James R. Doran, Paul William Everett, Gordan G. Greenlee, Ashraf N. Ibrahim
  • Patent number: 8346958
    Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sean E. Aschen, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee, Dennis L. Hartel
  • Publication number: 20120331171
    Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system includes a health metrics engine that calculates an actual delay value, a LoM server that asynchronously obtains the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master that accepts the one or more requests and send information in the one or more requests to a LDAP replica.
    Type: Application
    Filed: September 7, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean E. ASCHEN, Bahri B. BALI, Catherine Y. BARNES, Gordan G. GREENLEE, Dennis L. HARTEL
  • Patent number: 8205254
    Abstract: A method is provided to control access to a software application and, more particularly, to control access to a first software application using a second trusted application. The method comprises extracting data from a decrypted client request and determining a request type from the extracted data. The method further comprises ascertaining an entry type value from at least one of the extracted data and an entry and creating at least one string by prepending the entry type value to one or more attributes associated with the entry. Additionally, the method includes comparing the at least one string to one or more record entries to determine whether a client has permission to perform the request type.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: June 19, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sean E. Aschen, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee
  • Publication number: 20120136833
    Abstract: Aspects of the present invention provide a solution for implementing disaster recovery for an application. A subscription backup site for the application is selected from among a plurality of sites. The site that is selected will have a virtual space that is able to accommodate the workload requirements for the application. The application is deflated on the site in such as way as to operate in a dormant state. In the dormant state, the application has a small fraction of its required resources allocated to it. Thereafter, when disaster recovery is needed, the application can be inflated on the subscription backup site by allocating resources to enable the application to execute on the subscription backup site.
    Type: Application
    Filed: November 29, 2010
    Publication date: May 31, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erik Bartholomy, Frank J. Giordano, Gordan G. Greenlee
  • Patent number: 7877792
    Abstract: Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: January 25, 2011
    Assignee: International Business Machines Corporation
    Inventors: Christopher E. Barnabo, Gordan G. Greenlee
  • Patent number: 7870192
    Abstract: A method and system for coordinating a Voice Over Internet Protocol (VoIP) teleconference. A teleconference operator drags the name of invited attendees into a hot window, which connects the invited attendees to a channel for the teleconference. Each invited attendee's name has a status icon associated with it, indicating if the invited attendee is active in the teleconference. Each invited attendee has access to a Graphical User Interface (GUI) that permits the attendee to toggle back and forth between different teleconferences.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Gordan G. Greenlee, James A. Martin, Jr., Renee Christine Mullins
  • Patent number: 7793335
    Abstract: The present invention provides a computer-implemented method, system, and program product for managing log-in strikes in a geographically distributed computer infrastructure. Specifically, under the present invention, when a strike message is received on a strikeout server pursuant to an incorrect password input during an attempted log-in of a user, the incorrect password is compared to a strike list to determine if it was previously received on the strikeout server during a predetermined period of time. Based on this determination, the incorrect password and will be stored in a list on the strikeout server with a corresponding timestamp. Thereafter, the strike message and the timestamp will be replicated to all other strikeout servers in the infrastructure.
    Type: Grant
    Filed: September 12, 2005
    Date of Patent: September 7, 2010
    Assignee: International Business Machines Corporation
    Inventors: Bahri B. Bali, Christopher E. Barnabo, Gordan G. Greenlee, Kan Y. Hsiao, Howard E. Poole, Richard E. Weingarten
  • Publication number: 20100146517
    Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica.
    Type: Application
    Filed: December 4, 2008
    Publication date: June 10, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean E. ASCHEN, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee, Dennis L. Hartel
  • Patent number: 7693991
    Abstract: A method and system is provided intelligent network dispatchers that are capable of routing requests to one or more servers (e.g., LDAP servers) based on the requested application or the identity of the requester. The servers may be grouped into virtual clusters so that a particular cluster may service requests associated with a particular application or based on a type of customer (e.g., preferred or general customer) in order to grade levels of service. Also, a system resource monitor may provide continual monitoring of servers in virtual clusters to determine when one or more servers are overburdened or under burdened based on statistical performance data. As a servers performance changes, the system resource monitor may advise the intelligent network dispatcher causing a change in the rate of requests to the overburdened/under burdened server. The server may be temporarily removed from the virtual cluster until performance levels normalize.
    Type: Grant
    Filed: January 16, 2004
    Date of Patent: April 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Gordan G. Greenlee, Dennis Hartel, Joseph F. Riina, Richard E. Weingarten
  • Publication number: 20080282359
    Abstract: A method is provided to control access to a software application and, more particularly, to control access to a first software application using a second trusted application. The method comprises extracting data from a decrypted client request and determining a request type from the extracted data. The method further comprises ascertaining an entry type value from at least one of the extracted data and an entry and creating at least one string by prepending the entry type value to one or more attributes associated with the entry. Additionally, the method includes comparing the at least one string to one or more record entries to determine whether a client has permission to perform the request type.
    Type: Application
    Filed: June 24, 2008
    Publication date: November 13, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean E. ASCHEN, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee
  • Publication number: 20080222713
    Abstract: Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.
    Type: Application
    Filed: February 27, 2008
    Publication date: September 11, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher E. Barnabo, Gordan G. Greenlee
  • Publication number: 20080133617
    Abstract: The present invention provides a change log handler than can accommodate a change log having an entry that includes more than one modification operation or multi-valued attributes. The change log handler typically includes a change parser for parsing change attributes corresponding to the change log that identify changes to the first data source. Such changes can include a plurality of modification operations as reflected in a single entry of the change log. The change log handler also includes a change reflector for applying the changes to a second data source.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 5, 2008
    Inventors: Bahri B. Bali, Gordan G. Greenlee