Patents by Inventor Gordan G. Greenlee
Gordan G. Greenlee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140164817Abstract: An approach is provided for internet protocol (IP) address failover. An application on a primary site is assigned a private IP address. This private IP address is accessible within a local network. This private IP address is mapped to a public IP address, which is accessible to users outside the local network. The application is then replicated to a backup site with the same private IP address used to access it on the primary site. In case of a disaster recover event on the primary site, the replicated application can be accessed on the backup site by way of the public IP address.Type: ApplicationFiled: December 11, 2012Publication date: June 12, 2014Applicant: International Business Machines CorporationInventors: Erik Bartholomy, Frank J. Giordano, Gordan G. Greenlee, Gourishankar R. Menon, Victor L. Walter
-
Publication number: 20140137186Abstract: Mechanisms are provided for performing centralized control of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session control operation to control the application sessions associated with a specified user account identifier across the plurality of application servers in the distributed computing environment is received. A plurality of application instances upon which to perform the requested application session control operation are identified. An application session control request is transmitted to a plurality of session control clients associated with the application instances on the plurality of application servers of the distributed computing environment.Type: ApplicationFiled: November 12, 2012Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Gordan G. Greenlee, Richard J. McCarty
-
Publication number: 20140136681Abstract: Mechanisms are provided for performing centralized monitoring of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session monitoring operation to monitor at least one of input or output streams of application sessions associated with a specified user account identifier is received. A plurality of application instances upon which to perform the requested application session monitoring operation are identified. An application session monitoring request is transmitted to a plurality of session control clients associated with the application instances on a plurality of application servers of the distributed computing environment.Type: ApplicationFiled: November 12, 2012Publication date: May 15, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gordan G. Greenlee, Richard J. McCarty
-
Publication number: 20140122926Abstract: An approach is provided for determining disaster recovery capacity. A simulation hypervisor receives streaming metric data, which represents the current production workload of a primary site, from the primary site. The metric data is combined with production data of the backup site by the simulation hypervisor to simulate a recovery event. Using data from the simulating, disaster recovery planning can be performed.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: Internation Business Machines CorporationInventors: Erik Bartholomy, Christopher P. Evans, Frank J. Giordano, Gordan G. Greenlee, Paul W. Novak, Richard J. Sheftic, Victor L. Walter
-
Publication number: 20140006614Abstract: A method and system for measuring performance and balancing workload of sites and servers is provided. The method includes measuring performance of one or more servers located at different sites of the network and computing a performance metric for each of the sites or one or more servers at each of the sites. The method further includes providing a bias to the performance metric and routing a request to one of the different sites or one of the one or more servers based on the biased performance metric.Type: ApplicationFiled: September 4, 2013Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bahri B. BALI, Gordan G. GREENLEE, Richard E. WEINGARTEN
-
Publication number: 20130326035Abstract: An approach is provided for managing an enterprise computer system. Management functions are coordinated from a central control point. The central control point can direct one or more agents to be deployed to establish a connection to an element in its unmodified form within the enterprise system. Agents can be directed by the central control point to establish this connection in accordance with a profile that corresponds to the element. Once the connection has been established, the agent can perform a management task with respect to the element.Type: ApplicationFiled: May 30, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gordan G. Greenlee, Paul W. Novak
-
Patent number: 8539075Abstract: A method and system for measuring performance and balancing workload of sites and servers is provided. The method comprises measuring performance of one or more servers located at different sites of the network and computing a performance metric for each of the sites or one or more servers at each of the sites. The method further comprises providing a bias to the performance metric and routing a request to one of the different sites or one of the one or more servers based on the biased performance metric.Type: GrantFiled: August 11, 2006Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Bahri B Bali, Gordan G Greenlee, Richard E Weingarten
-
Patent number: 8387074Abstract: An apparatus and method provides directory service to software applications throughout an enterprise. Directory entries are kept in a data store. A web server having one or more API's is coupled to the data store. The web server may have an API locator for selecting an appropriate API. An enterprise software application such as a purchasing or accounts payable transaction requests directory information by sending a query to an appropriate wrapper based on the programming language, protocol or format of the application. The wrapper sends the request to the appropriate API which then sends a request to the data store. A directory entry is received and returned to the enterprise.Type: GrantFiled: November 9, 2001Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: James R. Doran, Paul William Everett, Gordan G. Greenlee, Ashraf N. Ibrahim
-
Patent number: 8346958Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica.Type: GrantFiled: December 4, 2008Date of Patent: January 1, 2013Assignee: International Business Machines CorporationInventors: Sean E. Aschen, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee, Dennis L. Hartel
-
Publication number: 20120331171Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system includes a health metrics engine that calculates an actual delay value, a LoM server that asynchronously obtains the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master that accepts the one or more requests and send information in the one or more requests to a LDAP replica.Type: ApplicationFiled: September 7, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean E. ASCHEN, Bahri B. BALI, Catherine Y. BARNES, Gordan G. GREENLEE, Dennis L. HARTEL
-
Patent number: 8205254Abstract: A method is provided to control access to a software application and, more particularly, to control access to a first software application using a second trusted application. The method comprises extracting data from a decrypted client request and determining a request type from the extracted data. The method further comprises ascertaining an entry type value from at least one of the extracted data and an entry and creating at least one string by prepending the entry type value to one or more attributes associated with the entry. Additionally, the method includes comparing the at least one string to one or more record entries to determine whether a client has permission to perform the request type.Type: GrantFiled: June 24, 2008Date of Patent: June 19, 2012Assignee: International Business Machines CorporationInventors: Sean E. Aschen, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee
-
Publication number: 20120136833Abstract: Aspects of the present invention provide a solution for implementing disaster recovery for an application. A subscription backup site for the application is selected from among a plurality of sites. The site that is selected will have a virtual space that is able to accommodate the workload requirements for the application. The application is deflated on the site in such as way as to operate in a dormant state. In the dormant state, the application has a small fraction of its required resources allocated to it. Thereafter, when disaster recovery is needed, the application can be inflated on the subscription backup site by allocating resources to enable the application to execute on the subscription backup site.Type: ApplicationFiled: November 29, 2010Publication date: May 31, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Erik Bartholomy, Frank J. Giordano, Gordan G. Greenlee
-
Patent number: 7877792Abstract: Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.Type: GrantFiled: February 27, 2008Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: Christopher E. Barnabo, Gordan G. Greenlee
-
Patent number: 7870192Abstract: A method and system for coordinating a Voice Over Internet Protocol (VoIP) teleconference. A teleconference operator drags the name of invited attendees into a hot window, which connects the invited attendees to a channel for the teleconference. Each invited attendee's name has a status icon associated with it, indicating if the invited attendee is active in the teleconference. Each invited attendee has access to a Graphical User Interface (GUI) that permits the attendee to toggle back and forth between different teleconferences.Type: GrantFiled: December 16, 2004Date of Patent: January 11, 2011Assignee: International Business Machines CorporationInventors: Gordan G. Greenlee, James A. Martin, Jr., Renee Christine Mullins
-
Patent number: 7793335Abstract: The present invention provides a computer-implemented method, system, and program product for managing log-in strikes in a geographically distributed computer infrastructure. Specifically, under the present invention, when a strike message is received on a strikeout server pursuant to an incorrect password input during an attempted log-in of a user, the incorrect password is compared to a strike list to determine if it was previously received on the strikeout server during a predetermined period of time. Based on this determination, the incorrect password and will be stored in a list on the strikeout server with a corresponding timestamp. Thereafter, the strike message and the timestamp will be replicated to all other strikeout servers in the infrastructure.Type: GrantFiled: September 12, 2005Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventors: Bahri B. Bali, Christopher E. Barnabo, Gordan G. Greenlee, Kan Y. Hsiao, Howard E. Poole, Richard E. Weingarten
-
Publication number: 20100146517Abstract: A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean E. ASCHEN, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee, Dennis L. Hartel
-
Patent number: 7693991Abstract: A method and system is provided intelligent network dispatchers that are capable of routing requests to one or more servers (e.g., LDAP servers) based on the requested application or the identity of the requester. The servers may be grouped into virtual clusters so that a particular cluster may service requests associated with a particular application or based on a type of customer (e.g., preferred or general customer) in order to grade levels of service. Also, a system resource monitor may provide continual monitoring of servers in virtual clusters to determine when one or more servers are overburdened or under burdened based on statistical performance data. As a servers performance changes, the system resource monitor may advise the intelligent network dispatcher causing a change in the rate of requests to the overburdened/under burdened server. The server may be temporarily removed from the virtual cluster until performance levels normalize.Type: GrantFiled: January 16, 2004Date of Patent: April 6, 2010Assignee: International Business Machines CorporationInventors: Gordan G. Greenlee, Dennis Hartel, Joseph F. Riina, Richard E. Weingarten
-
Publication number: 20080282359Abstract: A method is provided to control access to a software application and, more particularly, to control access to a first software application using a second trusted application. The method comprises extracting data from a decrypted client request and determining a request type from the extracted data. The method further comprises ascertaining an entry type value from at least one of the extracted data and an entry and creating at least one string by prepending the entry type value to one or more attributes associated with the entry. Additionally, the method includes comparing the at least one string to one or more record entries to determine whether a client has permission to perform the request type.Type: ApplicationFiled: June 24, 2008Publication date: November 13, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean E. ASCHEN, Bahri B. Bali, Catherine Y. Barnes, Gordan G. Greenlee
-
Publication number: 20080222713Abstract: Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.Type: ApplicationFiled: February 27, 2008Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher E. Barnabo, Gordan G. Greenlee
-
Publication number: 20080133617Abstract: The present invention provides a change log handler than can accommodate a change log having an entry that includes more than one modification operation or multi-valued attributes. The change log handler typically includes a change parser for parsing change attributes corresponding to the change log that identify changes to the first data source. Such changes can include a plurality of modification operations as reflected in a single entry of the change log. The change log handler also includes a change reflector for applying the changes to a second data source.Type: ApplicationFiled: December 21, 2007Publication date: June 5, 2008Inventors: Bahri B. Bali, Gordan G. Greenlee