Patents by Inventor Gregory R. Hintermeister
Gregory R. Hintermeister has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11900173Abstract: A method, system, and computer program product for implementing container runtime optimization and execution is provided. The method includes enabling a container management instance and a container runtime comprising specified operational attributes associated with a container. Supervisor tree code is embedded within the container runtime and definition software is executed. The definition software describes specified digital endpoints of an associated application process being executed by the container. The container is enabled for operational functionality and an external interface is enabled for communications with the supervisor tree code. The container management instance is executed in response to a command received via the external interface.Type: GrantFiled: May 18, 2021Date of Patent: February 13, 2024Assignee: Kyndryl, Inc.Inventors: Jeremy Caine, Robert Brodie, Gregory R. Hintermeister, Francis Yew Hong Lee
-
Patent number: 11841961Abstract: A method can include receiving a read request from a client program. The method can further include obtaining, in response to receiving the read request, one or more secrets from a secrets store. The obtaining can include storing the one or more secrets in a storage location. The method can further include initiating, in response to the read request, a transmission of the one or more secrets to the client program. The method can further include deleting the one or more secrets from the storage location.Type: GrantFiled: July 2, 2020Date of Patent: December 12, 2023Assignee: International Business Machines CorporationInventors: Rob Brodie, John William Alcorn, Jeremy Caine, Gregory R. Hintermeister, Max Veit
-
Publication number: 20230359974Abstract: A computer-implemented method, including: analyzing, by a computing device, historical information associated with a business application; determining, by the computing device, a business process based on the analyzed historical information; generating, by the computing device, a virtual reality simulation of the business process; identifying, by the computing device, a business application requirement based on a user interaction with the virtual reality simulation; and generating, by the computing device, the ad-hoc application based on the identified business application requirement.Type: ApplicationFiled: May 6, 2022Publication date: November 9, 2023Inventors: Gregory R. Hintermeister, Chris Moss, Bryan M Buckland
-
Publication number: 20230342284Abstract: In an approach to improve implementing program code modifications within a predetermined system embodiments simulate an impact of an implemented modification to a software code against one or more predetermined constraints using a target environment. Further, embodiments comparing a first executed simulation against a second executed simulation of the software code, wherein the second executed simulation comprises the implemented modifications and a current version of the software code. Additionally, embodiments, generate guidance for a user based on the comparison of the first and second executed simulations, wherein the generated guidance comprises positive and negative impacts of the implemented software code modifications regarding compliance with the one or more predetermined constraints, and output, by a user interface, the generated guidance to the user detailing the impact of the implemented modification.Type: ApplicationFiled: April 26, 2022Publication date: October 26, 2023Inventors: John Paul Easton, Gregory R. Hintermeister, Karri Carlson-Neumann, Zoe Clements, Vishal Anand
-
Publication number: 20220374282Abstract: A method, system, and computer program product for implementing container runtime optimization and execution is provided. The method includes enabling a container management instance and a container runtime comprising specified operational attributes associated with a container. Supervisor tree code is embedded within the container runtime and definition software is executed. The definition software describes specified digital endpoints of an associated application process being executed by the container. The container is enabled for operational functionality and an external interface is enabled for communications with the supervisor tree code. The container management instance is executed in response to a command received via the external interface.Type: ApplicationFiled: May 18, 2021Publication date: November 24, 2022Inventors: Jeremy Caine, Robert Brodie, Gregory R. Hintermeister, Francis Yew Hong Lee
-
Patent number: 11360946Abstract: An example operation may include one or more of connecting, by a data owner node, to a blockchain network that includes a plurality of storage provider peer nodes associated with a plurality of cloud storage providers, selecting, by the data owner node, storage provider peer nodes of the plurality of the storage provider peer nodes to be approved storage location member nodes, and executing, by the data owner node, a smart contract to: store data on the cloud storage providers of the plurality of the cloud storage providers associated with the approved storage location member nodes, and record movement of the data to the cloud storage providers on the blockchain.Type: GrantFiled: May 17, 2019Date of Patent: June 14, 2022Assignee: International Business Machines CorporationInventors: Gregory R. Hintermeister, Michael A. Kaczmarski, Thomas K. Clark
-
Patent number: 11226845Abstract: Techniques for refreshing application instances periodically based on a refresh rate parameter, providing enhanced health and stability for instances actively executing workloads. When a workload is received requesting one or more application instance(s), a refresh rate is determined, and the instance(s) are monitored. Periodically, based on the refresh rate, the monitored application instance(s) are refreshed. One or more instance(s) are identified for refreshing, one or more new replacement instance(s) are generated, and the identified instances are removed from active service and decommissioned. Workloads continue execution upon the newly generated instances, which are in turn monitored and refreshed as dictated by the refresh rate.Type: GrantFiled: February 13, 2020Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Gregory R. Hintermeister, Sanjay Joshi, Roland Barcia
-
Publication number: 20220004651Abstract: A method can include receiving a read request from a client program. The method can further include obtaining, in response to receiving the read request, one or more secrets from a secrets store. The obtaining can include storing the one or more secrets in a storage location. The method can further include initiating, in response to the read request, a transmission of the one or more secrets to the client program. The method can further include deleting the one or more secrets from the storage location.Type: ApplicationFiled: July 2, 2020Publication date: January 6, 2022Inventors: Rob Brodie, John William Alcorn, Jeremy Caine, Gregory R. Hintermeister, Max Veit
-
Publication number: 20210255901Abstract: Techniques for refreshing application instances periodically based on a refresh rate parameter, providing enhanced health and stability for instances actively executing workloads. When a workload is received requesting one or more application instance(s), a refresh rate is determined, and the instance(s) are monitored. Periodically, based on the refresh rate, the monitored application instance(s) are refreshed. One or more instance(s) are identified for refreshing, one or more new replacement instance(s) are generated, and the identified instances are removed from active service and decommissioned. Workloads continue execution upon the newly generated instances, which are in turn monitored and refreshed as dictated by the refresh rate.Type: ApplicationFiled: February 13, 2020Publication date: August 19, 2021Inventors: Gregory R. Hintermeister, Sanjay Joshi, Roland Barcia
-
Patent number: 10929051Abstract: A method includes obtaining, by a computing entity of a multi-cloud dispersed storage network (DSN) system, a multi-cloud storage request to write a data object to the multi-cloud DSN system from a requester. The method further includes sending, by the computing entity, the multi-cloud storage request to a data director module. The method further includes determining a multi-cloud storage scheme to execute the multi-cloud storage request, executing the multi-cloud storage scheme to store the data object in a set of two or more cloud storage systems, generating an index regarding the storage of the data object, and notifying the requester of an estimated response time of the set of two or more cloud storage systems. The method further includes monitoring the performance information of the set of two or more cloud storage systems and data object usage information of the data object to determine a multi-cloud storage performance level.Type: GrantFiled: May 31, 2019Date of Patent: February 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Gregory R. Hintermeister
-
Patent number: 10908897Abstract: Provided are a computer program product, system, and method for distributing services to client systems to develop in a shared development environment. A first service is deployed to the first client system to develop the first service. A second service is deployed to the second client system to develop the second service. A call is received from the first service, executing in the first client system as part of development of the first service, to the second service. A determination is made as to whether the second service is deployed at the second client system and available in response to the call from the first service. A response is generated to the call to the second service from a component in the shared development environment in response to determining that the second service is deployed at the second client system and not available.Type: GrantFiled: November 27, 2018Date of Patent: February 2, 2021Assignee: International Business Machines CorporationInventors: Gregory R. Hintermeister, John W. Alcorn, Eric N. Herness, David Currie
-
Publication number: 20200379644Abstract: A method includes obtaining, by a computing entity of a multi-cloud dispersed storage network (DSN) system, a multi-cloud storage request to write a data object to the multi-cloud DSN system from a requester. The method further includes sending, by the computing entity, the multi-cloud storage request to a data director module. The method further includes determining a multi-cloud storage scheme to execute the multi-cloud storage request, executing the multi-cloud storage scheme to store the data object in a set of two or more cloud storage systems, generating an index regarding the storage of the data object, and notifying the requester of an estimated response time of the set of two or more cloud storage systems. The method further includes monitoring the performance information of the set of two or more cloud storage systems and data object usage information of the data object to determine a multi-cloud storage performance level.Type: ApplicationFiled: May 31, 2019Publication date: December 3, 2020Inventor: Gregory R. Hintermeister
-
Publication number: 20200364188Abstract: An example operation may include one or more of connecting, by a data owner node, to a blockchain network that includes a plurality of storage provider peer nodes associated with a plurality of cloud storage providers, selecting, by the data owner node, storage provider peer nodes of the plurality of the storage provider peer nodes to be approved storage location member nodes, and executing, by the data owner node, a smart contract to: store data on the cloud storage providers of the plurality of the cloud storage providers associated with the approved storage location member nodes, and record movement of the data to the cloud storage providers on the blockchain.Type: ApplicationFiled: May 17, 2019Publication date: November 19, 2020Inventors: Gregory R. Hintermeister, Michael A. Kaczmarski, Thomas K. Clark
-
Patent number: 10841188Abstract: A computer-implemented method includes processing a tagged data unit (TDU) by reading a metadata tag of a received TDU and determining whether the TDU is an excluded TDU or an included TDU. An included TDU is a TDU that is to be included in usage summary information contained in a usage receiver (UR) record. An excluded TDU is a TDU that is not to be included in the usage summary information. Responsive to determining that the TDU is an included TDU, the method includes the information related to the TDU into the usage summary information. Responsive to determining that the TDU is an excluded TDU, the method excludes the information related to the excluded TDU from the usage summary information. Reportable usage summary information is generated from information in the UR record, and, once a reporting criterion is met, the reportable usage summary information is transmitted to the UR.Type: GrantFiled: March 25, 2019Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventor: Gregory R. Hintermeister
-
Publication number: 20200313987Abstract: A computer-implemented method includes processing a tagged data unit (TDU) by reading a metadata tag of a received TDU and determining whether the TDU is an excluded TDU or an included TDU. An included TDU is a TDU that is to be included in usage summary information contained in a usage receiver (UR) record. An excluded TDU is a TDU that is not to be included in the usage summary information. Responsive to determining that the TDU is an included TDU, the method includes the information related to the TDU into the usage summary information. Responsive to determining that the TDU is an excluded TDU, the method excludes the information related to the excluded TDU from the usage summary information. Reportable usage summary information is generated from information in the UR record, and, once a reporting criterion is met, the reportable usage summary information is transmitted to the UR.Type: ApplicationFiled: March 25, 2019Publication date: October 1, 2020Inventor: Gregory R. Hintermeister
-
Publication number: 20200312145Abstract: A method for operating a vehicle system component may utilize a processor to receive initial information related to a user of a vehicle, and send, to a user device having a unique identifier, an invitation to connect to the vehicle system component to establish a private two-way communication channel for a personal conversation between the user device and a bot associated with the vehicle. The processor may receive an acceptance of the invitation, responsive to receipt of the acceptance, create the bot, and establish a private two-way communication channel between the user device and the bot. The processor may then send, from the bot to the user, information that is responsive to received user information over the private two-way communication channel. The processor may terminate the bot and the private two-way communication channel according to a termination criterion.Type: ApplicationFiled: March 26, 2019Publication date: October 1, 2020Inventor: Gregory R. Hintermeister
-
Patent number: 10755631Abstract: Aspects of the present disclosure relate to display region filtering. A pixel priority value for each of a plurality of pixels on a display region are assigned in response to identifying portions of the display region for prioritization, wherein the pixel priority values indicate a relative importance of each of the pixels, respectively, for viewing based on a magnitude of the pixel priority values. The pixel priority value of each pixel is compared to a first pixel priority threshold to identify pixels of the plurality of pixels having pixel priority values which do not satisfy the first pixel priority threshold. The pixels of the plurality of pixels having pixel priority values which do not satisfy the first pixel priority threshold are deactivated, wherein a subset of pixels satisfies the first pixel priority threshold and remain active.Type: GrantFiled: July 16, 2019Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventor: Gregory R. Hintermeister
-
Patent number: 10672330Abstract: Aspects of the present disclosure relate to display region filtering. A pixel priority value for each of a plurality of pixels on a display region are assigned in response to identifying portions of the display region for prioritization, wherein the pixel priority values indicate a relative importance of each of the pixels, respectively, for viewing based on a magnitude of the pixel priority values. The pixel priority value of each pixel is compared to a first pixel priority threshold to identify pixels of the plurality of pixels having pixel priority values which do not satisfy the first pixel priority threshold. The pixels of the plurality of pixels having pixel priority values which do not satisfy the first pixel priority threshold are deactivated, wherein a subset of pixels satisfies the first pixel priority threshold and remain active.Type: GrantFiled: May 14, 2018Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventor: Gregory R. Hintermeister
-
Patent number: 10674557Abstract: A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status changing event of the wireless technology device, locking the wireless technology device from an unauthorized pairing with another device, in response to detecting the status changing event, sending an encrypted data regarding the status changing event to at least one non-paired device, which is received in a buffer of the at least one non-paired device, wherein, in response to receiving the encrypted data, the at least one non-paired device automatically communicates the encrypted data to a centralized computing network for decrypting the encrypted data, and unlocking the wireless technology device when an authorized pairing attempt is successful.Type: GrantFiled: January 31, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Gregory R. Hintermeister, Matthew G. Kelm
-
Publication number: 20200167157Abstract: Provided are a computer program product, system, and method for distributing services to client systems to develop in a shared development environment. A first service is deployed to the first client system to develop the first service. A second service is deployed to the second client system to develop the second service. A call is received from the first service, executing in the first client system as part of development of the first service, to the second service. A determination is made as to whether the second service is deployed at the second client system and available in response to the call from the first service. A response is generated to the call to the second service from a component in the shared development environment in response to determining that the second service is deployed at the second client system and not available.Type: ApplicationFiled: November 27, 2018Publication date: May 28, 2020Inventors: Gregory R. HINTERMEISTER, John W. ALCORN, Eric N. HERNESS, David CURRIE