Patents by Inventor Guerney Hunt

Guerney Hunt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220316978
    Abstract: A leak detection apparatus includes a test chamber and a vacuum source connected to the test chamber via a pneumatic line. A first pressure transducer is in communication with the test chamber. A controller is configured to collect and analyze data generated by the first pressure transducer at a predetermined frequency throughout an entire test cycle. The controller is also configured to convert specified collected data to logarithmic scale to accumulate a first set of data and apply a linear regression to the first set of data and determine regression parameters.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Applicant: Packaging Technologies and Inspection, LLC
    Inventors: Mikhail Kneller, Guerney Hunt
  • Publication number: 20070297350
    Abstract: The present invention provides systems, methods and apparatus for automatically provisioning and managing resources in a computing utility. Its automation procedures are based on a resource model which allows resource-specific provisioning and management tasks to be encapsulated into components for reuse. These components are assembled into more complex structures and finally computing services. This invention provides a method for constructing a computing service from a set of resources given a high level specification. Once constructed, the service includes a component that provides management function, which can allow modification of its underlying set of resources.
    Type: Application
    Filed: January 30, 2004
    Publication date: December 27, 2007
    Inventors: Tamar Eilam, Sandra Miller, Guerney Hunt
  • Publication number: 20060247944
    Abstract: Provision for scalable cleansing and value enhancement of data in the context of a multi-source multi-tenant data repository. The source data comes from multiple sources and on multiple topics. Evolutionarily tracked source data tags are used to hold tracking information reflecting the nature and sources of each change to the data, as it is affected during the various stages of data processing. The stages of processing include validation, normalization, single-source cleansing and cross-source processes. Various rules are applied during these stages, and evolutionarily tracked source data tags are used to record sources and agents of all changes to the data. As information is processed, transformed, and added to the repository, corresponding evolutionarily tracked source data tags are stored in association with the various information elements. The information contained in these tags can be used to enforce data entitlements in a multi-tenant data repository environment.
    Type: Application
    Filed: December 22, 2005
    Publication date: November 2, 2006
    Inventors: Edward Calusinski, Cornelius Crowley, Teresa Glasser, Jennifer Gromada, Max Hrabrov, Guerney Hunt, Kenneth Jones, Sugandh Mehta, Francis Parr, Aviv Orani
  • Publication number: 20060235715
    Abstract: A multi-source multi-tenant reference data utility and methods for forming and maintaining the same, delivering high quality reference data in response to requests from clients, implemented using a shared infrastructure, and also providing added value services using the client's reference data. Included are data cleansing and quality assurance of the received data with full tracking of the sourcing of each value, storage of resulting entity values in a repository which allows retrievals and enforces source based entitlements, and delivery of retrieved data in the form of on demand datasets supporting a wide range of client application needs. An advantageous implementation has additional services for reporting on data quality and usage, a selection of value adding data driven computations and business document storage.
    Type: Application
    Filed: December 22, 2005
    Publication date: October 19, 2006
    Inventors: Carl Abrams, Ronald Adinolfi, Edward Calusinski, Cornelius Crowley, Michael Fleming, Teresa Glasser, Jennifer Gromada, Max Hrabrov, Guerney Hunt, Kenneth Jones, Sugandh Mehta, Francis Parr, Aviv Orani, Matthew Rice
  • Publication number: 20060235714
    Abstract: A method, apparatus and software for responding to a request for an on demand dataset by configuring and then executing a workflow process tailored to the requester's needs. The generated workflow gathers identified information from a repository, organizes its format and delivers it to the requester. The on demand dataset request specification is structured to allow independent specification of (1) data to be included, (2) policy on which value sources to use; (3) delivery mode—including real-time, batched, and one-time query modes, (4) output format, and (5) delivery and communications protocols and other on demand dataset properties. This separation of concerns allows a wide variety of on demand data set requirements from different requesters to be met. Delivery of information from an outsourced multi-source multi-tenant data repository to its tenants is a context in which the method is useful.
    Type: Application
    Filed: December 22, 2005
    Publication date: October 19, 2006
    Inventors: Ronald Adinolfi, Edward Calusinski, Cornelius Crowley, Teresa Glasser, Jennifer Gromada, Max Hrabrov, Guerney Hunt, Sugandh Mehta, Francis Parr, Matthew Rice
  • Publication number: 20050283822
    Abstract: A system, apparatus and method for integrating policy-based technologies, including SLA management technologies, into an electronic utility (eUtility) infrastructure that supports automated provisioning of On Demand Service Environments (ODSEs) are provided. ODSEs embody the applications and computing resource services a subscribing customer requests. The system, apparatus and method augment the capabilities of eUtilities by defining the eUtilities in terms of policies that make them more customizable, and more responsive to the business objectives of the various parties that they serve.
    Type: Application
    Filed: June 9, 2005
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventors: Karen Appleby, Seraphin Calo, James Giles, Guerney Hunt, Kang-Won Lee
  • Publication number: 20050198641
    Abstract: Methods, apparatus and systems for controlling allocation and de-allocation of resources in a computing utility system, and evaluating resource assignments. Resources are dynamically allocated to customers of the computing utility through computing environments in such a way that a given objective is satisfied. Assignment of resources to environments is affected by relationships between computing environments which enable resource sharing, and constraints regarding assignment of resources to environment which limit resource sharing. The invention may be used over all of the environments in the utility or a selectable subset.
    Type: Application
    Filed: June 14, 2004
    Publication date: September 8, 2005
    Inventors: Tamar Eilam, Guerney Hunt, Sandra Miller, Lily Mummert
  • Publication number: 20050198244
    Abstract: The present invention is directed to provisioning and managing computing services in a computing utility system. It receives as an input an infrastructure independent description of a set of requirements on the new desired state of a computing service. It uses a knowledge plane to represent the infrastructure. The method generates a Concrete Model that describes a resource structure that refines the input and is implementable over the infrastructure. It then generates and possibly executes provisioning actions to create an identical resource structure on the infrastructure. The method can be used to create new computing services, to destroy existing computing services, to modify the resource combinations allocated to a computing service, or the configuration of these resources. Provisioning actions can be executed immediately, or saved and executed later, and possibly many times.
    Type: Application
    Filed: February 11, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Tamar Eilam, Liana Fong, Guerney Hunt, Michael Kalantar, Lily Mummert, John Pershing
  • Publication number: 20050177600
    Abstract: The present invention is directed to provisioning and managing computing services in a computing utility system. It receives a Concrete Resource Model describing a desired resource structure. It uses a representation of the infrastructure, including resources, configuration, capabilities and constraints, as a knowledge subsystem. The method generates and executes provisioning actions to affect the infrastructure resources by creating a resource structure that matches the description in the Concrete Resource Model and satisfies the requirements described in the input. The method can be used to create new computing services, to destroy existing computing services, to modify the resource combination allocated to a computing service, or the configuration of these resources. Provisioning actions, generated, can be executed immediately, or saved and executed later, and possibly many times.
    Type: Application
    Filed: February 11, 2004
    Publication date: August 11, 2005
    Applicant: International Business Machines Corporation
    Inventors: Tamar Eilam, Liana Fong, Guerney Hunt, Michael Kalantar, Lily Mummert, John Pershing
  • Publication number: 20050049884
    Abstract: A method, system, and computer program for managing multi-tiered resource systems, such as Storage Area Networks (SANs). Resource tiers in the resource system are examined to if they are in compliance with a management policy. If a resource tier is not in compliance with the management policy, a processing operation automatically attempts to bring the resource tier in compliance with the management policy. The management policy may, for example, include a requirement that an expiration date of the resource tier occur after a maintenance date.
    Type: Application
    Filed: August 26, 2003
    Publication date: March 3, 2005
    Inventors: Guerney Hunt, Lily Mummert, William Pope