Patents by Inventor Hedley Proctor

Hedley Proctor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8990528
    Abstract: A computer system for fast format or reproducing data of a computer data storage device includes a computer system executing a reproducing process for reproducing data. A source disk (Ds) data storage device and a target disk (Dt) data storage device have data communication between each other and communicate with the computer system. The Ds data is reproducible to the Dt, and the Ds has blank regions with no data which corresponds to zero. The Ds having data regions and an intermediary flash copy map (D0) is generated by the program having all logical zeros for copying blank regions in the Ds to the Dt. The Ds is disengaged from reproducing after all data regions are copied from the Ds to the Dt. The reproducing of the Ds to the Dt continues after disengaging the Ds from the reproducing process by copying the zeros of the D0 to the Dt.
    Type: Grant
    Filed: January 6, 2009
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Cameron McAllister, Peter Eccles, Hedley Proctor, William James Scales
  • Patent number: 8589890
    Abstract: A system, method, computer program product, and program storage device for storing trace information of a program is disclosed. Upon entering or calling a subroutine, a memory buffer is created. Whenever a nested subroutine is called inside the subroutine, a subordinate memory buffer is created. Upon completion of a subroutine execution, a corresponding memory buffer is deleted. When encountering an event (e.g., an error, a defect, a failure, a warning) during execution, all data in currently existing memory buffers are transferred to a secondary memory storage device (e.g., a disk).
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Peter J. Eccles, Cameron J. McAllister, Hedley Proctor
  • Patent number: 8171339
    Abstract: Provided are a method, apparatus, and computer program product for testing a virtualized storage system. Data defining one or more configuration features of the virtualized storage system is received. Also received is a set of one or more predetermined rules defining interpretation of the disk exercising commands, the interpretation being dependent on one or more of the configuration features. A first disk exercising command is received. The first disk exercising command is interpreted in accordance with one of the predetermined rules to produce a second disk exercising command. The second disk exercising command is sent to the virtualized storage system.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: May 1, 2012
    Assignee: International Business Machines Corporation
    Inventors: Peter Eccles, Cameron James Mcallister, Hedley Proctor
  • Patent number: 8032568
    Abstract: A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: October 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: Joseph K. Chacko, Stephen Flavell, Hedley Proctor
  • Publication number: 20100174880
    Abstract: A computer system for fast format or reproducing data of a computer data storage device includes a computer system executing a reproducing process for reproducing data. A source disk (Ds) data storage device and a target disk (Dt) data storage device have data communication between each other and communicate with the computer system. The Ds data is reproducible to the Dt, and the Ds has blank regions with no data which corresponds to zero. The Ds having data regions and an intermediary flash copy map (D0) is generated by the program having all logical zeros for copying blank regions in the Ds to the Dt. The Ds is disengaged from reproducing after all data regions are copied from the Ds to the Dt. The reproducing of the Ds to the Dt continues after disengaging the Ds from the reproducing process by copying the zeros of the D0 to the Dt.
    Type: Application
    Filed: January 6, 2009
    Publication date: July 8, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cameron McAllister, Peter Eccles, Hedley Proctor, William James Scales
  • Publication number: 20090327373
    Abstract: A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joseph K. Chacko, Stephen Flavell, Hedley Proctor
  • Publication number: 20090300295
    Abstract: A system, method, computer program product, and program storage device for storing trace information of a program is disclosed. Upon entering or calling a subroutine, a memory buffer is created. Whenever a nested subroutine is called inside the subroutine, a subordinate memory buffer is created. Upon completion of a subroutine execution, a corresponding memory buffer is deleted. When encountering an event (e.g., an error, a defect, a failure, a warning) during execution, all data in currently existing memory buffers are transferred to a secondary memory storage device (e.g., a disk).
    Type: Application
    Filed: June 3, 2008
    Publication date: December 3, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter J. Eccles, Cameron J. McAllister, Hedley Proctor
  • Publication number: 20090300426
    Abstract: Provided are a method, apparatus, and computer program product for testing a virtualised storage system. Data defining one or more configuration features of the virtualised storage system is received. Also received is a set of one or more predetermined rules defining interpretation of the disk exercising commands, the interpretation being dependent on one or more of the configuration features. A first disk exercising command is received. The first disk exercising command is interpreted in accordance with one of the predetermined rules to produce a second disk exercising command. The second disk exercising command is sent to the virtualised storage system.
    Type: Application
    Filed: May 29, 2009
    Publication date: December 3, 2009
    Applicant: International Business Machines Corporation
    Inventors: Peter Eccles, Cameron James Mcallister, Hedley Proctor
  • Publication number: 20090254800
    Abstract: The present disclosure is a method for providing user-definitions of terms associated with a document. A method for providing user-definitions of terms may include providing a document, receiving text, receiving a request to define a term within the document, associating the user-provided definition of the term with the document, notifying the term includes the user-provided definition, receiving a request to view the user-provided definition, and displaying the definition to the remote user.
    Type: Application
    Filed: April 7, 2008
    Publication date: October 8, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joseph K. Chacko, Kevin Marsh, Hedley Proctor, Ian Burnett