Patents by Inventor Ian N. Whalley
Ian N. Whalley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9628401Abstract: A system, method and computer program product for detecting data omissions between intermittently-connected devices. An example system includes physical computing resources available for utilization. A placement server communicates with a client. The client seeks to use a portion of the computer resources to execute the software product instances. The placement server receives resource utilization parameters from the client and assigns the portion of the computer resources to the software product instances based on the resource utilization parameters and the physical computing resources available for utilization. The resource utilization parameters include specification of a hierarchal arrangement of the software product instances.Type: GrantFiled: September 26, 2013Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Malgorzata Steinder, Ian N. Whalley
-
Patent number: 9628399Abstract: A system, method and computer program product for detecting data omissions between intermittently-connected devices. An example system includes physical computing resources available for utilization. A placement server communicates with a client. The client seeks to use a portion of the computer resources to execute the software product instances. The placement server receives resource utilization parameters from the client and assigns the portion of the computer resources to the software product instances based on the resource utilization parameters and the physical computing resources available for utilization. The resource utilization parameters include specification of a hierarchal arrangement of the software product instances.Type: GrantFiled: March 14, 2013Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Malgorzata Steinder, Ian N. Whalley
-
Patent number: 9038065Abstract: A technique is provided for creating virtual units in a computing environment. A virtual system definition is received by a processor that is utilized to create the virtual units for a virtual system. Relationship constraints between the virtual units in the virtual system are received by the processor. The relationship constraints between the virtual units include a communication link requirement between the virtual units and/or a location requirement between the virtual units. The virtual units in the virtual system are deployed by the processor according to the relationship constraints between virtual units.Type: GrantFiled: January 30, 2012Date of Patent: May 19, 2015Assignee: International Business Machines CorporationInventors: Diana J. Arroyo, Claris Castillo, James E. Hanson, Wolfgang Segmuller, Michael J. Spreitzer, Malgorzata Steinder, Asser N. Tantawi, Ian N. Whalley
-
Patent number: 9037717Abstract: A method for use in a system in which computational entities are distributed across physical computing resources to place the entities on the resources includes estimating actual resource demand for each entity on each resource based on application resource usage data collected from a data source external from the entity, computing a best allocation of the resources to the entities from the estimated actual resource demand for each entity and distributing the resources to the entities in accordance with the computed best allocation.Type: GrantFiled: September 21, 2009Date of Patent: May 19, 2015Assignee: International Business Machines CorporationInventors: Isci Canturk, James E. Hanson, Jeffrey O. Kephart, Malgorzata Steinder, Ian N. Whalley
-
Publication number: 20140280951Abstract: A system, method and computer program product for detecting data omissions between intermittently-connected devices. An example system includes physical computing resources available for utilization. A placement server communicates with a client. The client seeks to use a portion of the computer resources to execute the software product instances. The placement server receives resource utilization parameters from the client and assigns the portion of the computer resources to the software product instances based on the resource utilization parameters and the physical computing resources available for utilization. The resource utilization parameters include specification of a hierarchal arrangement of the software product instances.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Malgorzata Steinder, Ian N. Whalley
-
Publication number: 20140280965Abstract: A system, method and computer program product for detecting data omissions between intermittently-connected devices. An example system includes physical computing resources available for utilization. A placement server communicates with a client. The client seeks to use a portion of the computer resources to execute the software product instances. The placement server receives resource utilization parameters from the client and assigns the portion of the computer resources to the software product instances based on the resource utilization parameters and the physical computing resources available for utilization. The resource utilization parameters include specification of a hierarchal arrangement of the software product instances.Type: ApplicationFiled: September 26, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Malgorzata Steinder, Ian N. Whalley
-
Patent number: 8539192Abstract: A method, system and computer program product for storing data in memory. An example system includes at least one multistage application configured to generate intermediate data in a generating stage of the application and consume the intermediate data in a subsequent consuming stage of the application. A runtime profiler is configured to monitor the application's execution and dynamically allocate memory to the application from an in-memory data grid.Type: GrantFiled: January 8, 2010Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Claris Castillo, Michael J. Spreitzer, Malgorzata Steinder, Ian N. Whalley
-
Patent number: 8539222Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: GrantFiled: February 28, 2012Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Publication number: 20130198740Abstract: A technique is provided for creating virtual units in a computing environment. A virtual system definition is received by a processor that is utilized to create the virtual units for a virtual system. Relationship constraints between the virtual units in the virtual system are received by the processor. The relationship constraints between the virtual units include a communication link requirement between the virtual units and/or a location requirement between the virtual units. The virtual units in the virtual system are deployed by the processor according to the relationship constraints between virtual units.Type: ApplicationFiled: January 30, 2012Publication date: August 1, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Diana J. Arroyo, Claris Castillo, James E. Hanson, Wolfgang Segmuller, Michael J. Spreitzer, Malgorzata Steinder, Asser N. Tantawi, Ian N. Whalley
-
Patent number: 8495356Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: GrantFiled: December 31, 2010Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Patent number: 8458694Abstract: A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.Type: GrantFiled: April 30, 2007Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: David M. Chess, Sean L. Dague, Ronald T. Goering, Hidayatullah H. Shaikh, Ian N. Whalley, Steve R. White, Jian Yin
-
Patent number: 8346911Abstract: A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.Type: GrantFiled: March 17, 2006Date of Patent: January 1, 2013Assignee: International Business Machines CorporationInventors: David M. Chess, Sophia Krasikov, David W. Levine, John F. Morar, Edward J. Pring, Alla Segal, Ian N. Whalley
-
Publication number: 20120317039Abstract: On-demand purchase of one or more virtual image licenses when a requested virtual image placement into a cloud computing environment is (or will be) denied because sufficient license capacity is not currently available with existing licenses. Particular users are authorized in advance for on-demand purchase of new licenses for virtual image placement, and the purchase for such users occurs automatically upon detecting that the enterprise for which the placement is requested does not have sufficient license capacity. If the user requesting the placement is not authorized for on-demand license purchase, a purchase request is preferably sent automatically to a license administrator with the needed purchase authority, and the placement request is queued and then subsequently restarted when the license purchase completes.Type: ApplicationFiled: June 11, 2011Publication date: December 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Todd E. Kaplinger, Aaron K. Shook, Ian N. Whalley
-
Publication number: 20120173871Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: ApplicationFiled: February 28, 2012Publication date: July 5, 2012Applicant: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Publication number: 20120173866Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: ApplicationFiled: December 31, 2010Publication date: July 5, 2012Applicant: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Patent number: 8140812Abstract: Techniques for placement of a virtual machine in a computing system. A first request is sent from a pool management subsystem to a placement subsystem. The first request includes specification of available storage capacities of storage systems in a computer network. The placement subsystem automatically determines a target storage system based, at least in part, on the available storage capacities. An identification of the target storage system is received at the pool management subsystem. At least one disk image of the virtual machine is written to the target storage system. Then, a second request is sent to the placement subsystem. The placement subsystem automatically determines a target computer. The latter determination is based, at least in part, on connectivity between the target computer and the target storage system. The virtual machine is installed at the target computer. The techniques facilitate live migration of virtual machines placed thereby.Type: GrantFiled: July 1, 2009Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Diana J. Arroyo, Steven D. Clay, Malgorzata Steinder, Ian N. Whalley, Brian L. White Eagle
-
Publication number: 20110296429Abstract: A management system and method for a virtualized environment includes a computer entity having a usage limitation based on an entitlement. A resource manager, using a processor and programmed on and executed from a memory storage device, is configured to manage resources in a virtualized environment. An entitlement-usage module is coupled to the resource manager and is configured to track entitlement-related constraints in accordance with changes in the virtualized environment to permit the resource manager to make allocation decisions which include the entitlement-related constraints to ensure that the usage limitation is met for the computer entity.Type: ApplicationFiled: June 1, 2010Publication date: December 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: WOLFGANG SEGMULLER, Malgorzata Steinder, Ian N. Whalley
-
Patent number: 7996905Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.Type: GrantFiled: April 3, 2008Date of Patent: August 9, 2011Assignee: Trend Micro IncorporatedInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Publication number: 20110173245Abstract: A method, system and computer program product for distributing intermediate data of a multistage computer application to a plurality of computers. In one embodiment, a data manager calculates data usage demand of generated intermediate data. A computer manager calculates a computer usage, which is the sum of all data usage demand of each stored intermediate data at the computer. A scheduler selects a target computer from the plurality of computers for storage of the generated intermediate data at such that a variance of the computer usage demand across the plurality of computers is minimized.Type: ApplicationFiled: January 8, 2010Publication date: July 14, 2011Applicant: International Business Machines CorporationInventors: Claris Castillo, Michael J. Spreitzer, Malgorzata Steinder, Asser N. Tantawi, Ian N. Whalley
-
Publication number: 20110173410Abstract: A method, system and computer program product for storing data in memory. An example system includes at least one multistage application configured to generate intermediate data in a generating stage of the application and consume the intermediate data in a subsequent consuming stage of the application. A runtime profiler is configured to monitor the application's execution and dynamically allocate memory to the application from an in-memory data grid.Type: ApplicationFiled: January 8, 2010Publication date: July 14, 2011Applicant: International Business Machines CorporationInventors: Claris Castillo, Michael J. Spreitzer, Malgorzata Steinder, Ian N. Whalley