Patents by Inventor James M. Bonanno
James M. Bonanno has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10649748Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: GrantFiled: April 3, 2017Date of Patent: May 12, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
-
Publication number: 20170206067Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: ApplicationFiled: April 3, 2017Publication date: July 20, 2017Inventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
-
Patent number: 9626167Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: GrantFiled: August 28, 2013Date of Patent: April 18, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
-
Publication number: 20140033186Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: ApplicationFiled: August 28, 2013Publication date: January 30, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
-
Patent number: 8468124Abstract: Some embodiments of the inventive subject matter are directed to a debugging system (“system”) configured to access a work flow document. The workflow document may include references to flow activities connected by flow connectors, forming a workflow path. Some of the flow connectors may have breakpoints. The debugging system can insert command instructions for a hypertext transfer protocol (HTTP) request into the workflow document at locations associated with the flow connectors and initiate a test run of the workflow path. In some embodiments, during the test run, when one of the flow connectors is reached, the system executes the command instructions for the HTTP request, sending the HTTP request to a debugger application (“debugger”). If a breakpoint is associated with the flow connector, the debugger can delay response to the HTTP request, otherwise the debugger can respond immediately. A user can debug the workflow document during the delay.Type: GrantFiled: June 30, 2010Date of Patent: June 18, 2013Assignee: International Business Machines CorporationInventors: James M. Bonanno, Steven D. Ims, Todd E. Kaplinger, Aaron J. Tarter
-
Patent number: 8381281Abstract: A computer implemented method, system, and computer program product for authenticating a remote host to a firewall. The illustrative embodiments allow a requesting host separated from a target host by a firewall to determine, based on exception handling code, that an original request sent to the target host has been intercepted and blocked by the firewall. The illustrative embodiments also allow the requesting host to automatically provide credentials that authenticate the requesting host to the firewall. The illustrative embodiments are particularly applicable in situations when requests are invoked without any user interaction, such as when a timer expires. In such a case, there is no user to provide the needed credentials to authenticate the requesting host. The illustrative embodiments enable a requesting host to access a target host without requiring user intervention.Type: GrantFiled: April 7, 2010Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: James M. Bonanno, Steven D. Ims, Todd E. Kaplinger, Aaron J. Tarter
-
Publication number: 20120005659Abstract: Some embodiments of the inventive subject matter are directed to a debugging system (“system”) configured to access a work flow document. The workflow document may include references to flow activities connected by flow connectors, forming a workflow path. Some of the flow connectors may have breakpoints. The debugging system can insert command instructions for a hypertext transfer protocol (HTTP) request into the workflow document at locations associated with the flow connectors and initiate a test run of the workflow path. In some embodiments, during the test run, when one of the flow connectors is reached, the system executes the command instructions for the HTTP request, sending the HTTP request to a debugger application (“debugger”). If a breakpoint is associated with the flow connector, the debugger can delay response to the HTTP request, otherwise the debugger can respond immediately. A user can debug the workflow document during the delay.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Applicant: International Business Machines CorporationInventors: James M. Bonanno, Steven D. Ims, Todd E. Kaplinger, Aaron J. Tarter
-
Publication number: 20110252462Abstract: A computer implemented method, system, and computer program product for authenticating a remote host to a firewall. The illustrative embodiments allow a requesting host separated from a target host by a firewall to determine, based on exception handling code, that an original request sent to the target host has been intercepted and blocked by the firewall. The illustrative embodiments also allow the requesting host to automatically provide credentials that authenticate the requesting host to the firewall. The illustrative embodiments are particularly applicable in situations when requests are invoked without any user interaction, such as when a timer expires. In such a case, there is no user to provide the needed credentials to authenticate the requesting host. The illustrative embodiments enable a requesting host to access a target host without requiring user intervention.Type: ApplicationFiled: April 7, 2010Publication date: October 13, 2011Applicant: International Business Machines CorporationInventors: James M. Bonanno, Steven D. Ims, Todd E. Kaplinger, Aaron J. Tarter
-
Publication number: 20100050156Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: ApplicationFiled: August 20, 2008Publication date: February 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter