Patents by Inventor Jason L. Peipelman

Jason L. Peipelman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9823848
    Abstract: A system to configure a storage library, by a processor. A first storage library comprising a plurality of host adapters, a data cache, and a plurality of device adapters is supplied. The first storage library is in communication via fiber channel with a storage area network comprising a storage virtual controller, and the storage area network comprises a configuration library. The storage area network is in communication with a host computer comprising a command line interface and an application. The host adapter, data cache, and device adapter is logically configured using a plurality of logical configuration commands created using the host computer and the command line interface. The plurality of logical configuration commands are added to the configuration library and saved for later use.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: November 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9819659
    Abstract: Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: November 14, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Jason L. Peipelman, Joshua M. Rhoades, Matthew J. Ward
  • Publication number: 20170300244
    Abstract: A method for accelerating recovery in a data replication environment includes maintaining a secondary out-of-sync bitmap for a secondary volume. The secondary out-of-sync bitmap indicates which storage elements on the secondary volume are not synchronized with storage elements on a primary volume. The method further generates, for the primary volume, a tracking bitmap indicating which storage elements on the primary volume need to be updated with data from the secondary volume. This tracking bitmap is initialized with values from the secondary out-of-sync bitmap. Upon receiving a write from the secondary volume to a storage element on the primary volume, the method resets the corresponding bit in the tracking bitmap. Upon receiving a write from a host system to a storage element on the primary volume, the method also resets the corresponding bit in the tracking bitmap. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: April 14, 2016
    Publication date: October 19, 2017
    Applicant: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9767035
    Abstract: A command to write data to a virtual location is received at a disk storage system. The virtual location is mapped to a tape storage system. A record is generated including the data, the virtual location, and a sequence value. The sequence value indicates relative sequence when compared to other sequence values. The record is written to a record location on a tape cartridge loaded in a tape drive. Record metadata on the disk storage system is modified to indicate that the first record location contains the first record. The data on the record can be read from the tape cartridge.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: September 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170228165
    Abstract: A system to configure a storage library, by a processor. A first storage library comprising a plurality of host adapters, a data cache, and a plurality of device adapters is supplied. The first storage library is in communication via fibre channel with a storage area network comprising a storage virtual controller, and the storage area network comprises a configuration library. The storage area network is in communication with a host computer comprising a command line interface and an application. The host adapter, data cache, and device adapter is logically configured using a plurality of logical configuration commands created using the host computer and the command line interface. The plurality of logical configuration commands are added to the configuration library and saved for later use.
    Type: Application
    Filed: April 24, 2017
    Publication date: August 10, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mario F. ACEDO, Ezequiel CERVANTES, Paul A. JENNAS, II, Jason L. PEIPELMAN, Matthew J. WARD
  • Publication number: 20170207913
    Abstract: Various embodiments for encryption enablement in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises managing each step of an encryption key creation process for a computer storage system using an automated wizard by interactively sensing inserted access key hardware and providing a real-time progress and error report of the encryption key creation process.
    Type: Application
    Filed: January 15, 2016
    Publication date: July 20, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elizabeth Mitchell, Jason L. Peipelman, Chris Zukowski
  • Publication number: 20170199683
    Abstract: Systems, methods, and computer program products for autonomously obtaining configuration information and configuring a storage system for virtualization are disclosed. Configuring virtualization of a storage system may include: creating a storage pool for each array designated by an administrator for virtualization; creating one or more volumes for each storage pool; creating or selecting a volume controller designated by the administrator for hosting virtualization; identifying one or more ports of the volume controller; and mapping the one or more volumes to the one or more ports of the volume controller. Configuration information obtained may include designation of one or more arrays available to a storage system to which virtualization should be applied; designation of either an existing volume controller or a new volume controller and new volume controller name; and/or a confirmation, a negation, or a modification of one or more port identifiers.
    Type: Application
    Filed: January 11, 2016
    Publication date: July 13, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, David M. Sedgwick, Matthew J. Ward
  • Publication number: 20170161190
    Abstract: Embodiments for an approach to resource optimization during consistency group formation associated with a global mirror environment is provided. The approach detects when a primary volume associated with the consistency group has completed transmitting its out-of-sync (OOS) data towards its associated secondary volume. A command is sent to create a next consistency group sidefile so further writes can be sent to the sidefile rather than queueing at the primary volume. The approach repeats this process for each primary volume associated with the global mirror environment until all primary volumes are complete. Commands are sent to disable writes to the associated sidefiles and to merge the data stored in the sidefiles into normal cache as the next consistency group becomes the current consistency group.
    Type: Application
    Filed: February 16, 2016
    Publication date: June 8, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170160930
    Abstract: Embodiments for an approach to resource optimization during consistency group formation associated with a global mirror environment is provided. The approach detects when a primary volume associated with the consistency group has completed transmitting its out-of-sync (OOS) data towards its associated secondary volume. A command is sent to create a next consistency group sidefile so further writes can be sent to the sidefile rather than queueing at the primary volume. The approach repeats this process for each primary volume associated with the global mirror environment until all primary volumes are complete. Commands are sent to disable writes to the associated sidefiles and to merge the data stored in the sidefiles into normal cache as the next consistency group becomes the current consistency group.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 8, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9665308
    Abstract: A command is received to copy a first extent in a source volume to a second extent in a target volume, wherein the source volume and the target volume are in a copy relationship. In response to determining that it takes longer to copy all changed data of the first extent to the second extent than to copy all of the changed data of the first extent to a third extent and to copy all other data from the second extent to the third extent, operations are performed to copy all of the changed data of from the first extent to the third extent and to copy all of the other data from the second extent to the third extent. Operations are also performed to assign the third extent to replace the second extent in the target volume.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: May 30, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170147236
    Abstract: A computer-implemented method includes: detecting a read access to one or more data tracks of a target data storage module; and setting a value of one or more bits in response to detecting the read access to the one or more data tracks, each of the one or more bits being associated with one of the one or more data tracks. The value of the one or more bits is set to a value configured to prevent a copy-on-write operation being applied to the one or more data tracks to which the read access was detected. Corresponding systems and computer program products are similarly disclosed, all of which advantageously improve storage system performance by reducing I/O bandwidth via preventing unnecessary copy operations.
    Type: Application
    Filed: February 6, 2017
    Publication date: May 25, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170116233
    Abstract: A data storage subsystem having a plurality of data compression engines configured to compress data, each having a different compression algorithm. A data handling system is configured to determine a present rate of access to data; select at least one sample of data; determine the greatest degree of compression of said data compression engines; determine the compression ratios of the operated data compression engines with respect to the selected sample(s); compressing said selected at least one sample with a plurality of said data compression engines at said selected tier; operate a selected data compression engines with respect to the selected sample and determine the greatest degree of compression of the data compression engines; compress the data from which the sample was selected with one of the operated data compression engines determined to have the greatest degree of compression; and store the compressed data in data storage repositories.
    Type: Application
    Filed: January 5, 2017
    Publication date: April 27, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael R. GROSECLOSE, Larry JUAREZ, David MONTGOMERY, Jason L. PEIPELMAN, Joshua M. RHOADES
  • Publication number: 20170109045
    Abstract: In one aspect, a storage management system of a storage controller having a set of processor nodes, in response to a request by a user to add a storage pool to the storage system, adds a set of subpools of storage, one for each processor node of the storage controller. The resultant storage capacity is the combination of the individual storage capacities of each subpool of the set of storage subpools. Accordingly, each subpool of the set is automatically assigned to a different processor node. In this manner, the user may be relieved of the task of manually assigning storage pools to processor nodes. In addition, load balancing between the processor nodes may be facilitated. Other aspects and features are described herein.
    Type: Application
    Filed: October 19, 2015
    Publication date: April 20, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170109052
    Abstract: In one aspect, a multiple mode data structure can be utilized by a storage management system to provide a host representation role in one mode, and represent both a host and a host port in another mode. In one embodiment, in a first mode, the data structure has an undefined host port name attribute and a defined host name attribute to represent a host identified by the defined host name attribute. In the first mode, the data structure is restricted from representing a host port in the storage management system when the host port name attribute is undefined. In a second, unrestricted mode, the multiple mode data structure can represent both a host as well as a host port when a host port name attribute is defined. In one embodiment, the multiple mode data structure can also represent a host cluster. Other aspects are described.
    Type: Application
    Filed: October 19, 2015
    Publication date: April 20, 2017
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20170109100
    Abstract: In a storage management interface to manage host ports in a computing system having a server and one or more hosts, a user interface is provided to facilitate assigning host ports to an associated host. In one embodiment, the user interface detects unassigned host ports which have not been identified as being assigned to an associated host, and generates a graphical user interface (GUI) page indicating unassigned host ports. User selection of at least one of the unassigned host ports indicated in the GUI page is received as well as user selection of a host to assign to the selected unassigned host ports. Once the assignment is completed, data structures storing host port assignment configuration data are updated to indicate the host assigned to the selected host ports.
    Type: Application
    Filed: October 19, 2015
    Publication date: April 20, 2017
    Inventors: Joshua J. Crawford, Jason L. Peipelman, Feng Shao
  • Publication number: 20170099348
    Abstract: Various embodiments for managing a plurality of storage systems in a computer storage environment, by a processor device, are provided. In one embodiment, a method comprises using a single interface that performs peer-to-peer discovery to create and display a federated view of managed storage systems within the plurality of storage systems in a storage network.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 6, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Amihay BIRENBOIM, Brian M. BURNETTE, Elizabeth MITCHELL, Jason L. PEIPELMAN
  • Patent number: 9612864
    Abstract: A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. A determination operation is performed for determining if the parent process is alive for a predetermined number of tries. The PID of the background process is written from the first temporary file into a first PID variable when the parent process ends. A determination operation is performed for determining whether a second, global temporary file is empty. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed.
    Type: Grant
    Filed: September 10, 2015
    Date of Patent: April 4, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9606749
    Abstract: A first metadata object identifying a set of disk locations which have been written to since a previous consistency group is maintained. Backup data for the consistency group is written. Writing backup data for the consistency group includes identifying a disk location from the set of disk locations, generating a record containing the disk location, data stored at the disk location, and a consistency group value identifying the consistency group, writing the record to a record location in tape storage, and modifying a second metadata object to indicate that the record location contains the record. Records written to tape storage can be used to restore data to disk storage for a given consistency group.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9601151
    Abstract: A computer-implemented method includes: detecting a read access to one or more data tracks of a target data storage module; and setting a value of one or more bits in response to detecting the read access to the one or more data tracks, each of the one or more bits being associated with one of the one or more data tracks. The value of the one or more bits is set to a value configured to prevent a copy-on-write operation being applied to the one or more data tracks to which the read access was detected. Corresponding systems and computer program products are similarly disclosed, all of which advantageously improve storage system performance by reducing I/O bandwidth via preventing unnecessary copy operations.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9594523
    Abstract: A read/write ratio for each of a plurality of data segments classified in a hot category as hot data segments is determined. Each of the plurality of hot data segments is ordered by the read/write ratio in a descending order. Each of a plurality of available SSD devices is ordered by a remaining life expectancy in an ascending order. Those of the plurality of hot data segments are matched with those of the plurality of hot data segments with those of the plurality of available SSD devices such that a hot data segment having a higher read/write ratio is provided to an SSD device having a smaller remaining life expectancy than another hot data segment having a lower read/write ratio.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: March 14, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Philip M. Dudas, Paul A. Jennas, II, Larry Juarez, David Montgomery, Jason L. Peipelman, Joshua M. Rhoades, Todd C. Sorenson