Patents by Inventor Jean X. Yu
Jean X. Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11526404Abstract: Provided are techniques for exploiting object tags in order to produce a work order across several backup engines for a backup job. A selection of tags for an object is received. A work order for the object is created using the tags. The work order is stored with a virtual server that stores the object, wherein a data mover of a backup engine retrieves the work order from the virtual server to back up the object.Type: GrantFiled: March 29, 2017Date of Patent: December 13, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean P. Cox, David G. Derk, Kevin L. Gibble, Avishai H. Hochberg, James P. Smith, Steven V. Voyk, Martine B. Wedlake, Jean X. Yu
-
Publication number: 20180285203Abstract: Provided are techniques for exploiting object tags in order to produce a work order across several backup engines for a backup job. A selection of tags for an object is received. A work order for the object is created using the tags. The work order is stored with a virtual server that stores the object, wherein a data mover of a backup engine retrieves the work order from the virtual server to back up the object.Type: ApplicationFiled: March 29, 2017Publication date: October 4, 2018Inventors: Sean P. Cox, David G. Derk, Kevin L. Gibble, Avishai H. Hochberg, James P. Smith, Steven V. Voyk, Martine B. Wedlake, Jean X. Yu
-
Publication number: 20180165162Abstract: A method for presenting options associated with restoring data is disclosed. In one embodiment, such a method includes providing a calendar, such as a monthly calendar, showing multiple days. The method enables a user to select a day on the calendar. In response to the selection, the method automatically displays, together with the calendar, a list of restore points associated with the selected day. The method further enables a user to select a restore point in the list. In response to the selection, the method automatically displays, together with the calendar and list of restore points, a list of restore options associated with the selected restore point. The method further enables the user to select a restore option, associated with a data recovery method, from the list of restore options. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: December 8, 2016Publication date: June 14, 2018Applicant: International Business Machines CorporationInventors: Sean P. Cox, David G. Derk, Kevin L. Gibble, Andres F. Holguin, James P. Smith, Steven V. Voyk, Martine B. Wedlake, Jean X. Yu
-
Publication number: 20180165265Abstract: A method for indicating property inheritance in object hierarchies is disclosed. In one embodiment, such a method includes enabling a user to select an object in an object hierarchy. In response, the method displays a property sheet showing property values for the selected object. The property sheet shows a property value that is inherited from an object upstream from the selected object. The method provides, on the property sheet, an icon indicating a level in the object hierarchy from which the property value is inherited, and a label indicating a source object in the object hierarchy from which the property value is inherited. The label may, in certain embodiments, incorporate a name associated with the source object and link to a property sheet associated with the source object. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: December 8, 2016Publication date: June 14, 2018Applicant: International Business Machines CorporationInventors: Sean P. Cox, David G. Derk, Kevin L. Gibble, Andres F. Holguin, James P. Smith, Steven V. Voyk, Martine B. Wedlake, Jean X. Yu
-
Patent number: 9800569Abstract: During a data protection operation, a system exploits a virtual hierarchy to centralize the configuration and management of operating system credentials of numerous virtual guests. For each virtual guest, the system uses the credential to collect a single Globally Unique Identifier (GUID) previously generated and stored in-guest by any data protection agent. The system stores the collected GUID as a custom property in the context of the virtual hierarchy. The system also exploits the virtual hierarchy custom properties to determine if GUIDs are copies due to virtual guest replication. The system ensures GUID uniqueness by requesting regeneration of the GUID by in-guest data protection agents. Using GUIDs that are unique across the virtual hierarchy, the system can correlate application data of multiple in-guest data protection agents.Type: GrantFiled: June 5, 2014Date of Patent: October 24, 2017Assignee: International Business Machines CorporationInventors: Robert C. Edwards, Jr., Avishai H. Hochberg, Jawed Iqbal, Tai W. Nam, Joanne T. Nguyen, Neil G. Rasmussen, James P. Smith, Peter B. Symonds, Jean X. Yu
-
Patent number: 9632817Abstract: Methods, systems, and products are disclosed for correlating business workflows with transaction tracking, the method including identifying an instrumentation point in a business process of a business workflow that invokes an IT resource that carries out at least a portion of the business process and associating, at the instrumentation point, the business process and the IT resource with a transaction name having business semantics such that correlation data gathered about the IT resource may be linked with the business process. Correlating business workflows with transaction tracking may also include gathering correlation data about the IT resource, selecting one of the plurality of service specific correlator passing methods, and passing a correlator in accordance with the selected service specific correlator passing methods.Type: GrantFiled: July 29, 2005Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Nduwuisi Emuchay, Jean X Yu
-
Publication number: 20150358309Abstract: A system correlates application information from within a virtual guest to an entity managing off-host data protection. During a data protection operation, the system exploits the virtual hierarchy to centralize the configuration and management of operating system credentials of numerous virtual guests. For each virtual guest, the system uses the credential to collect a single Globally Unique Identifier (GUID) previously generated and stored in-guest by any data protection agent. The system stores the collected GUID as a custom property in the context of the virtual hierarchy. The system also exploits the virtual hierarchy custom properties to determine if GUIDs are copies due to virtual guest replication. The system ensures GUID's uniqueness by requesting regeneration of the GUID by in-guest data protection agents. Using GUIDs that are unique across the virtual hierarchy, from the entity managing off-host data protection, the system can correlate application data of multiple in-guest data protection agents.Type: ApplicationFiled: June 5, 2014Publication date: December 10, 2015Inventors: Robert C. Edwards, Jr., Avishai H. Hochberg, Jawed Iqbal, Tai W. Nam, Joanne T. Nguyen, Neil G. Rasmussen, James P. Smith, Peter B. Symonds, Jean X. Yu
-
Patent number: 8838691Abstract: A mechanism is provided in a data processing system for de-duplication in a Web services environment. Responsive to receiving a signature for a portion of a request message from a client, the mechanism performs a query in a bit stream repository to determine whether the portion of the request message has been previously received. Responsive to determining the portion of the message has been previously received, the mechanism retrieves the portion of the message from the bit stream repository. The mechanism notifies the client that the portion of the message has been previously received such that the client does not send the portion of the message.Type: GrantFiled: June 29, 2012Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: Chuan Liu, Hang Xiao, Ming Yan, Jean X. Yu
-
Publication number: 20140006498Abstract: A mechanism is provided in a data processing system for de-duplication in a Web services environment. Responsive to receiving a signature for a portion of a request message from a client, the mechanism performs a query in a bit stream repository to determine whether the portion of the request message has been previously received. Responsive to determining the portion of the message has been previously received, the mechanism retrieves the portion of the message from the bit stream repository. The mechanism notifies the client that the portion of the message has been previously received such that the client does not send the portion of the message.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: International Business Machines CorporationInventors: Chuan Liu, Hang Xiao, Ming Yan, Jean X. Yu
-
Patent number: 8464243Abstract: During execution of an existing scheduling computer program on a client node, an update computer program and a self-describing automatic installation package are downloaded to the client node from a logical depot node implemented on an existing management server. Therefore, advantageously, no physical depot node or other additional computing device is needed for the client node to update itself. Execution of the update computer program is spawned on the client node from the existing scheduling computer program. As such, the update computer program inherits root access to the client node and security credentials to the management server from the scheduling computer program—advantageously, then, a user does not have to perform any laborious configuration of the client node in order to update the node. The client node ultimately updates itself using the self-describing automatic installation package, which includes all the information needed for the client node to update itself.Type: GrantFiled: August 21, 2009Date of Patent: June 11, 2013Assignee: International Business Machines CorporationInventors: Jean X. Yu, James J. Myers, Gergana V. Markova, Thu Nguyen, David M. Cannon, Kenneth E. Hannigan, James P. Smith, Colin S. Dawson
-
Patent number: 8447735Abstract: A backup program running on a computing device receives a search query. The backup program transmits the search query to a search program. The backup program receives search results corresponding to the search query from the search program. The search results include a list of data objects stored on a storage device and that satisfy the search query. The backup program backs up one or more selected data objects of the list of data objects. The backup program can periodically and automatically without user interaction retransmit the search query to the search program, and receive updated search results corresponding to the search query from the search program. The updated search results include an updated list of data objects stored on the storage device that satisfy the search query. The backup program can then back up the data objects within the updated list of data objects.Type: GrantFiled: December 14, 2010Date of Patent: May 21, 2013Assignee: International Business Machines CorporationInventors: Jean X. Yu, Yan Xiao, Thomas E. O'Brien
-
Patent number: 8434095Abstract: Using microblogging to dynamically track event flow of a composite enterprise application by reporting an enterprise application event. A client server detects an event of the complex enterprise application, and encodes the event data in a microblog compatible format. The client computer creates an event post message containing the event data and uploads the event post to a microblog server via the Internet. The microblog server then displays the post message in a user readable format.Type: GrantFiled: December 22, 2009Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventor: Jean X. Yu
-
Publication number: 20120150810Abstract: A backup program running on a computing device receives a search query. The backup program transmits the search query to a search program. The backup program receives search results corresponding to the search query from the search program. The search results include a list of data objects stored on a storage device and that satisfy the search query. The backup program backs up one or more selected data objects of the list of data objects. The backup program can periodically and automatically without user interaction retransmit the search query to the search program, and receive updated search results corresponding to the search query from the search program. The updated search results include an updated list of data objects stored on the storage device that satisfy the search query. The backup program can then back up the data objects within the updated list of data objects.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Inventors: Jean X. Yu, Yan Xiao, Thomas E. O'Brien
-
Publication number: 20110154370Abstract: Using microblogging to dynamically track event flow of a composite enterprise application by reporting an enterprise application event. A client server detects an event of the complex enterprise application, and encodes the event data in a microblog compatible format. The client computer creates an event post message containing the event data and uploads the event post to a microblog server via the Internet. The microblog server then displays the post message in a user readable format.Type: ApplicationFiled: December 22, 2009Publication date: June 23, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jean X. Yu
-
Publication number: 20110047537Abstract: During execution of an existing scheduling computer program on a client node, an update computer program and a self-describing automatic installation package are downloaded to the client node from a logical depot node implemented on an existing management server. Therefore, advantageously, no physical depot node or other additional computing device is needed for the client node to update itself. Execution of the update computer program is spawned on the client node from the existing scheduling computer program. As such, the update computer program inherits root access to the client node and security credentials to the management server from the scheduling computer program—advantageously, then, a user does not have to perform any laborious configuration of the client node in order to update the node. The client node ultimately updates itself using the self-describing automatic installation package, which includes all the information needed for the client node to update itself.Type: ApplicationFiled: August 21, 2009Publication date: February 24, 2011Inventors: Jean X. Yu, James J. Myers, Gergana V. Markova, Thu Nguyen, David M. Cannon, Kenneth E. Hannigan, James P. Smith, Colin S. Dawson
-
Patent number: 7774428Abstract: A mechanism is provided for automatic response time measurement of Lightweight Directory Access Protocol (LDAP) server operations are provided. The mechanism makes use of an LDAP server plug-in interface and LDAP server plug-in modules to automatically inject response time measurement code before and after each LDAP server operation during real time operation of the LDAP server in a runtime environment. In addition, the mechanism makes use of correlation tokens in the LDAP environment so that LDAP client and server operations may be correlated with one another in an end-to-end transaction. Mechanisms for passing correlation tokens between plug-in modules for the same LDAP server operation and passing correlation tokens between the LDAP client and LDAP server, and among LDAP client calls within a single session, are also provided.Type: GrantFiled: April 27, 2006Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventor: Jean X. Yu
-
Publication number: 20090297043Abstract: A pattern scanner is provided for identifying which portions of a security log entry is unrecognizable by currently defined data patterns. Furthermore, an editor is provided for identifying portions of the security log entry that are recognizable by sub-patterns of the currently defined data patterns and portions of the security log entry that are not recognizable. The editor further provides a user interface through which a user may associated sub-patterns with portions of the security log entry that are not recognized. Moreover, a user interface may be provided for defining new sub-patterns that may be applied to recognizing portions of security log entries. A data pattern based on a combination of sub-patterns for the recognized and unrecognized portions of the security log entry may then be automatically generated.Type: ApplicationFiled: May 28, 2008Publication date: December 3, 2009Applicant: International Business Machines CorporationInventors: Heather M. Hinton, Ping Wang, Hang Xiao, Jean X. Yu