Patents by Inventor Joel W. Branch

Joel W. Branch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9094309
    Abstract: Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
  • Patent number: 9047298
    Abstract: Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: June 2, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Joel W. Branch, Franck Le, Sihyung Lee, Mukesh K. Mohania
  • Patent number: 9031958
    Abstract: Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file.
    Type: Grant
    Filed: April 18, 2011
    Date of Patent: May 12, 2015
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Joel W. Branch, Franck Le, Sihyung Lee, Mukesh K. Mohania
  • Patent number: 9021484
    Abstract: Mechanisms are provided for comparing the performance of applications. An application log record associated with a first application is identified. Mappings between the application logs and underlying log record of environments are made for both the source and the target environments. Performance measurements are made based on both the application logs in the source and target environments are made and compared to each other by way of the mappings. A result of the comparison is output to thereby compare performance of the first application in the source environment with performance of a second application in the target environment.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: April 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joel W. Branch, Amitkumar M. Paradkar, Larisa Shwartz
  • Patent number: 8990904
    Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
  • Patent number: 8984598
    Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: March 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
  • Publication number: 20150066598
    Abstract: A method for predicting service delivery costs for a changed business requirement including detecting an infrastructure change corresponding to the changed business requirement affecting a computer server, deriving a service delivery workload change of the computer server from the infrastructure change, and determining a service delivery cost of the computer server based on the service delivery workload change.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Inventors: Joel W. Branch, Yixin Diao, Emi K. Olsson, Larisa Shwartz, Li Zhang
  • Publication number: 20150067140
    Abstract: A method for predicting a computerized service delivery organization workload including collecting data of a computer implementing service delivery routine including overlapping samples of load values, overlapping samples of performance values, overlapping samples of event outputs, ticket values and ticket volumes, building a first correlation of said load values with said performance values for predicting new performance values based on new data, building a second correlation of said performance values with said event outputs, said ticket values and said ticket volumes, combining said first and second correlations into a third correlation for correlating said load values with a ticket volume and an event volume, and determining at least one projected event volume or projected ticket volume value using said third correlation and at least one projected load value of said computer.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Inventors: Joel W. Branch, Yixin Diao, Emi K. Olsson, Amitkumar M. Paradkar, Rajeev Puri, Larisa Shwartz
  • Publication number: 20140379716
    Abstract: A mechanism is provided for process-aware code migration. A plurality of nodes and a plurality of edges are annotated within a call graph with information from execution data for executing the code and a topology of the data processing system to form an annotated call graph. Each node in the plurality of nodes is clustered into an associated cluster based on a subset of attributes used from the execution data or the topology to generate the annotated call graph to form a clustered call graph comprising a plurality of clusters. The execution data associated with each cluster in the plurality of clusters is process mined to form an existing process model. Processes identified within the existing process model are mapped to a proposed business-process model thereby forming a set of correlations between the existing process model and the proposed business-process model.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 25, 2014
    Inventors: Joel W. Branch, Johnathan M. Reason, Aubrey J. Rembert
  • Patent number: 8913501
    Abstract: A method for controlling a flow rate of multiple data flows at a network node on a path of the data flows includes the following steps. A private restriction token bucket (RTB) and a private guarantee token bucket (GTB) for each of the data flows and a shared token bucket (STB) common to all of the data flows are provided. n tokens are obtained from the RTBi for the data flow i when a message belonging to the data flow i arrives at the node and needs n tokens. An attempt is made to obtain n tokens from the GTBi for the data flow i and/or the STB. The message is transmitted if n tokens are obtained from the GTBi and/or from the STB, otherwise transmission of the message is delayed until n tokens are available in the GTBi and/or in the STB.
    Type: Grant
    Filed: August 16, 2012
    Date of Patent: December 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Joel W. Branch, Han Chen, Hui Lei, Konstantin Shagin
  • Patent number: 8909749
    Abstract: A method, information processing system, and computer program product manage virtual workspace migration. A set of information associated with a user is analyzed. A future virtual workspace demand associated with the user is predicted based on the analyzing. At least a portion of at least one virtual workspace associated with the user is migrated from a first location to at least a second location based on the future virtual workspace demand that has been predicted.
    Type: Grant
    Filed: July 26, 2010
    Date of Patent: December 9, 2014
    Assignee: International Business Macines Corporation
    Inventors: Joel W. Branch, Douglas M. Freimuth, Bong Jun Ko, Vasileios Pappas
  • Publication number: 20140050094
    Abstract: A method for controlling a flow rate of multiple data flows at a network node on a path of the data flows includes the following steps. A private restriction token bucket (RTB) and a private guarantee token bucket (GTB) for each of the data flows and a shared token bucket (STB) common to all of the data flows are provided. n tokens are obtained from the RTBi for the data flow i when a message belonging to the data flow i arrives at the node and needs n tokens. An attempt is made to obtain n tokens from the GTBi for the data flow i and/or the STB. The message is transmitted if n tokens are obtained from the GTBi and/or from the STB, otherwise transmission of the message is delayed until n tokens are available in the GTBi and/or in the STB.
    Type: Application
    Filed: August 16, 2012
    Publication date: February 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Joel W. Branch, Han Chen, Hui Lei, Konstantin Shagin
  • Publication number: 20140013334
    Abstract: A method of configuring a logging utility includes generating, by a computer system, at least one message based on a model of logs from at least two software components of a multi-component application and sending, by the computer system, the message to at least one of the two software components for configuring a logging utility of the corresponding software component.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Chatschik Bisdikian, Joel W. Branch
  • Publication number: 20140013302
    Abstract: A method of configuring a logging utility includes generating, by a computer system, at least one message based on a model of logs from at least two software components of a multi-component application and sending, by the computer system, the message to at least one of the two software components for configuring a logging utility of the corresponding software component.
    Type: Application
    Filed: July 6, 2012
    Publication date: January 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Chatschik Bisdikian, Joel W. Branch
  • Publication number: 20140007203
    Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
  • Publication number: 20140007204
    Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
  • Publication number: 20130346980
    Abstract: Mechanisms are provided for comparing the performance of applications. An application log record associated with a first application is identified. Mappings between the application logs and underlying log record of environments are made for both the source and the target environments. Performance measurements are made based on both the application logs in the source and target environments are made and compared to each other by way of the mappings. A result of the comparison is output to thereby compare performance of the first application in the source environment with performance of a second application in the target environment.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joel W. Branch, Amitkumar M. Paradkar, Larisa Shwartz
  • Patent number: 8576066
    Abstract: One or more embodiments manage emergency response services. An emergency event is determined to have occurred. A set of civilian responders currently available to respond to the emergency event is selected from a plurality of civilian responders in response to determining that the emergency event has occurred. Each civilian responder in the set of civilian responders is associated with at least one wireless communication device. The set of civilian responders is notified that the emergency event has occurred. A set of emergency event information associated with the emergency event is transmitted to at least one wireless communication device associated with each civilian responder in the set of civilian responders.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: John Alan Bivens, Joel W. Branch, Rajarsh Idas, Robert G. Farrell, Stacy F. Hobson, Daby M. Sow
  • Patent number: 8577818
    Abstract: A method includes performing, on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Chatschik Bisdikian, Joel W. Branch, Ting He
  • Publication number: 20130246606
    Abstract: Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.
    Type: Application
    Filed: March 13, 2012
    Publication date: September 19, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann