Patents by Inventor Joel W. Branch
Joel W. Branch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9094309Abstract: Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.Type: GrantFiled: March 13, 2012Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
-
Patent number: 9047298Abstract: Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file.Type: GrantFiled: September 10, 2012Date of Patent: June 2, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Joel W. Branch, Franck Le, Sihyung Lee, Mukesh K. Mohania
-
Patent number: 9031958Abstract: Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file.Type: GrantFiled: April 18, 2011Date of Patent: May 12, 2015Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Joel W. Branch, Franck Le, Sihyung Lee, Mukesh K. Mohania
-
Patent number: 9021484Abstract: Mechanisms are provided for comparing the performance of applications. An application log record associated with a first application is identified. Mappings between the application logs and underlying log record of environments are made for both the source and the target environments. Performance measurements are made based on both the application logs in the source and target environments are made and compared to each other by way of the mappings. A result of the comparison is output to thereby compare performance of the first application in the source environment with performance of a second application in the target environment.Type: GrantFiled: June 21, 2012Date of Patent: April 28, 2015Assignee: International Business Machines CorporationInventors: Joel W. Branch, Amitkumar M. Paradkar, Larisa Shwartz
-
Patent number: 8990904Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.Type: GrantFiled: June 29, 2012Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
-
Patent number: 8984598Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.Type: GrantFiled: June 27, 2012Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
-
Publication number: 20150066598Abstract: A method for predicting service delivery costs for a changed business requirement including detecting an infrastructure change corresponding to the changed business requirement affecting a computer server, deriving a service delivery workload change of the computer server from the infrastructure change, and determining a service delivery cost of the computer server based on the service delivery workload change.Type: ApplicationFiled: August 30, 2013Publication date: March 5, 2015Inventors: Joel W. Branch, Yixin Diao, Emi K. Olsson, Larisa Shwartz, Li Zhang
-
Publication number: 20150067140Abstract: A method for predicting a computerized service delivery organization workload including collecting data of a computer implementing service delivery routine including overlapping samples of load values, overlapping samples of performance values, overlapping samples of event outputs, ticket values and ticket volumes, building a first correlation of said load values with said performance values for predicting new performance values based on new data, building a second correlation of said performance values with said event outputs, said ticket values and said ticket volumes, combining said first and second correlations into a third correlation for correlating said load values with a ticket volume and an event volume, and determining at least one projected event volume or projected ticket volume value using said third correlation and at least one projected load value of said computer.Type: ApplicationFiled: August 30, 2013Publication date: March 5, 2015Inventors: Joel W. Branch, Yixin Diao, Emi K. Olsson, Amitkumar M. Paradkar, Rajeev Puri, Larisa Shwartz
-
Publication number: 20140379716Abstract: A mechanism is provided for process-aware code migration. A plurality of nodes and a plurality of edges are annotated within a call graph with information from execution data for executing the code and a topology of the data processing system to form an annotated call graph. Each node in the plurality of nodes is clustered into an associated cluster based on a subset of attributes used from the execution data or the topology to generate the annotated call graph to form a clustered call graph comprising a plurality of clusters. The execution data associated with each cluster in the plurality of clusters is process mined to form an existing process model. Processes identified within the existing process model are mapped to a proposed business-process model thereby forming a set of correlations between the existing process model and the proposed business-process model.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Inventors: Joel W. Branch, Johnathan M. Reason, Aubrey J. Rembert
-
Patent number: 8913501Abstract: A method for controlling a flow rate of multiple data flows at a network node on a path of the data flows includes the following steps. A private restriction token bucket (RTB) and a private guarantee token bucket (GTB) for each of the data flows and a shared token bucket (STB) common to all of the data flows are provided. n tokens are obtained from the RTBi for the data flow i when a message belonging to the data flow i arrives at the node and needs n tokens. An attempt is made to obtain n tokens from the GTBi for the data flow i and/or the STB. The message is transmitted if n tokens are obtained from the GTBi and/or from the STB, otherwise transmission of the message is delayed until n tokens are available in the GTBi and/or in the STB.Type: GrantFiled: August 16, 2012Date of Patent: December 16, 2014Assignee: International Business Machines CorporationInventors: Joel W. Branch, Han Chen, Hui Lei, Konstantin Shagin
-
Patent number: 8909749Abstract: A method, information processing system, and computer program product manage virtual workspace migration. A set of information associated with a user is analyzed. A future virtual workspace demand associated with the user is predicted based on the analyzing. At least a portion of at least one virtual workspace associated with the user is migrated from a first location to at least a second location based on the future virtual workspace demand that has been predicted.Type: GrantFiled: July 26, 2010Date of Patent: December 9, 2014Assignee: International Business Macines CorporationInventors: Joel W. Branch, Douglas M. Freimuth, Bong Jun Ko, Vasileios Pappas
-
Publication number: 20140050094Abstract: A method for controlling a flow rate of multiple data flows at a network node on a path of the data flows includes the following steps. A private restriction token bucket (RTB) and a private guarantee token bucket (GTB) for each of the data flows and a shared token bucket (STB) common to all of the data flows are provided. n tokens are obtained from the RTBi for the data flow i when a message belonging to the data flow i arrives at the node and needs n tokens. An attempt is made to obtain n tokens from the GTBi for the data flow i and/or the STB. The message is transmitted if n tokens are obtained from the GTBi and/or from the STB, otherwise transmission of the message is delayed until n tokens are available in the GTBi and/or in the STB.Type: ApplicationFiled: August 16, 2012Publication date: February 20, 2014Applicant: International Business Machines CorporationInventors: Joel W. Branch, Han Chen, Hui Lei, Konstantin Shagin
-
Publication number: 20140013334Abstract: A method of configuring a logging utility includes generating, by a computer system, at least one message based on a model of logs from at least two software components of a multi-component application and sending, by the computer system, the message to at least one of the two software components for configuring a logging utility of the corresponding software component.Type: ApplicationFiled: July 12, 2012Publication date: January 9, 2014Applicant: International Business Machines CorporationInventors: Chatschik Bisdikian, Joel W. Branch
-
Publication number: 20140013302Abstract: A method of configuring a logging utility includes generating, by a computer system, at least one message based on a model of logs from at least two software components of a multi-component application and sending, by the computer system, the message to at least one of the two software components for configuring a logging utility of the corresponding software component.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: International Business Machines CorporationInventors: Chatschik Bisdikian, Joel W. Branch
-
Publication number: 20140007203Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
-
Publication number: 20140007204Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
-
Publication number: 20130346980Abstract: Mechanisms are provided for comparing the performance of applications. An application log record associated with a first application is identified. Mappings between the application logs and underlying log record of environments are made for both the source and the target environments. Performance measurements are made based on both the application logs in the source and target environments are made and compared to each other by way of the mappings. A result of the comparison is output to thereby compare performance of the first application in the source environment with performance of a second application in the target environment.Type: ApplicationFiled: June 21, 2012Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joel W. Branch, Amitkumar M. Paradkar, Larisa Shwartz
-
Patent number: 8576066Abstract: One or more embodiments manage emergency response services. An emergency event is determined to have occurred. A set of civilian responders currently available to respond to the emergency event is selected from a plurality of civilian responders in response to determining that the emergency event has occurred. Each civilian responder in the set of civilian responders is associated with at least one wireless communication device. The set of civilian responders is notified that the emergency event has occurred. A set of emergency event information associated with the emergency event is transmitted to at least one wireless communication device associated with each civilian responder in the set of civilian responders.Type: GrantFiled: February 28, 2011Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: John Alan Bivens, Joel W. Branch, Rajarsh Idas, Robert G. Farrell, Stacy F. Hobson, Daby M. Sow
-
Patent number: 8577818Abstract: A method includes performing, on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model.Type: GrantFiled: September 6, 2012Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Chatschik Bisdikian, Joel W. Branch, Ting He
-
Publication number: 20130246606Abstract: Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value.Type: ApplicationFiled: March 13, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joel W. Branch, Michael E. Nidd, Ruediger Rissmann