Patents by Inventor John J. Auvenshine

John J. Auvenshine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10248320
    Abstract: A method and associated systems for a workload-aware thin-provisioning system that allocates physical storage to virtual resources from pools of physical storage volumes. The system receives constraints that limit the amount of storage that can be allocated from each pool and the total workload that can be directed to each pool. It also receives lists of previous workloads and allocations associated with each volume at specific times in the past. The system then predicts future workloads and allocation requirements for each volume by regressing linear equations derived from the received data. If the predicted values indicate that a pool will at a future time violate a received constraint, the system computes the minimum costs to move each volume of the offending pool to a less-burdened pool. It then selects the lowest-cost combination of volume and destination pool and then moves the selected volume to the selected pool.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Rakesh Jain, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Patent number: 10241765
    Abstract: An apparatus, method, system, and program product are disclosed for reducing software runtime. One method includes determining a result produced in response to executing code. The method also includes storing the result. The method includes receiving a request to execute the code. The method also includes, without executing the code, providing the result in response to receiving the request to execute the code.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Anthony J. Ciaravella, John T. Olson, Richard A. Welp
  • Publication number: 20190073135
    Abstract: A method and associated systems for a workload-aware thin-provisioning system that allocates physical storage to virtual resources from pools of physical storage volumes. The system receives constraints that limit the amount of storage that can be allocated from each pool and the total workload that can be directed to each pool. It also receives lists of previous workloads and allocations associated with each volume at specific times in the past. The system then predicts future workloads and allocation requirements for each volume by regressing linear equations derived from the received data. If the predicted values indicate that a pool will at a future time violate a received constraint, the system computes the minimum costs to move each volume of the offending pool to a less-burdened pool. It then selects the lowest-cost combination of volume and destination pool and then moves the selected volume to the selected pool.
    Type: Application
    Filed: November 6, 2018
    Publication date: March 7, 2019
    Inventors: John J. Auvenshine, Rakesh Jain, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20190052615
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Application
    Filed: August 10, 2017
    Publication date: February 14, 2019
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Publication number: 20180335966
    Abstract: A method and system for improving operation of a memory device is provided. The method includes detecting, via sensors, environmental factors affecting an operation of individual hardware storage devices within an array of hardware storage devices. The environmental factors are analyzed with respect to operational characteristics of the individual hardware storage devices and a resulting expected failure rate for the individual hardware storage devices is determined. Array parameters associated with a hardware configuration for the array of hardware storage devices with respect to each expected failure rate are determined and associated issues are detected. Reliability characteristics and associated risks of the array of hardware storage devices are determined and a functionality of the array of hardware storage devices is modified.
    Type: Application
    Filed: July 27, 2018
    Publication date: November 22, 2018
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
  • Publication number: 20180314555
    Abstract: Systems and methods for resource provisioning are disclosed. A method includes: generating, by a computer device, a resource provisioning policy for a resource; receiving, by the computer device, a request for an allocation of the resource from an account; applying, by the computer device, the resource provisioning policy to the request based on receiving the request; automatically approving or denying, by the computer device, the request based on the applying the resource provisioning policy to the request; updating, by the computer device, the resource provisioning policy for the account based on the automatic approving or denying the request.
    Type: Application
    Filed: April 27, 2017
    Publication date: November 1, 2018
    Inventors: John J. Auvenshine, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20180307441
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 25, 2018
    Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
  • Publication number: 20180307442
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Application
    Filed: December 17, 2017
    Publication date: October 25, 2018
    Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
  • Publication number: 20180278477
    Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 27, 2018
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
  • Publication number: 20180267863
    Abstract: A method for distributing data among storage devices. The method comprising one or more processors receiving a first graph workload that executes within a networked computing environment. The method further includes identifying data from the first graph workload that is utilized during the execution of the first graph workload that includes a plurality of data packets. The method further includes creating a first graph workload model representative of the graph structure of the first graph workload and determining two or more partitions that are representative of a distribution of the identified data utilized by the first graph workload based, at least in part, on the first graph workload model. The method further includes allocating a plurality of network accessible storage devices among the two or more partitions and copying a first set of data packets of the plurality of data packets to a network accessible storage device.
    Type: Application
    Filed: May 14, 2018
    Publication date: September 20, 2018
    Inventors: John J. Auvenshine, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20180270128
    Abstract: A method for predicting a failure of a complex storage environment is provided. The method includes monitoring a current utilization of one or more resources over a data path of interest, calculating a maximum utilization threshold for each resource of the one or more resources, such that exceeding the maximum utilization threshold adversely impacts one or more performance measures, creating an expected performance threshold associated with an expected performance for each performance measure of the one or more performance measures over the data path of interest, ascertaining an actual performance for each performance measure based on the monitoring of the current utilization, analyzing maximum values of resource usage over time to predict when the expected performance will fall outside of an acceptable overall performance threshold for the data path of interest, and determining an earliest expected incident of resource exhaustion.
    Type: Application
    Filed: March 20, 2017
    Publication date: September 20, 2018
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
  • Publication number: 20180260147
    Abstract: A method and system for improving operation of a memory device is provided. The method includes detecting, via sensors, environmental factors affecting an operation of individual hardware storage devices within an array of hardware storage devices. The environmental factors are analyzed with respect to operational characteristics of the individual hardware storage devices and a resulting expected failure rate for the individual hardware storage devices is determined. Array parameters associated with a hardware configuration for the array of hardware storage devices with respect to each expected failure rate are determined and associated issues are detected. Reliability characteristics and associated risks of the array of hardware storage devices are determined and a functionality of the array of hardware storage devices is modified.
    Type: Application
    Filed: March 10, 2017
    Publication date: September 13, 2018
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
  • Patent number: 10073639
    Abstract: A method and system for improving operation of a memory device is provided. The method includes detecting, via sensors, environmental factors affecting an operation of individual hardware storage devices within an array of hardware storage devices. The environmental factors are analyzed with respect to operational characteristics of the individual hardware storage devices and a resulting expected failure rate for the individual hardware storage devices is determined. Array parameters associated with a hardware configuration for the array of hardware storage devices with respect to each expected failure rate are determined and associated issues are detected. Reliability characteristics and associated risks of the array of hardware storage devices are determined and a functionality of the array of hardware storage devices is modified.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: September 11, 2018
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
  • Publication number: 20180246777
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Application
    Filed: December 18, 2017
    Publication date: August 30, 2018
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Publication number: 20180246776
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Patent number: 10007580
    Abstract: A method for distributing data among storage devices. The method comprising one or more processors receiving a first graph workload that executes within a networked computing environment. The method further includes identifying data from the first graph workload that is utilized during the execution of the first graph workload that includes a plurality of data packets. The method further includes creating a first graph workload model representative of the graph structure of the first graph workload and determining two or more partitions that are representative of a distribution of the identified data utilized by the first graph workload based, at least in part, on the first graph workload model. The method further includes allocating a plurality of network accessible storage devices among the two or more partitions and copying a first set of data packets of the plurality of data packets to a network accessible storage device.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: June 26, 2018
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20180121179
    Abstract: An apparatus, method, system, and program product are disclosed for reducing software runtime. One method includes determining a result produced in response to executing code. The method also includes storing the result. The method includes receiving a request to execute the code. The method also includes, without executing the code, providing the result in response to receiving the request to execute the code.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventors: John J. Auvenshine, Anthony J. Ciaravella, John T. Olson, Richard A. Welp
  • Publication number: 20180121100
    Abstract: A method and associated systems for a workload-aware thin-provisioning system that allocates physical storage to virtual resources from pools of physical storage volumes. The system receives constraints that limit the amount of storage that can be allocated from each pool and the total workload that can be directed to each pool. It also receives lists of previous workloads and allocations associated with each volume at specific times in the past. The system then predicts future workloads and allocation requirements for each volume by regressing linear equations derived from the received data. If the predicted values indicate that a pool will at a future time violate a received constraint, the system computes the minimum costs to move each volume of the offending pool to a less-burdened pool. It then selects the lowest-cost combination of volume and destination pool and then moves the selected volume to the selected pool.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 3, 2018
    Inventors: John J. Auvenshine, Rakesh Jain, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20180103084
    Abstract: A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and the root node represents a hierarchical directory pathname of sensitive data represented by the leaf node. Each tree is assigned a sensitivity signature that is proportional to the relative sensitivity and access frequency of the dataset represented by that tree. The signatures are organized into clusters as a function of the distances between each signature, and each signature is associated with a soft migration cost specific to that signature's cluster. A soft cost for migrating an application that requires multiple datasets may be determined by adding the migration costs associated with each of the multiple datasets.
    Type: Application
    Filed: October 12, 2016
    Publication date: April 12, 2018
    Inventors: John J. Auvenshine, Bernhard J. Klingenberg, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray
  • Patent number: 9852601
    Abstract: A wearable device may connect to a wearable device over a short-range wireless connection. The user device may receive sensor data from the wearable device, where the wearable device has sensors. The user device may determine that a safety alert parameter has been met, and in response generate an audible alarm. The device may then determine that the connection between the user device and the wearable device has been disconnected, and in response, generate a second audible alarm.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Perry J. Gallo, Scott W. Hughes