Patents by Inventor Kevin Cherkauer

Kevin Cherkauer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070294219
    Abstract: A system for data base management using memory devices holding a database containing tables of data occupying extents. A database engine reviews each query to determine an extents list of extents containing the data needed by that said query. A query monitor then re-orders the extents lists so that extents are retrieved and stored in a buffer cache for more efficient use when executing the queries. The database engine retrieves needed extents from the memory devices, as ordered in the extents lists, and stores those extents in the buffer cache. The database engine then executes one or more queries on the data in the extents in the buffer cache to determine respective results.
    Type: Application
    Filed: August 28, 2007
    Publication date: December 20, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kevin Cherkauer, Scott Lashley, Jason Young
  • Publication number: 20070033159
    Abstract: A tool and method for integrating manual instructions of a database query plan with a database optimizer. The tool may be in the form of an editor to receive manual instructions associated with selection of database objects such as tables and operations associated with the objects. The editor may consult with the database optimizer prior to submitting query plan execution instructions. The consultation may result in the optimizer providing alternatively available selections to the editor and/or a cost estimate for selected operations and/or automatic selection of operators to complete a plan that has been partially constructed or edited manually. Following completion of the query plan, the editor may submit the query plan to the optimizer for execution and/or save the plan for use in future execution(s) of the query.
    Type: Application
    Filed: August 3, 2005
    Publication date: February 8, 2007
    Inventor: Kevin Cherkauer
  • Publication number: 20060218204
    Abstract: A data processing implemented method and system and article of manufacture are provided for determining compatibility between a primary instance and a standby instance, the primary instance being characterized by a first log position indicator and a primary log chain fingerprint (FP-P) and the secondary instance being characterized by a second log position indicator and a secondary log chain fingerprint (FP-S); the FP-P and the FP-S each uniquely identifying a prescribed history of an associated data processing system.
    Type: Application
    Filed: March 25, 2005
    Publication date: September 28, 2006
    Inventors: Effi Ofer, David Mooney, Steven Pearson, Xun Xue, Kevin Cherkauer
  • Publication number: 20060136686
    Abstract: A log-shipping data replication system employs a primary server coupled to a standby server. In operation, the primary server concurrently flushes log data at the primary server and transmits the same log data from the primary server to the standby server. The primary server further transmits at least one buffer flush boundary indication to the standby server indicating the flushing status of the log data at the primary server. The standby server processes the log data as a function of receiving the log data from the primary server, and/or receiving the at least one buffer flush boundary indication from the primary server.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 22, 2006
    Applicant: International Business Machines Corporation
    Inventors: Kevin Cherkauer, Scott Lashley, Dale McInnis, Effi Ofer, Steven Pearson
  • Publication number: 20060101083
    Abstract: A system for limiting the amount of time for a database server to perform a crash recovery process. A maximum recovery time for the database server to perform the crash recovery process is specified. An estimated recovery time for the crash recovery process that is less than the maximum recovery time is calculated, based on at least one of a deterministic analysis of cost accumulation during prior instances of the crash recovery process or an empirical analysis of cost accumulation during regular transaction processing in the database server. The crash recovery process is then conformed to the estimated recovery time.
    Type: Application
    Filed: October 21, 2004
    Publication date: May 11, 2006
    Inventors: Kevin Cherkauer, Scott Lashley, Roger Raphael, Jason Young
  • Publication number: 20060095478
    Abstract: A method and system are provided for providing a consistent reintegration of a failed primary instance as a new secondary instance with implementation of truncation of log records. Upon failure of a primary instance, a secondary instance may be reassigned as the new primary instance. Prior to reintegration, any portion of the database log of the failed primary that is after the log position of the new primary instance may be truncated, followed by a comparison of the log positions of both the new primary instance and the new secondary instance. In limited circumstances, the truncation of the log data generated by the failed primary instance after the point of failure is possible, and supports reintegration of the failed primary as a new secondary instance with limited overhead.
    Type: Application
    Filed: November 1, 2004
    Publication date: May 4, 2006
    Inventors: Kevin Cherkauer, Scott Lashley, Steven Pearson, Effi Ofer, Xun Xue, Roger Zheng
  • Publication number: 20060047684
    Abstract: Sending log records from a first system instance's log buffer to a second system instance is disclosed. Both instances may be instances of a database system. A method may create a log record within the buffer. The record contains actual log information, such as descriptions of transactions. A flag corresponding to the record is set in memory other than the buffer. The flag indicates whether the record has been sent to the second instance, and/or whether the second instance has received the record. The method may further embed non-log information within a simulated log record having a format identical to the log record's format. The non-log information, which may not include actual transactions to be committed, is embedded in a body section of the simulated record. At least one otherwise unused bit of a metadata section of the simulated record is set, indicating that the simulated record is simulated.
    Type: Application
    Filed: August 31, 2004
    Publication date: March 2, 2006
    Inventor: Kevin Cherkauer
  • Publication number: 20050165798
    Abstract: A system for data base management using memory devices holding a database containing tables of data occupying extents. A database engine reviews each query to determine an extents list of extents containing the data needed by that said query. A query monitor then re-orders the extents lists so that extents are retreived and stored in a buffer cache for more efficient use when executing the queries. The database engine retreives needed extents from the memory devices, as ordered in the extents lists, and stores those extents in the buffer cache. The database engine then executes one or more queries on the data in the extents in the buffer cache to determine respective results.
    Type: Application
    Filed: January 22, 2004
    Publication date: July 28, 2005
    Inventors: Kevin Cherkauer, Scott Lashley, Jason Young