Patents by Inventor Kurt Rybczyk
Kurt Rybczyk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10956277Abstract: Backup schedule optimization is provided. Data describing a first backup schedule for a first backup server is identified. Performance metric data and workload data for a first backup server and a second backup server is collected. If a count of backup windows represented by workload data for the first backup server exceeds a data collection threshold, an updated backup schedule that offloads a pending job from the first backup server to the second backup server can be generated. The updated backup schedule is generated if a maximum average I/O threshold for the first backup server was exceeded while a minimum average I/O threshold for the second backup server was deceeded. The maximum and minimum average I/O thresholds are calculated based on respective target average I/O rates for the first and second backup servers, the target average I/O rates derived from respective perform metric data.Type: GrantFiled: November 27, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Patent number: 10831888Abstract: A method for detecting ransomware. A set of control files in a set of locations in a file system is checked, by a computer system, in response to an event, wherein the set of control files has a set of extensions targeted by the ransomware. In response to detecting a change in any of the set of control files, a file copying process for the file system is disabled by the computer system.Type: GrantFiled: January 19, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Marci D. Formato, Bernhard J. Klingenberg, Andrew S. Kronstadt, Kurt A. Rybczyk, Lisa A. Shepard
-
Patent number: 10833854Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.Type: GrantFiled: May 21, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Patent number: 10761945Abstract: A method, apparatus, system, and computer program product for dynamically directing data in a deduplication backup system. A computer system identifies a data type for the data. The computer system determines whether the data is suitable for deduplication in the deduplication backup system based on the data type identified for the data and a policy. The computer system directs the data to a deduplication storage pool responsive to the data having the data type that is suitable for deduplication, reducing storage usage issues for backing up the data in the computer system.Type: GrantFiled: June 19, 2018Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Bernhard J. Klingenberg, Daniela Kern Mainieri Trevisan, Kurt Rybczyk, Lisa A. Shepard
-
Patent number: 10609086Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.Type: GrantFiled: April 11, 2019Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
-
Patent number: 10592355Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.Type: GrantFiled: November 13, 2018Date of Patent: March 17, 2020Assignee: International Business Machines CorporationInventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Publication number: 20190384675Abstract: A method, apparatus, system, and computer program product for dynamically directing data in a deduplication backup system. A computer system identifies a data type for the data. The computer system determines whether the data is suitable for deduplication in the deduplication backup system based on the data type identified for the data and a policy. The computer system directs the data to a deduplication storage pool responsive to the data having the data type that is suitable for deduplication, reducing storage usage issues for backing up the data in the computer system.Type: ApplicationFiled: June 19, 2018Publication date: December 19, 2019Inventors: Bernhard J. Klingenberg, Daniela Kern Mainieri Trevisan, Kurt Rybczyk, Lisa A. Shepard
-
Publication number: 20190310920Abstract: Pre-fetching and staging restore data is provided. A set of data corresponding to a client device is collected from each respective data source in a plurality of data sources. A score is determined for each set of data collected. A probability of receiving a request to restore backup data on the client device is predicted based on analysis of the set of data from each respective data source and the score for each set of data. It is determined whether the predicted probability of receiving a request to restore the backup data on the client device is greater than a threshold. In response to determining that the predicted probability of receiving a request to restore the backup data on the client device is greater than the threshold, the backup data of the client device is preemptively moved to a fastest data storage tier in a multi-tiered backup data storage system.Type: ApplicationFiled: April 4, 2018Publication date: October 10, 2019Inventors: Kurt Rybczyk, Christopher C. Bode, Lisa A. Shepard, Matthew Lavigne
-
Publication number: 20190274037Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.Type: ApplicationFiled: May 21, 2019Publication date: September 5, 2019Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Patent number: 10382952Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.Type: GrantFiled: May 19, 2016Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Publication number: 20190245891Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.Type: ApplicationFiled: April 11, 2019Publication date: August 8, 2019Applicant: International Business Machines CorporationInventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
-
Publication number: 20190228147Abstract: A method for detecting ransomware. A set of control files in a set of locations in a file system is checked, by a computer system, in response to an event, wherein the set of control files has a set of extensions targeted by the ransomware. In response to detecting a change in any of the set of control files, a file copying process for the file system is disabled by the computer system.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: Marci D. Formato, Bernhard J. Klingenberg, Andrew S. Kronstadt, Kurt A. Rybczyk, Lisa A. Shepard
-
Patent number: 10333984Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.Type: GrantFiled: February 21, 2017Date of Patent: June 25, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
-
Patent number: 10331524Abstract: Backup schedule optimization is provided. Backup environment data is identified. Data describing a first backup schedule is identified. Performance metric data that includes data for a data storage array of computer data storage device(s) of a backup server is collected. Data describing backup log(s) that associated with jobs backed up to the data storage array and respectively executed during backup window(s) is received. A target average I/O rate is determined based on the performance metric data of the data storage array. A second backup schedule is generated based on the target average I/O rate, average I/O rate(s) of the data storage array, the backup environment data, and the data describing one or more backup logs. A start time of a job is scheduled in the second backup schedule for a different time in a backup window compared to a start time of the job in the first backup schedule.Type: GrantFiled: June 21, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Patent number: 10268401Abstract: A method, computer system and computer program product for managing tapes storing a backup for a node. The method identifies the node for which a current set of tapes is present. The method determines whether the current set of tapes exceeds a threshold for undesired fragmentation for the node and moves data in the current set of tapes to a new set of tapes when a physical tape count exceeds the threshold for undesired fragmentation, wherein the data is more contiguous in the new set of tapes than the current set of tapes.Type: GrantFiled: February 1, 2017Date of Patent: April 23, 2019Assignee: International Business Machines CorporationInventors: Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Patent number: 10248513Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.Type: GrantFiled: March 15, 2016Date of Patent: April 2, 2019Assignee: International Business Machines CorporationInventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Publication number: 20190095288Abstract: Backup schedule optimization is provided. Data describing a first backup schedule for a first backup server is identified. Performance metric data and workload data for a first backup server and a second backup server is collected. If a count of backup windows represented by workload data for the first backup server exceeds a data collection threshold, an updated backup schedule that offloads a pending job from the first backup server to the second backup server can be generated. The updated backup schedule is generated if a maximum average I/O threshold for the first backup server was exceeded while a minimum average I/O threshold for the second backup server was deceeded. The maximum and minimum average I/O thresholds are calculated based on respective target average I/O rates for the first and second backup servers, the target average I/O rates derived from respective perform metric data.Type: ApplicationFiled: November 27, 2018Publication date: March 28, 2019Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Publication number: 20190079833Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.Type: ApplicationFiled: November 13, 2018Publication date: March 14, 2019Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Publication number: 20180241777Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.Type: ApplicationFiled: February 21, 2017Publication date: August 23, 2018Applicant: International Business Machines CorporationInventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
-
Publication number: 20180217767Abstract: A method, computer system and computer program product for managing tapes storing a backup for a node. The method identifies the node for which a current set of tapes is present. The method determines whether the current set of tapes exceeds a threshold for undesired fragmentation for the node and moves data in the current set of tapes to a new set of tapes when a physical tape count exceeds the threshold for undesired fragmentation, wherein the data is more contiguous in the new set of tapes than the current set of tapes.Type: ApplicationFiled: February 1, 2017Publication date: August 2, 2018Inventors: Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard