Patents by Inventor Luke D. C. Saker
Luke D. C. Saker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10320733Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more computer processors receiving a first message in a queue of messages. The method further includes one or more computer processors determining whether the received first message is related to one or more messages in the queue. The method further includes one or more computer processors responsive to determining that the first message is related to one or more messages in the queue, assigning a priority value to the first message. The method further includes one or more computer processors assigning a priority order to the first message, wherein the priority order indicates a position in which the first message is granted access to a resource lock.Type: GrantFiled: March 27, 2018Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Publication number: 20180219826Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more computer processors receiving a first message in a queue of messages. The method further includes one or more computer processors determining whether the received first message is related to one or more messages in the queue. The method further includes one or more computer processors responsive to determining that the first message is related to one or more messages in the queue, assigning a priority value to the first message. The method further includes one or more computer processors assigning a priority order to the first message, wherein the priority order indicates a position in which the first message is granted access to a resource lock.Type: ApplicationFiled: March 27, 2018Publication date: August 2, 2018Inventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Patent number: 9961034Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more computer processors receiving a first message in a queue of messages. The method further includes one or more computer processors determining whether the received first message is related to one or more messages in the queue. The method further includes one or more computer processors responsive to determining that the first message is related to one or more messages in the queue, assigning a priority value to the first message. The method further includes one or more computer processors assigning a priority order to the first message, wherein the priority order indicates a position in which the first message is granted access to a resource lock.Type: GrantFiled: June 1, 2015Date of Patent: May 1, 2018Assignee: International Business Machines CorporationInventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Patent number: 9942353Abstract: In one embodiment, a method for managing execution of software operations is provided. The method includes a computer processor determining that a software program executing on a computing device utilizes a server to execute at least one software operation. The method further includes identifying a first server from a plurality of servers that are capable of executing the at least one software operation of the software program based, at least in part, on a responsiveness associated with the first server and responsiveness associated with the plurality of servers. The method further includes executing the at least one software operation of the software program on the identified first server. The method further includes updating the responsiveness of the first server based, at least in part, on one or more responsiveness values attributed to the execution of the at least one software operation of the software program on the first server.Type: GrantFiled: June 2, 2015Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Patent number: 9942203Abstract: According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method may include determining if the plurality of messages on a staging queue satisfies a batch threshold value. The method may also include determining a security key with a message destination based on determining that the plurality of messages on the staging queue satisfies the batch threshold value. The method may then include encrypting the plurality of messages based on the determined security key. The method may further include sending the encrypted plurality of messages to the message destination over the network connection.Type: GrantFiled: March 30, 2015Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Patent number: 9887968Abstract: According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method may include determining if the plurality of messages on a staging queue satisfies a batch threshold value. The method may also include determining a security key with a message destination based on determining that the plurality of messages on the staging queue satisfies the batch threshold value. The method may then include encrypting the plurality of messages based on the determined security key. The method may further include sending the encrypted plurality of messages to the message destination over the network connection.Type: GrantFiled: October 26, 2015Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Publication number: 20160360006Abstract: In one embodiment, a method for managing execution of software operations is provided. The method includes a computer processor determining that a software program executing on a computing device utilizes a server to execute at least one software operation. The method further includes identifying a first server from a plurality of servers that are capable of executing the at least one software operation of the software program based, at least in part, on a responsiveness associated with the first server and responsiveness associated with the plurality of servers. The method further includes executing the at least one software operation of the software program on the identified first server. The method further includes updating the responsiveness of the first server based, at least in part, on one or more responsiveness values attributed to the execution of the at least one software operation of the software program on the first server.Type: ApplicationFiled: June 2, 2015Publication date: December 8, 2016Inventors: Graham D. Hopkins, Timothy J. Quigly, Luke D.C. Saker, Craig H. Stirling, Matthew B. White
-
Publication number: 20160352663Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritization of lock allocation. The method includes one or more computer processors receiving a first message in a queue of messages. The method further includes one or more computer processors determining whether the received first message is related to one or more messages in the queue. The method further includes one or more computer processors responsive to determining that the first message is related to one or more messages in the queue, assigning a priority value to the first message. The method further includes one or more computer processors assigning a priority order to the first message, wherein the priority order indicates a position in which the first message is granted access to a resource lock.Type: ApplicationFiled: June 1, 2015Publication date: December 1, 2016Inventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Publication number: 20160294784Abstract: According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method may include determining if the plurality of messages on a staging queue satisfies a batch threshold value. The method may also include determining a security key with a message destination based on determining that the plurality of messages on the staging queue satisfies the batch threshold value. The method may then include encrypting the plurality of messages based on the determined security key. The method may further include sending the encrypted plurality of messages to the message destination over the network connection.Type: ApplicationFiled: October 26, 2015Publication date: October 6, 2016Inventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White
-
Publication number: 20160294782Abstract: According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method may include determining if the plurality of messages on a staging queue satisfies a batch threshold value. The method may also include determining a security key with a message destination based on determining that the plurality of messages on the staging queue satisfies the batch threshold value. The method may then include encrypting the plurality of messages based on the determined security key. The method may further include sending the encrypted plurality of messages to the message destination over the network connection.Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Inventors: Graham D. Hopkins, Timothy J. Quigly, Luke D. C. Saker, Craig H. Stirling, Matthew B. White