Patents by Inventor Mark Richard Gambino

Mark Richard Gambino has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11636139
    Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: April 25, 2023
    Assignee: International Business Machines Corporation
    Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Claire Durant, Judy Marie Kearney
  • Publication number: 20220035844
    Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.
    Type: Application
    Filed: October 15, 2021
    Publication date: February 3, 2022
    Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
  • Patent number: 11204947
    Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: December 21, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
  • Publication number: 20210294822
    Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.
    Type: Application
    Filed: March 18, 2020
    Publication date: September 23, 2021
    Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
  • Publication number: 20210157738
    Abstract: Aspects of the invention include a recoverable user cache within recoverable application memory within volatile memory. A non-limiting example computer-implemented method includes designating, by a processor, a portion of the processor memory as recoverable application memory and establishing, by the processor, a portion of the recoverable application memory as recoverable user cache. The method accesses, by the processor, the recoverable user cache following an initial program load.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Michael Edward Drejza, Michael J. Shershin, Christopher Daniel Filachek, Mark Richard Gambino
  • Publication number: 20210157687
    Abstract: Aspects of the invention include a persistent memory file system within recoverable application memory within volatile memory. A non-limiting example computer-implemented method includes designating, by a processor, a portion of the system memory as recoverable application memory and establishing, by the processor, a portion of the recoverable application memory as a heap-backed memory file system. The computer-implemented method remounts, by the processor, the heap-backed memory file system following an initial program load. This heap-backed memory file system is available for general application use and for use as an internal caching mechanism for other cluster consistent file systems.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Michael Edward Drejza, Michael J. Shershin, Christopher Daniel Filachek, Mark Richard Gambino
  • Patent number: 7873829
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Grant
    Filed: May 16, 2008
    Date of Patent: January 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
  • Patent number: 7870384
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Grant
    Filed: May 16, 2008
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
  • Patent number: 7441119
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Grant
    Filed: November 6, 2002
    Date of Patent: October 21, 2008
    Assignee: International Business Machines Corporation
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
  • Publication number: 20080216150
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Application
    Filed: May 16, 2008
    Publication date: September 4, 2008
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby
  • Publication number: 20080215877
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Application
    Filed: May 16, 2008
    Publication date: September 4, 2008
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby
  • Publication number: 20030105953
    Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.
    Type: Application
    Filed: November 6, 2002
    Publication date: June 5, 2003
    Applicant: International Business Machines Corporation
    Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby