Patents by Inventor Mark Richard Gambino
Mark Richard Gambino has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11636139Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.Type: GrantFiled: October 15, 2021Date of Patent: April 25, 2023Assignee: International Business Machines CorporationInventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Claire Durant, Judy Marie Kearney
-
Publication number: 20220035844Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.Type: ApplicationFiled: October 15, 2021Publication date: February 3, 2022Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
-
Patent number: 11204947Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.Type: GrantFiled: March 18, 2020Date of Patent: December 21, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
-
Publication number: 20210294822Abstract: A computer-implemented method for storing documents in a centralized database system based on geographical data localization includes receiving, by a database manager, a request to update a document according to a data localization criterion, the document stored in a local storage device of the centralized database system. The method further includes determining, by the database manager, a geographical location for a local copy of the document based on an attribute of the document matching the localization criterion. The method further includes creating, by the database manager, a remote copy of the document on a storage device that is physically located in the geographical location. The method further includes modifying, by the database manager, the local copy of the document to include a location information of the remote copy.Type: ApplicationFiled: March 18, 2020Publication date: September 23, 2021Inventors: Christopher Daniel Filachek, Mark Richard Gambino, Daniel Howard Jacobs, Jarred Durant, Judy Marie Kearney
-
Publication number: 20210157738Abstract: Aspects of the invention include a recoverable user cache within recoverable application memory within volatile memory. A non-limiting example computer-implemented method includes designating, by a processor, a portion of the processor memory as recoverable application memory and establishing, by the processor, a portion of the recoverable application memory as recoverable user cache. The method accesses, by the processor, the recoverable user cache following an initial program load.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Michael Edward Drejza, Michael J. Shershin, Christopher Daniel Filachek, Mark Richard Gambino
-
Publication number: 20210157687Abstract: Aspects of the invention include a persistent memory file system within recoverable application memory within volatile memory. A non-limiting example computer-implemented method includes designating, by a processor, a portion of the system memory as recoverable application memory and establishing, by the processor, a portion of the recoverable application memory as a heap-backed memory file system. The computer-implemented method remounts, by the processor, the heap-backed memory file system following an initial program load. This heap-backed memory file system is available for general application use and for use as an internal caching mechanism for other cluster consistent file systems.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Michael Edward Drejza, Michael J. Shershin, Christopher Daniel Filachek, Mark Richard Gambino
-
Patent number: 7873829Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: GrantFiled: May 16, 2008Date of Patent: January 18, 2011Assignee: International Business Machines CorporationInventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
-
Patent number: 7870384Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: GrantFiled: May 16, 2008Date of Patent: January 11, 2011Assignee: International Business Machines CorporationInventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
-
Patent number: 7441119Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: GrantFiled: November 6, 2002Date of Patent: October 21, 2008Assignee: International Business Machines CorporationInventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby, Jr.
-
Publication number: 20080216150Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: ApplicationFiled: May 16, 2008Publication date: September 4, 2008Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby
-
Publication number: 20080215877Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: ApplicationFiled: May 16, 2008Publication date: September 4, 2008Inventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby
-
Publication number: 20030105953Abstract: Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing.Type: ApplicationFiled: November 6, 2002Publication date: June 5, 2003Applicant: International Business Machines CorporationInventors: Roy Frank Brabson, Mark Richard Gambino, Linwood Hugh Overby