Patents by Inventor Micah Robison
Micah Robison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11641349Abstract: Aspects of the present disclosure relate to encryption management. A determination can be made whether an encryption algorithm is at-risk. In response to determining that the encryption algorithm is at-risk, data protected by the encryption algorithm can be identified. A security action can then be executed on the data protected by the encryption algorithm.Type: GrantFiled: March 7, 2022Date of Patent: May 2, 2023Assignee: International Business Machines CorporationInventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Patent number: 11461112Abstract: Provided are a computer program product, system, and method for determining feature settings for code to deploy to a system by training a machine learning module. A determination is made of an outcome of running system code on a system having configuration settings and feature settings of features in the system to enable or disable in response to the outcome. A machine learning module is trained to produce the feature settings indicating to enable or disable the features in response to input comprising the configuration settings of the system.Type: GrantFiled: February 7, 2019Date of Patent: October 4, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew G. Borlick, Lokesh M. Gupta, Matthew R. Craig, Micah Robison
-
Patent number: 11429736Abstract: Aspects of the present disclosure relate to encryption management. An indication of a data set to be tagged with an encryption tag is received. A location for the encryption tag is determined. The encryption tag is stored at the location, where the encryption tag includes an encryption status indicator specifying whether or not the data is encrypted and an encryption algorithm indicator specifying an encryption algorithm used to encrypt the data.Type: GrantFiled: February 17, 2020Date of Patent: August 30, 2022Assignee: International Business Machines CorporationInventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Patent number: 11423158Abstract: Dynamic compression with dynamic multi-stage encryption for a data storage system in accordance with the present description includes, in one aspect of the present description, preserves end-to-end encryption between a host and a storage controller while compressing data which was received from the host in encrypted but uncompressed form, using MIPs and other processing resources of the storage controller instead of the host. In one embodiment, the storage controller decrypts encrypted but uncompressed data received from the host to unencrypted data and compresses the unencrypted data to compressed data. The storage controller then encrypts the compressed data to encrypted, compressed data and stores the encrypted, compressed data in a storage device controlled by the storage controller. Other aspects and advantages may be realized, depending upon the particular application.Type: GrantFiled: September 12, 2019Date of Patent: August 23, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew G. Borlick, Alistair Leask Symon, Micah Robison, Brian Anthony Rinaldi, Lokesh M. Gupta, Mark Elliott Hack
-
Publication number: 20220191180Abstract: Aspects of the present disclosure relate to encryption management. A determination can be made whether an encryption algorithm is at-risk. In response to determining that the encryption algorithm is at-risk, data protected by the encryption algorithm can be identified. A security action can then be executed on the data protected by the encryption algorithm.Type: ApplicationFiled: March 7, 2022Publication date: June 16, 2022Inventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Patent number: 11303618Abstract: Aspects of the present disclosure relate to encryption management. A determination can be made whether an encryption algorithm is at-risk. In response to determining that the encryption algorithm is at-risk, data protected by the encryption algorithm can be identified. A security action can then be executed on the data protected by the encryption algorithm.Type: GrantFiled: February 17, 2020Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Patent number: 11281808Abstract: A portable handheld device receives from a central repository, information on a failed hardware component of a computational device, wherein the information includes an authentication code to permit access to the failed hardware component and a time window in which the failed hardware component is permitted to be accessed. The portable handheld device uses the authentication code to access the failed hardware component for repair or replacement during the time window.Type: GrantFiled: January 28, 2020Date of Patent: March 22, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Markus Navarro, Micah Robison, Matthew G. Borlick, Lokesh Mohan Gupta, John Charles Elliott
-
Publication number: 20220075704Abstract: A machine learning module is trained by receiving inputs comprising attributes of a computing environment, where the attributes affect a likelihood of failure in the computing environment. In response to an event occurring in the computing environment, a risk score that indicates a predicted likelihood of failure in the computing environment is generated via forward propagation through a plurality of layers of the machine learning module. A margin of error is calculated based on comparing the generated risk score to an expected risk score, where the expected risk score indicates an expected likelihood of failure in the computing environment corresponding to the event. An adjustment is made of weights of links that interconnect nodes of the plurality of layers via back propagation to reduce the margin of error, to improve the predicted likelihood of failure in the computing environment.Type: ApplicationFiled: November 15, 2021Publication date: March 10, 2022Inventors: James E. Olson, Micah Robison, Matthew G. Borlick, Lokesh M. Gupta, Richard P. Oubre, JR., Usman Ahmed, Richard H. Hopkins
-
Publication number: 20220075676Abstract: Input on a plurality of attributes of a computing environment is provided to a machine learning module to produce an output value that comprises a risk score that indicates a likelihood of a potential malfunctioning occurring within the computing environment. A determination is made as to whether the risk score exceeds a predetermined threshold. In response to determining that the risk score exceeds a predetermined threshold, an indication is transmitted to indicate that potential malfunctioning is likely to occur within the computing environment. A modification is made to the computing environment to prevent the potential malfunctioning from occurring.Type: ApplicationFiled: November 15, 2021Publication date: March 10, 2022Inventors: James E. Olson, Micah Robison, Matthew G. Borlick, Lokesh M. Gupta, Richard P. Oubre, JR., Usman Ahmed, Richard H. Hopkins
-
Patent number: 11204802Abstract: Provided are techniques for adjusting a dispatch ratio for dispatching tasks from multiple queues. The dispatch ratio is set for each queue of a plurality of queues. A number of Central Processing Unit (CPU) cycles used by tasks from each of the plurality of queues during the interval is tracked. A CPU high percentage is determined that indicates a percentage of CPU cycles used by high priority tasks. In response to determining that the CPU high percentage is below a high threshold, a new dispatch ratio is calculated that indicates an increased number of high priority tasks are to be dispatched, and the new dispatch ratio is based on the CPU high percentage, the high threshold, and a current dispatches high value. The increased number of high priority tasks are dispatched from the high priority queue based on the new dispatch ratio during a new interval.Type: GrantFiled: April 27, 2020Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Matthew Richard Craig, Matthew J. Kalos, Matthew G. Borlick, Micah Robison, Lokesh Mohan Gupta
-
Patent number: 11200142Abstract: A machine learning module is trained by receiving inputs comprising attributes of a computing environment, where the attributes affect a likelihood of failure in the computing environment. In response to an event occurring in the computing environment, a risk score that indicates a predicted likelihood of failure in the computing environment is generated via forward propagation through a plurality of layers of the machine learning module. A margin of error is calculated based on comparing the generated risk score to an expected risk score, where the expected risk score indicates an expected likelihood of failure in the computing environment corresponding to the event. An adjustment is made of weights of links that interconnect nodes of the plurality of layers via back propagation to reduce the margin of error, to improve the predicted likelihood of failure in the computing environment.Type: GrantFiled: October 26, 2018Date of Patent: December 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James E. Olson, Micah Robison, Matthew G. Borlick, Lokesh M. Gupta, Richard P. Oubre, Jr., Usman Ahmed, Richard H. Hopkins
-
Patent number: 11200103Abstract: Input on a plurality of attributes of a computing environment is provided to a machine learning module to produce an output value that comprises a risk score that indicates a likelihood of a potential malfunctioning occurring within the computing environment. A determination is made as to whether the risk score exceeds a predetermined threshold. In response to determining that the risk score exceeds a predetermined threshold, an indication is transmitted to indicate that potential malfunctioning is likely to occur within the computing environment. A modification is made to the computing environment to prevent the potential malfunctioning from occurring.Type: GrantFiled: October 26, 2018Date of Patent: December 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James E. Olson, Micah Robison, Matthew G. Borlick, Lokesh M. Gupta, Richard P. Oubre, Jr., Usman Ahmed, Richard H. Hopkins
-
Patent number: 11163482Abstract: A method for dynamically altering the performance class of multiple storage drives is disclosed. In one embodiment, such a method monitors, within a storage environment, characteristics (e.g., age, wear, etc.) of multiple storage drives. Each storage drive has a performance class associated therewith. Based on the characteristics, the method periodically modifies the performance class of the storage drives. The method then reorganizes the storage drives within various storage groups (e.g., RAID arrays, storage tiers, workloads, etc.) based on their performance class. For example, the method may place, as much as possible, storage drives of the same performance class within the same storage groups. A corresponding system and computer program product are also disclosed.Type: GrantFiled: June 26, 2019Date of Patent: November 2, 2021Assignee: International Business Machines CorporationInventors: Lokesh M. Gupta, Matthew G. Borlick, Karl A. Nielsen, Micah Robison
-
Publication number: 20210334133Abstract: Provided are techniques for adjusting a dispatch ratio for dispatching tasks from multiple queues. The dispatch ratio is set for each queue of a plurality of queues. A number of Central Processing Unit (CPU) cycles used by tasks from each of the plurality of queues during the interval is tracked. A CPU high percentage is determined that indicates a percentage of CPU cycles used by high priority tasks. In response to determining that the CPU high percentage is below a high threshold, a new dispatch ratio is calculated that indicates an increased number of high priority tasks are to be dispatched, and the new dispatch ratio is based on the CPU high percentage, the high threshold, and a current dispatches high value. The increased number of high priority tasks are dispatched from the high priority queue based on the new dispatch ratio during a new interval.Type: ApplicationFiled: April 27, 2020Publication date: October 28, 2021Inventors: Matthew Richard Craig, Matthew J. Kalos, Matthew G. Borlick, Micah Robison, Lokesh Mohan Gupta
-
Patent number: 11137915Abstract: A method for dynamically altering logical storage capacity within multiple storage drives is disclosed. In one embodiment, such a method monitors, within a storage environment, characteristics (e.g., age, wear, etc.) of multiple storage drives. Each storage drive has an amount of overprovisioning associated therewith. Based on the characteristics, the method periodically modifies a logical storage capacity of the storage drives in order to alter the amount of overprovisioning. The method then reorganizes the storage drives within various storage groups (e.g., RAID arrays, storage tiers, workloads, etc.) based on their logical storage capacity. For example, the method may place, as much as possible, storage drives of the same logical storage capacity within the same storage groups. A corresponding system and computer program product are also disclosed.Type: GrantFiled: June 27, 2019Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Lokesh M. Gupta, Matthew G. Borlick, Karl A. Nielsen, Micah Robison
-
Publication number: 20210256147Abstract: Aspects of the present disclosure relate to encryption management. An indication of a data set to be tagged with an encryption tag is received. A location for the encryption tag is determined. The encryption tag is stored at the location, where the encryption tag includes an encryption status indicator specifying whether or not the data is encrypted and an encryption algorithm indicator specifying an encryption algorithm used to encrypt the data.Type: ApplicationFiled: February 17, 2020Publication date: August 19, 2021Inventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Publication number: 20210258290Abstract: Aspects of the present disclosure relate to encryption management. A determination can be made whether an encryption algorithm is at-risk. In response to determining that the encryption algorithm is at-risk, data protected by the encryption algorithm can be identified. A security action can then be executed on the data protected by the encryption algorithm.Type: ApplicationFiled: February 17, 2020Publication date: August 19, 2021Inventors: Lokesh Mohan Gupta, Matthew G. Borlick, Mark Elliott Hack, Micah Robison
-
Publication number: 20210232712Abstract: A portable handheld device receives from a central repository, information on a failed hardware component of a computational device, wherein the information includes an authentication code to permit access to the failed hardware component and a time window in which the failed hardware component is permitted to be accessed. The portable handheld device uses the authentication code to access the failed hardware component for repair or replacement during the time window.Type: ApplicationFiled: January 28, 2020Publication date: July 29, 2021Inventors: Markus Navarro, Micah Robison, Matthew G. Borlick, Lokesh Mohan Gupta, John Charles Elliott
-
Patent number: 11049570Abstract: A method for dynamically altering a writes-per-day classification of multiple storage drives is disclosed. In one embodiment, such a method monitors, within a storage environment, an amount of overprovisioning utilized by multiple storage drives. Each storage drive has a writes-per-day classification associated therewith. Based on the amount of overprovisioning, the method periodically modifies the writes-per-day classification of the storage drives. The method then reorganizes the storage drives within various storage groups (e.g., RAID arrays, storage tiers, workloads, etc.) based on their writes-per-day classification. For example, the method may place, as much as possible, storage drives of the same writes-per-day classification within the same storage groups. A corresponding system and computer program product are also disclosed.Type: GrantFiled: June 26, 2019Date of Patent: June 29, 2021Assignee: International Business Machines CorporationInventors: Lokesh M. Gupta, Matthew G. Borlick, Karl A. Nielsen, Micah Robison
-
Publication number: 20210182396Abstract: Provided are a computer program product, system, and method for determining a frequency at which to execute trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. Trap code is executed in response to processing a specified type of command in application code to allocate a trap address range used to detect potentially malicious code. A determination is whether to modify a frequency of executing the trap code in response to processing a specified type of command. The frequency of executing the trap code is modified in response to processing the specified type of command in response to determining to determining to modify the frequency of executing the trap code.Type: ApplicationFiled: February 19, 2021Publication date: June 17, 2021Inventors: Lokesh M. Gupta, Matthew G. Borlick, Trung N. Nguyen, Micah Robison