Patents by Inventor Michael H. Nolterieke

Michael H. Nolterieke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8578144
    Abstract: Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed.
    Type: Grant
    Filed: August 4, 2010
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Fred A. Bower, III, Michael H. Nolterieke, William G. Pagan
  • Patent number: 8451748
    Abstract: Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: May 28, 2013
    Assignee: International Business Machines Corporation
    Inventors: Michael H. Nolterieke, David B. Rhoades, Norman C. Strole
  • Publication number: 20130103974
    Abstract: Managing firmware in a computing system storing a plurality of different firmware images for the same firmware includes: calculating, for each firmware image in dependence upon a plurality of predefined factors, a preference score; responsive to a failure of a particular firmware image, selecting a firmware image having a highest preference score; and failing over to the selected firmware image.
    Type: Application
    Filed: October 25, 2011
    Publication date: April 25, 2013
    Applicant: International Business Machines Corporation
    Inventors: Fred A. Bower, III, Michael H. Nolterieke, William G. Pagan, Paul B. Tippett
  • Publication number: 20120272243
    Abstract: A method includes running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources.
    Type: Application
    Filed: July 3, 2012
    Publication date: October 25, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan, Edward S. Suffern
  • Publication number: 20120272001
    Abstract: Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array.
    Type: Application
    Filed: July 3, 2012
    Publication date: October 25, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan, Devon D. Snyder
  • Publication number: 20120213119
    Abstract: Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server.
    Type: Application
    Filed: April 27, 2012
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, David B. Rhoades, Norman C. Strole
  • Patent number: 8243611
    Abstract: Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server.
    Type: Grant
    Filed: December 4, 2006
    Date of Patent: August 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Michael H. Nolterieke, David B. Rhoades, Norman C. Strole
  • Publication number: 20120154165
    Abstract: In one embodiment, a computer system has a plurality of chassis interconnected by cables. Each cable initially connects a unique port pair consisting of a port of one chassis and a port of another chassis. The disconnection of cables is monitored, including electronically recording a disconnection sequence in which the port pairs are disconnected by removing each cable from at least one port of the respective port pair. Visual guidance is provided for re-cabling the computer system by sequentially identifying the port pairs in a reversal of the disconnection sequence, wherein identifying each port pair includes illuminating visual indicators associated with the ports of each port pair with a matching illumination pattern.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fred A. Bower, III, Michael H. Nolterieke, William G. Pagan
  • Publication number: 20120137289
    Abstract: A computer program product is provided, including computer usable program code for running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and computer usable program code for setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources.
    Type: Application
    Filed: November 30, 2010
    Publication date: May 31, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan, Edward S. Suffern
  • Publication number: 20120137066
    Abstract: Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array.
    Type: Application
    Filed: November 30, 2010
    Publication date: May 31, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan, Devon D. Snyder
  • Publication number: 20120079414
    Abstract: Content presentation using on-demand user interfaces is provided. One embodiment comprises detecting position of a pointer by a user relative to a content element in a graphical user interface displayed on an electronic display screen; displaying a popup window at a location on the graphical user interface while the pointer hovers over the content element, wherein the popup window includes a bump zone indicating that the popup window is moveable; detecting proximity of the pointer relative to the bump zone while the pointer hovers over the content element; and transitioning the popup window to a new location on the graphical user interface based on the detected proximity and movement of the pointer relative to the bump zone.
    Type: Application
    Filed: September 28, 2010
    Publication date: March 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd M. Eischeid, John P. Franks, Mark E. Molander, Michael H. Nolterieke
  • Publication number: 20120036346
    Abstract: Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed.
    Type: Application
    Filed: August 4, 2010
    Publication date: February 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: FRED A. BOWER, III, MICHAEL H. NOLTERIEKE, WILLIAM G. PAGAN
  • Publication number: 20110289327
    Abstract: In one embodiment, a fixed chassis power budget is dynamically allocated to a plurality of servers inserted into a multi-server chassis. An inserted server may be inventoried by sequentially identifying server components, categorically-defined component power limits, and actual component power requirements of the inventoried components. A power permission may be granted to the inserted server prior to completion of the inventory, based on power-related information inferred from a chassis and server specification or from the inventoried components.
    Type: Application
    Filed: May 24, 2010
    Publication date: November 24, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan
  • Publication number: 20110282979
    Abstract: In a data center that includes a number of chassis, with each chassis including a chassis management module and a number of slots, each slot associated with a service processor: network address assignment includes discovering, by a chassis management module of a particular chassis, one or more other chassis management modules; negotiating, by the chassis management module with the other chassis management modules via IPv6 data communications, a chassis-specific range of IPv4 addresses available for assignment to service processors of the particular chassis; providing, by the chassis management module to the service processors of the particular chassis, in dependence upon the chassis-specific range of IPv4 addresses, a base IPv4 address; and determining, by each service processor of the particular chassis, in dependence upon the base IPv4 address and a slot identifier of the slot associated with the service processor, an IPv4 address for the service processor.
    Type: Application
    Filed: May 12, 2010
    Publication date: November 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fred A. Bower, III, Michael H. Nolterieke, William G. Pagan
  • Publication number: 20110279266
    Abstract: A system and method for guiding server chassis enumeration in a computer system are disclosed. One embodiment provides a method of connecting a plurality of computer server chassis configured as a plurality of nodes. For each cable connection between any two server chassis, a port on the first of the two server chassis to which a first end of a cable is connected is identified, and a port on the second server chassis to which a second end of the cable is connected is identified. The node containing second server chassis is uniquely designated by the port designator on the first server chassis, and the node containing the first server chassis is uniquely designated by the port designator on the second server chassis. An electronic alert is generated in response to any conflicting node designator.
    Type: Application
    Filed: May 12, 2010
    Publication date: November 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan
  • Publication number: 20110154313
    Abstract: Updating a firmware package including receiving an update package for the firmware package, the firmware package including currently installed components supporting one of a plurality of software layers, the update package including update components that correspond to the currently installed components; retrieving information describing a state of the currently installed components; comparing the information describing the state of the currently installed components to information describing a state of the corresponding update components; constructing a revised update package that includes only update components having a state more recent than the state of the corresponding currently installed components; and updating the currently installed components with corresponding update components of the revised update package.
    Type: Application
    Filed: December 21, 2009
    Publication date: June 23, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan
  • Publication number: 20110106886
    Abstract: Propagating firmware updates in a peer-to-peer network including identifying, that one or more nodes in the network have firmware that is uplevel with respect to the downlevel node; broadcasting an update request requesting an update to the firmware; receiving, from a plurality of nodes having firmware uplevel with respect to the downlevel node, a plurality of portions of the update, metadata describing each portion of the update received, and metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node; determining, in dependence upon the metadata describing each portion of the update received and the metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node, whether the portions of the update received comprise an entire update; and updating the firmware if the portions of the update received comprise the entire update.
    Type: Application
    Filed: November 4, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan
  • Publication number: 20110107317
    Abstract: Propagating firmware updates in a RAID array including identifying, by a RAID controller, that a first drive has a firmware that is uplevel with respect to firmware of at least one other drive, the RAID controller comprising a module of automated computing machinery; selecting, by the RAID controller, a second drive having downlevel firmware with respect to the firmware of the first drive; obtaining, by the RAID controller, an uplevel firmware image from the first drive; and updating, by the RAID controller, the downlevel firmware on the selected second drive with the obtained firmware image.
    Type: Application
    Filed: October 30, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael H. Nolterieke, William G. Pagan
  • Patent number: 7930425
    Abstract: Aspects of the present invention include a method, apparatus and device for establishing and maintaining communication with a network interface device and its link partner, such as a switch means or switch, where the network interface device identifies the type of link partner it is in communication with, determines the integrity of the link partner via a management module, and maintains a communication link in relation to the identified integrity status.
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Warren D. Bailey, Michael H. Nolterieke
  • Publication number: 20090077413
    Abstract: An apparatus, system, and method are disclosed to failover to a standby server when a primary server is under broadcast storm or denial-of-service (“DoS”) attack. A primary attack sensing module is included to monitor a rate of incoming data from a computer network to a primary server and to determine if the rate of incoming data is above a primary data rate threshold. A standby contact module is included to request a standby data rate status from a standby server in response to the primary attack module determining that the rate of incoming data to the primary server is above the primary data rate threshold. The standby server is connected to the primary server over a private network. The standby data rate status includes a determination by the standby server of whether a rate of data received by the standby server is above a standby data rate threshold. A standby receiver module is included to receive a standby data rate status from the standby server over the private network.
    Type: Application
    Filed: September 17, 2007
    Publication date: March 19, 2009
    Applicant: International Business Machines Corporation
    Inventors: Gregory W. Dake, Jeffery M. Franke, Phuong T. Nguyen, Michael H. Nolterieke, Torez Smith, John K. Whetzel