Patents by Inventor Michael Mirt

Michael Mirt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8312466
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: November 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor S. Moore
  • Patent number: 8145751
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: March 27, 2012
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael Mirt
  • Patent number: 8024713
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Grant
    Filed: December 24, 2007
    Date of Patent: September 20, 2011
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor S. Moore
  • Publication number: 20090113395
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Application
    Filed: December 31, 2008
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20090083749
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: December 2, 2008
    Publication date: March 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
  • Patent number: 7493387
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael Mirt
  • Patent number: 7480914
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
  • Patent number: 7472184
    Abstract: A method for restricting resources consumed by a ghost agent can include the step of identifying a host, which is a software object operating within the grid environment and movable from one grid to another grid within the grid environment. The method also can include the step of associating a ghost agent with the host. The ghost agent is configured to replicate and record at least one action of the host and follows the movement of the associated host. Additionally, the ghost agent can be registered with a ghost registry of the domain in which it is disposed. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: December 30, 2008
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
  • Patent number: 7386837
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
  • Publication number: 20080104578
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: December 24, 2007
    Publication date: May 1, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20070133777
    Abstract: A method, system and computer program for automatically generating call flow statistics in a voice application. Embodiments of the present invention address deficiencies of the art in respect to call flow statistics generation systems and provide a novel and non-obvious method, system and computer program product for automatically generating a call flow statistics-generating application and presenting updated statistics on a call flow representation. Various statistics collection points are identified on the visual representation. Upon running of the voice application, call flow statistics are gathered and presented for each statistics collection point. Call identifiers corresponding to each call path can be selected and call paths corresponding to the selected call identifier may be highlighted and their call statistics displayed.
    Type: Application
    Filed: December 8, 2005
    Publication date: June 14, 2007
    Applicant: International Business Machines Corporation
    Inventors: Ciprian Agapi, James Lewis, Michael Mirt
  • Publication number: 20070003037
    Abstract: A method (100) and system (30) to enable automatic generation and testing of voice applications includes generating (102) a test driver application (TDA) (32) and generating (104) a modified original voice application (34) to be tested by the TDA within a call flow builder (10). The modified application can include or generate (106) “test hooks” or more particularly DTMF tones and DTMF grammars that can be used to synchronize the modified original voice application with the TDA. The TDA can test (110) all possible paths of the modified original voice application. Note the TDA and the modified original voice application can be generated and/or tested (112) in a test environment within the call flow builder or a telephony environment. The TDA can be automatically generated (108) to exercise all possible flows where the DTMF tones define the current state and location of the modified application.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 4, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ciprian Agapi, Michael Mirt, Charles Sumner
  • Publication number: 20060062370
    Abstract: A call completion system, method and apparatus for integrated directory assistance and voice activated dialing based upon call transfer rules. In accordance with the present invention, a call completion system can include a set of call transfer rules implicating one of a directory assistance interface and a voice activated dialer interface. The system further can include a call completion processor configured to select one of a directory assistance interface and a voice activated dialer interface based upon an evaluation of the call transfer rules for an incoming query.
    Type: Application
    Filed: September 22, 2004
    Publication date: March 23, 2006
    Applicant: International Business Machines Corporation
    Inventors: Ciprian Agapi, Can Boyacigiller, Brent Davis, Joseph Herman, Vanessa Michelini, Michael Mirt, Melanie Polkosky, Jonathan White, Frankie Wilson
  • Publication number: 20050076192
    Abstract: A testing method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host. The actions of the host can be replicated within the ghost agent. At least one test routine can be loaded into the ghost agent. The test routine can be executed within the ghost agent. Moreover, the executing step can utilize data gathered from the replicated actions. Test output can be generated from the test routine.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20050065803
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050065992
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050066309
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20050065994
    Abstract: A method for restricting resources consumed by a ghost agent can include the step of registering a ghost agent within a domain. The ghost agent can move across domains of a grid environment responsive to movements of an associated host. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore