Patents by Inventor Michael S. Law
Michael S. Law has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240112120Abstract: A process of determining a sentiment score from a response from at least one individual regarding a status of a project that includes receiving a first numerical rating regarding the status of the project from a first individual of the at least one individual, receiving a first textual description regarding the heath of the project from the first individual, determining a first textual score dependent upon the first textual description with the first textual score being a numerical representation of the first textual description, and aggregating the first numerical rating and the first textual score to determine a first sentiment score reflective of the status of the project by the first individual.Type: ApplicationFiled: October 3, 2022Publication date: April 4, 2024Inventors: Benjamin Lee Burke, Jason Bradford Laws, Delijah S. Williams, Michael McKernan
-
Patent number: 11755717Abstract: A method, apparatus, system, and computer program product for configuring a computing environment. A configuration profile is identified by a computer system for the computing environment that is to be deployed in which the computing environment meets a security policy to run an application in the computing environment. A determination is made, by the computer system, as to whether the configuration profile for the computing environment meets the security policy for running the application in the computing environment. The configuration profile for the computing environment is deployed, by the computer system, to configure the computing environment for the application in response to the configuration profile meeting the security policy.Type: GrantFiled: March 18, 2021Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Adam Robert Geiger, Nataraj Nagaratnam, Dinakaran Joseph, Michael S. Law, Priyank Narvekar, Hillery Hunter
-
Publication number: 20220300603Abstract: A method, apparatus, system, and computer program product for configuring a computing environment. A configuration profile is identified by a computer system for the computing environment that is to be deployed in which the computing environment meets a security policy to run an application in the computing environment. A determination is made, by the computer system, as to whether the configuration profile for the computing environment meets the security policy for running the application in the computing environment. The configuration profile for the computing environment is deployed, by the computer system, to configure the computing environment for the application in response to the configuration profile meeting the security policy.Type: ApplicationFiled: March 18, 2021Publication date: September 22, 2022Inventors: Adam Robert Geiger, Nataraj Nagaratnam, Dinakaran Joseph, Michael S. Law, Priyank Narvekar, Hillery Hunter
-
Patent number: 11210123Abstract: A method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: GrantFiled: May 31, 2017Date of Patent: December 28, 2021Assignee: International Business Machines CorporationInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby
-
Publication number: 20170329624Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: ApplicationFiled: May 31, 2017Publication date: November 16, 2017Inventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby
-
Patent number: 9720852Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.Type: GrantFiled: March 29, 2013Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
-
Patent number: 9720853Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.Type: GrantFiled: April 1, 2013Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
-
Patent number: 9715401Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: GrantFiled: September 15, 2008Date of Patent: July 25, 2017Assignee: International Business Machines CorporationInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, Jr.
-
Patent number: 9300726Abstract: A method, system and computer program product for optimizing quality of service settings for virtual machine deployment and migration. A first network (e.g., user network) is provided that is dedicated to running user workloads deployed on virtual machines. A second network (e.g., cloud management network), isolated from the first network, is also provided that is dedicated to virtual machine deployment and migration. As a result of the first and second networks not being shared, the administrative server utilizes unique quality of service settings for virtual machine deployment and migration supported by the second network that would otherwise not be possible if the first and second networks were shared.Type: GrantFiled: January 15, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Roy F. Brabson, Lap T. Huynh, Michael S. Law, Mickael Maison, Matthew J. Sheard
-
Patent number: 9009359Abstract: A method, system and computer program product for efficiently configuring different types of hardware components. A computing device is connected to a hardware component to be configured. The computing device detects the type of the hardware component upon being connected to the hardware component. The computing device then identifies a profile from among multiple profiles associated with the detected type of hardware component, where each profile contains a configuration file(s) for configuring its associated type of hardware component. Upon identifying the profile associated with the connected hardware component, the computing device emulates a Universal Serial Bus (USB) key presenting the configuration file(s) contained in the identified profile to the detected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the computing device emulate multiple USB keys.Type: GrantFiled: March 29, 2013Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
-
Publication number: 20140297894Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.Type: ApplicationFiled: March 29, 2013Publication date: October 2, 2014Applicant: International Business Machines CorporationInventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
-
Publication number: 20140297895Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.Type: ApplicationFiled: April 1, 2013Publication date: October 2, 2014Inventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
-
Publication number: 20140201365Abstract: A method, system and computer program product for optimizing quality of service settings for virtual machine deployment and migration. A first network (e.g., user network) is provided that is dedicated to running user workloads deployed on virtual machines. A second network (e.g., cloud management network), isolated from the first network, is also provided that is dedicated to virtual machine deployment and migration. As a result of the first and second networks not being shared, the administrative server utilizes unique quality of service settings for virtual machine deployment and migration supported by the second network that would otherwise not be possible if the first and second networks were shared.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith K. Ashok, Roy F. Brabson, Lap T. Huynh, Michael S. Law, Mickael Maison, Matthew J. Sheard
-
Publication number: 20130204918Abstract: According to one aspect of the present disclosure a method and technique for automatically configuring a set of resources for deployment as a computing environment is disclosed.Type: ApplicationFiled: February 8, 2012Publication date: August 8, 2013Applicant: International Business Machines CorporationInventors: Rohith K. Ashok, Michael J. Burr, Christine B. Chato, Adam R. Geiger, Matt R. Hogstrom, Michael S. Law, Matthew J. Sheard
-
Publication number: 20100071025Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, JR.