Patents by Inventor Michael S. McKay
Michael S. McKay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11507355Abstract: In an approach, a process intercepts a deployment resource associated with software prior to deploying the software to a node, where the deployment resource configures how the software is deployed and operates. A processor verifies authenticity of a digital signature present within the deployment resource. A processor, responsive to verifying the authenticity of the digital signature, deploys the software to the node in accordance with the deployment resource.Type: GrantFiled: July 20, 2020Date of Patent: November 22, 2022Assignee: International Business Machines CorporationInventors: Michael S. McKay, Jacob Andrew Kitchener, Richard Adam King, Alexander Lewitt
-
Publication number: 20220019418Abstract: In an approach, a process intercepts a deployment resource associated with software prior to deploying the software to a node, where the deployment resource configures how the software is deployed and operates. A processor verifies authenticity of a digital signature present within the deployment resource. A processor, responsive to verifying the authenticity of the digital signature, deploys the software to the node in accordance with the deployment resource.Type: ApplicationFiled: July 20, 2020Publication date: January 20, 2022Inventors: Michael S. McKay, Jacob Andrew Kitchener, Richard Adam King, Alexander Lewit
-
Patent number: 11086661Abstract: A method obtains a configuration for an automated process that includes discrete tasks. The configuration specifies a corresponding container image, of a plurality of different container images, for each discrete task of the discrete tasks, and further specifies a sequence in which to instantiate a plurality of containers from the plurality of container images to perform the discrete tasks and complete the automated process. The method identifies from the configuration a next container image from which to instantiate a next container for execution to perform a next discrete task, the next discrete task corresponding to the next container image and next container instantiated from the next container image. The method initiates instantiation of the next container from the next container image to initiate execution of the container to perform the next discrete task. The method also repeats the identifying and the initiating instantiation for each next container image.Type: GrantFiled: May 17, 2019Date of Patent: August 10, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Geoffrey W. Corey, Michael D. Elder, Michael S. Mckay, Daniel D. K. Stratton
-
Publication number: 20190272199Abstract: A method obtains a configuration for an automated process that includes discrete tasks. The configuration specifies a corresponding container image, of a plurality of different container images, for each discrete task of the discrete tasks, and further specifies a sequence in which to instantiate a plurality of containers from the plurality of container images to perform the discrete tasks and complete the automated process. The method identifies from the configuration a next container image from which to instantiate a next container for execution to perform a next discrete task, the next discrete task corresponding to the next container image and next container instantiated from the next container image. The method initiates instantiation of the next container from the next container image to initiate execution of the container to perform the next discrete task. The method also repeats the identifying and the initiating instantiation for each next container image.Type: ApplicationFiled: May 17, 2019Publication date: September 5, 2019Inventors: Geoffrey W. COREY, Michael D. ELDER, Michael S. MCKAY, Daniel D.K. STRATTON
-
Patent number: 10387199Abstract: A method obtains a configuration for an automated process that includes discrete tasks. The configuration specifies a corresponding container image, of a plurality of different container images, for each discrete task of the discrete tasks, and further specifies a sequence in which to instantiate a plurality of containers from the plurality of container images to perform the discrete tasks and complete the automated process. The method identifies from the configuration a next container image from which to instantiate a next container for execution to perform a next discrete task, the next discrete task corresponding to the next container image and next container instantiated from the next container image. The method initiates instantiation of the next container from the next container image to initiate execution of the container to perform the next discrete task. The method also repeats the identifying and the initiating instantiation for each next container image.Type: GrantFiled: March 31, 2017Date of Patent: August 20, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Geoffrey W. Corey, Michael D. Elder, Michael S. McKay, Daniel D. K. Stratton
-
Publication number: 20180285156Abstract: A method obtains a configuration for an automated process that includes discrete tasks. The configuration specifies a corresponding container image, of a plurality of different container images, for each discrete task of the discrete tasks, and further specifies a sequence in which to instantiate a plurality of containers from the plurality of container images to perform the discrete tasks and complete the automated process. The method identifies from the configuration a next container image from which to instantiate a next container for execution to perform a next discrete task, the next discrete task corresponding to the next container image and next container instantiated from the next container image. The method initiates instantiation of the next container from the next container image to initiate execution of the container to perform the next discrete task. The method also repeats the identifying and the initiating instantiation for each next container image.Type: ApplicationFiled: March 31, 2017Publication date: October 4, 2018Inventors: Geoffrey W. COREY, Michael D. ELDER, Michael S. MCKAY, Daniel D.K. STRATTON
-
Patent number: 9747124Abstract: Embodiments of the present invention and provide a method for distributed virtual machine (VM) image management in a cloud computing management includes receiving in a hypervisor executing in memory of a host computer, a request for VM image data from a VM and determining whether or not the requested VM image data is present in a local cache of either the hypervisor of the host computer or in a cache of a hypervisor of a peer host. The method additionally includes retrieving the requested VM image data from a seed image in a remote data store in the cloud computing environment only when it is determined that the VM image data neither is present in the local cache of the hypervisor of the host computer nor is present in the cache of the hypervisor of the peer host.Type: GrantFiled: November 9, 2015Date of Patent: August 29, 2017Assignee: International Business Machines CorporationInventors: Charles D. Brant, Samar Choudhary, John M. Garrison, Michael S. McKay
-
Patent number: 8140573Abstract: A metadata file can be automatically generated based on a database instance and a user defined maximum depth. The relationships between data objects that constitute a business object may be visualized in a tree. The maximum depth limits the number of levels in the tree to traverse. A metadata file describes the structure of a business object and relationships between sets of data objects that constitute the business object. The structure defined in the metadata file can be used to export instances of the business object from the database. The exported business object instances can be imported to another database.Type: GrantFiled: June 15, 2009Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Michael S. McKay, Georg Ochs, Jeremias Werner
-
Patent number: 7958460Abstract: A method simplified drag and drop operations of display icons. This method calculates a projected path for an icon based on the past movement of the icon. The method highlights the “best fit” target icon as the mouse pointer moves across the screen. As the mouse pointer moves, or changes direction, the “best fit” target icon can change, with the current best-fit icon being highlighted. In addition to highlighting the target icon, a line or arrow from the mouse pointer to the target icon is maintained. The line presents the predicted path in a very noticeable, visual way. As the best-fit target icon changes, the line is re-drawn to point to the current best-fit icon. Regardless of how the target icon is visually indicated, releasing the mouse button will cause the drop operation to be completed “into” target. Completion of the drop could be instantaneous, or could be rendered with animation of some sort to indicate moving from the source to the target.Type: GrantFiled: October 30, 2007Date of Patent: June 7, 2011Assignee: International Business Machines CorporationInventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20100318556Abstract: A metadata file can be automatically generated based on a database instance and a user defined maximum depth. The relationships between data objects that constitute a business object may be visualized in a tree. The maximum depth limits the number of levels in the tree to traverse. A metadata file describes the structure of a business object and relationships between sets of data objects that constitute the business object. The structure defined in the metadata file can be used to export instances of the business object from the database. The exported business object instances can be imported to another database.Type: ApplicationFiled: June 15, 2009Publication date: December 16, 2010Applicant: Internatinal Business Machines CorporationInventors: Michael S. McKay, Georg Ochs, Jeremias Werner
-
Publication number: 20090109961Abstract: Illustrative embodiments provide a computer implemented method, apparatus, and computer program product for more effectively managing multiple call situations using voice over internet protocol. In one illustrative embodiment, the computer implemented method comprising, responsive to receiving a request to monitor a call from among multiple simultaneous calls using voice over internet protocol, creating a set of trigger criteria for the call and monitoring the call for the set of trigger criteria. Responsive to one of the set of trigger criteria having been met, identifying a triggered criteria and selectively invoking a rule with respect to the triggered criteria to produce a result, and notifying a requester of the result.Type: ApplicationFiled: October 31, 2007Publication date: April 30, 2009Inventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20090113330Abstract: A method simplified drag and drop operations of display icons. This method calculates a projected path for an icon based on the past movement of the icon. The method highlights the “best fit” target icon as the mouse pointer moves across the screen. As the mouse pointer moves, or changes direction, the “best fit” target icon can change, with the current best-fit icon being highlighted. In addition to highlighting the target icon, a line or arrow from the mouse pointer to the target icon is maintained. The line presents the predicted path in a very noticeable, visual way. As the best-fit target icon changes, the line is re-drawn to point to the current best-fit icon. Regardless of how the target icon is visually indicated, releasing the mouse button will cause the drop operation to be completed “into” target. Completion of the drop could be instantaneous, or could be rendered with animation of some sort to indicate moving from the source to the target.Type: ApplicationFiled: October 30, 2007Publication date: April 30, 2009Inventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20090100335Abstract: A computer implemented method, apparatus, and computer usable program product for implementing wildcard patterns for a spellchecking operation. The process parses a set of words of a document using a dictionary of wildcard patterns to identify a set of wildcard strings in response to receiving a request to perform a spellchecking operation on the document. Thereafter, the process generates a visual cue identifying a subset of words as potentially misspelled, wherein the subset of words comprises words from the set of words that are absent from the set of wildcard strings.Type: ApplicationFiled: October 10, 2007Publication date: April 16, 2009Inventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20090089680Abstract: A computer implemented method, data processing system, and a computer program product are provided for resolving uniform resource locator addresses. A first uniform resource locator address is input from a user. The first uniform resource locator address is identified within a database list of uniform resource locator addresses. Each of the list of uniform resource locator addresses corresponds to a second uniform resource locator address contained in the database. Responsive to identifying the first uniform resource locator address with the list of uniform resource locator addresses, information for the corresponding second uniform resource locator address is displayed.Type: ApplicationFiled: September 27, 2007Publication date: April 2, 2009Inventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20080307367Abstract: A computer implemented method, apparatus, and computer program product for transferring a file item. The process selects a file item in response to receiving a first input command. The process selects a file item in response to receiving a first input command. The process then identifies a file path name from a hierarchical file path to form a selected file path name. The file path name is identified by detecting a pointer passing over the file path name. In response to receiving a second input command, the process transfers the file item to a storage location associated with the selected file path name.Type: ApplicationFiled: June 7, 2007Publication date: December 11, 2008Inventors: John Michael Garrison, Michael S. McKay
-
Publication number: 20080115202Abstract: A method of bidirectional communication through a firewall includes opening a command channel across the firewall between a gateway manager within a secure network and a gateway service and receiving a resource request via the command channel from the gateway service at the gateway manager. The method further includes determining a resource within the secure network and an agent associated with the resource request, sending a resource access notification from the gateway manager to the determined resource, and receiving a resource communication from the associated resource responsive to the notification. The method further includes tying the associated resource to the agent based on the resource communication.Type: ApplicationFiled: November 9, 2006Publication date: May 15, 2008Inventor: Michael S. McKay