Patents by Inventor Neil Pennell
Neil Pennell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8917744Abstract: A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment.Type: GrantFiled: March 10, 2011Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Catherine H. Crawford, David B. Kumhyr, Paolo F. Magnone, Neil Pennell
-
Patent number: 8122035Abstract: Transactions with respect to database operations are fingerprinted by associating transaction identifiers with logged information about those database operations. An SQL query is obtained prior to its evaluation by a database engine. A transaction identifier to be associated with the SQL query is also obtained. The SQL query is then modified to generate a modified SQL query, wherein the modified SQL query includes a WHERE clause that contains an expression that always evaluates to a logical true value, and wherein the expression contains the transaction identifier. The modified SQL query is then sent to the database engine for evaluation within the data processing system. When the processing of the modified SQL query is logged with a copy of the modified SQL query, the logged information contains a copy of the transaction identifier.Type: GrantFiled: June 28, 2005Date of Patent: February 21, 2012Assignee: International Business Machines CorporationInventors: Edward T. Childress, Rhonda L. Childress, David B. Kumhyr, Neil Pennell
-
Publication number: 20080002596Abstract: A method, apparatus, and computer instructions for identifying nodes in a network data processing system. Cache data is received from a set of routers in the data processing system. The cache data includes an identification of the nodes sending data packets onto the network data processing system. The nodes on the network data processing system are identified using the cache data from the set of routers.Type: ApplicationFiled: September 14, 2007Publication date: January 3, 2008Inventors: RHONDA CHILDRESS, DAVID KUMHYR, NEIL PENNELL
-
Publication number: 20070101000Abstract: A computer implemented method, apparatus and computer usable program code for dynamically changing allocation policy in a host grid to support a local grid. The host grid is operated according to a set of allocation policies. The set of allocation policies corresponds to a predetermined resource allocation relationship between the host grid and a local grid. Based on the set of allocation policies, at least one resource on the host grid is allocated to the local grid. A monitoring agent is then used to monitor one of the local grid and both the local grid and the host grid for a change in a parameter. A change in the parameter may result in a change in the set of allocation policies.Type: ApplicationFiled: November 1, 2005Publication date: May 3, 2007Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell, Christopher Reech
-
Publication number: 20070094400Abstract: Methods, apparatuses, and computer program products are provided for software installation within a federation. Embodiments include receiving, by an installation administration proxy server from a user agent installed on a user computer, an install request; validating, by the installation administration proxy server, the install request including validating a security token associated with the install request and identifying, by the installation administration proxy server, a trusted software installation server to install software associated with the install request on the user computer. The installation administration proxy server, the user agent, and the trusted software installation server comprise entities in the federation. Typical embodiments also include installing, by the trusted software installation server, software on the user computer in accordance with software installation rules.Type: ApplicationFiled: October 20, 2005Publication date: April 26, 2007Inventors: Rhonda Childress, David Kumhyr, Neil Pennell
-
Publication number: 20070046282Abstract: Generating a description of a test grid environment for use in a grid computing environment. A database containing a number of test snapshots is generated. Each test snapshot reflects a previously used grid test environment, and each test snapshot includes a grid configuration used to implement a particular test scenario for a particular application. When a new, desired, test scenario is generated, a description of the new test scenario is entered as a query to the database. Based on the information in the database, a proposed test grid environment description is produced.Type: ApplicationFiled: August 31, 2005Publication date: March 1, 2007Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
-
Publication number: 20060294057Abstract: Transactions with respect to database operations are fingerprinted by associating transaction identifiers with logged information about those database operations. An SQL query is obtained prior to its evaluation by a database engine. A transaction identifier to be associated with the SQL query is also obtained. The SQL query is then modified to generate a modified SQL query, wherein the modified SQL query includes a WHERE clause that contains an expression that always evaluates to a logical true value, and wherein the expression contains the transaction identifier. The modified SQL query is then sent to the database engine for evaluation within the data processing system. When the processing of the modified SQL query is logged with a copy of the modified SQL query, the logged information contains a copy of the transaction identifier.Type: ApplicationFiled: June 28, 2005Publication date: December 28, 2006Inventors: Edward Childress, Rhonda Childress, David Kumhyr, Neil Pennell
-
Publication number: 20060227810Abstract: A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment.Type: ApplicationFiled: April 7, 2005Publication date: October 12, 2006Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
-
Publication number: 20060225070Abstract: Setting up management and monitoring programs on one or more servers is simplified. When a pre-selected monitoring/management vendor is to be used, a general-purpose agent is installed after the vendor agent is installed and can determine the contents of the server(s), then manage additional setup for the vendor agent, such as configurations, best practices, and license management. When the user has not yet determined which vendor or vendors to utilize, a vendor-neutral agent will determine the contents of the server(s) and can then choose between various vendor programs, utilizing weightings according to the strengths and weaknesses of each vendor, as well as user preferences, to determine the best vendor or vendors to select. Any needed vendor agents are then downloaded by the vendor-neutral agent and installed. The vendor-neutral agent also includes the capabilities of the general-purpose agent and manages other setup needs, such as configurations, best practices, and license management.Type: ApplicationFiled: April 5, 2005Publication date: October 5, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
-
Publication number: 20060225123Abstract: A system and method for using hierarchical policy levels for distribution of software in a computer network. In one embodiment, computers of the network are arranged into a hierarchy. A management policy server with access to the network queries the hierarchy to identify computers at or below its own level within the hierarchy. Once a set of computers is identified, software programs, updates or policies are distributed, bypassing human intervention.Type: ApplicationFiled: April 1, 2005Publication date: October 5, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Alan Keel, David Kumhyr, Neil Pennell
-
Publication number: 20060168171Abstract: Method, system and computer program product for communicating information regarding a managed resource in a network data processing system. A method, in a network data processing system, for communicating information regarding a managed resource includes receiving management information regarding at least one managed resource. The received management information is converted into a specified format, and the converted management information is then sent to at least one management application in conjunction with the sending of presence information to the at least one management application. The converted management information may then be extracted from the presence information for use in any desired manner. The invention provides a convenient mechanism for communicating status information and other appropriate information regarding a managed resource to interested parties connected to the network data processing system.Type: ApplicationFiled: October 29, 2004Publication date: July 27, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell, Randy Scott
-
Publication number: 20060159127Abstract: An example of a solution provided here comprises automatically measuring bandwidth of a network connection; comparing results of the measuring, with bandwidth parameters; preventing a transfer of a file via the network connection, if measured bandwidth is less than a minimum acceptable value; providing to an end user an option of transferring a file via the network connection, if measured bandwidth is not less than a minimum acceptable value, but is less than an optimal value; and automatically transferring a file via the network connection, if measured bandwidth is greater than or equal to an optimal value.Type: ApplicationFiled: January 20, 2005Publication date: July 20, 2006Inventors: Rhonda Childress, David Kumhyr, Neil Pennell, Thomas Ruiz
-
Publication number: 20060136526Abstract: An improved method, apparatus, and computer instructions for installing software on a data processing system. The process identifies files for the data processing system to be provisioned and to form identified files. The identified files are located using a location map. The location map identifies a set of files and identifies each node in a network data processing system on which a file in the set of files is located. The identified files are transferred to the data processing system from the plurality of nodes in the network data processing system using the location map to form installation files. The data processing system is provisioned using the installation files.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
-
Publication number: 20060136903Abstract: A method in a processing system for managing backup data on a set of nodes in a network data processing system. An inventory of files is generated on a set of nodes in the network data processing system. An initial map from the inventory is created, wherein the first initial map includes an identification of each file located on a node in the set of nodes. A location map is built from the initial map and the location map identifies a set of files and identifies each node on which a file in the set of files is located, wherein at least one node in the set of nodes is a peer node to another node in the set of nodes.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Rhonda Childress, David Kumhyr, Robert Madey, Neil Pennell
-
Publication number: 20060095577Abstract: A method, apparatus, and computer instructions for optimizing Web services binding. A request is received from a client for Web services binding information for a Web service. The current availability of the Web service requested by the client is identified in response to receiving the request to form an identified current availability. An indication of the identified current availability of the Web service is sent to the client in response to identifying the current availability of the Web service requested by the client. The client uses the indication of the identified current availability to selectively use the Web service.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, David Kumhyr, Neil Pennell, Ward Harold
-
Publication number: 20060095519Abstract: A method, apparatus, and computer instructions for programmatic communications via an instant messaging network. A connection is established to the instant messaging network. A script is received though the connection. The script is then executed.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Reid Minyen, Neil Pennell
-
Publication number: 20060095561Abstract: An improved method, apparatus, and computer instructions for correlating system management information in a network data processing system. Monitoring an instant messaging chat group for system management information sent by a set of agents located in the network data processing system using an instant messaging system, wherein the system management information forms collected system management information, correlating the collected system management information form correlated system management information, and initiating an action based on the correlated system management information.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell
-
Publication number: 20050262235Abstract: A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage.Type: ApplicationFiled: April 8, 2004Publication date: November 24, 2005Applicant: International Business Machines CorporationInventors: Rhonda Childress, David Kumhyr, Neil Pennell
-
Publication number: 20050256946Abstract: A method, apparatus, and computer instructions for allocating resources based on predictions of service level agreement (SLA) breaches in order to minimize costs are provided. With the method, apparatus, and computer instructions, a prediction that an SLA will be breached is received from a prediction engine associated with the SLM system. Based on a prediction that an SLA will be breached, a minimum cost analysis is performed to determine if computer resources may be shifted from another service consumer under another SLA to facilitate the service consumer of the potentially breached SLA in order to reduce the cost of the penalty associated with breaching SLAs. If so, resources are reallocated in order to minimize penalties associated with SLA breaches.Type: ApplicationFiled: March 31, 2004Publication date: November 17, 2005Applicant: International Business Machines CorporationInventors: Rhonda Childress, David Kumhyr, Edgar Marin, Neil Pennell
-
Publication number: 20050223287Abstract: A system, method and computer instructions are disclosed for routing system management information to entities or parties who are responsible for responding to the management information. If a management agent or managed resource associated with a computer-based management system desires to send event or notification information to an entity, party or person responsible for responding to the event or notification information, the management agent or managed resource can determine an identity of an entity, party or person responsible for responding to the event or notification from a prioritized “on-call list”. The management agent or managed resource can then determine the availability of the identified entity, party or person from a Presence Network, and send the event or notification information to a resource where the identified entity, party or person is currently “present”.Type: ApplicationFiled: March 25, 2004Publication date: October 6, 2005Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell