Patents by Inventor Oliver Augenstein
Oliver Augenstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9164950Abstract: A method, system, and computer program product for displaying components assigned to events produced by resources, includes: registering a new resource by generating a label to which is associated a system specific device identifier used by the new resource within a computing environment; storing in a mapping table the generated label identifying the registered new resource together with an associated system specific device identifier; and updating the mapping table by associating to the label any other system specific device identifier used by the new resource within the computing environment; receiving events produced by resources when being executed within the computing environment, each event being associated with a list of labels for the resources relevant for the generation of the event; and maintaining a tag cloud including different tags, the different tags including labels for the resources associated with the received events to be displayed as components.Type: GrantFiled: May 10, 2013Date of Patent: October 20, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Joerg Erdmenger, Hans-Ulrich Oldengott, Thomas Prause, Martin Raitza
-
Patent number: 9009430Abstract: A method is provided for restoring data from a backup storage volume onto a source storage volume. A content of a memory unit of the backup storage volume and a content of the corresponding memory unit of the source storage volume are loaded into a computer memory, and are compared in the computer memory for identity. The content of the memory unit of the backup storage volume is written to the corresponding memory unit of the source storage volume if the comparison indicates that the content of the compared memory units is not identical. The invention further relates to a system for restoring data from a backup storage volume onto a source storage volume comprising a restore software running on a data processing device, which is connected to the backup storage volume and the source storage volume, whereby the restore software performs the above method.Type: GrantFiled: November 29, 2011Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8959332Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: GrantFiled: February 21, 2013Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8930686Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: GrantFiled: October 25, 2010Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8701118Abstract: The present invention optimizes the utilization of computer system resources by considering predefined performance targets of multithreaded applications using the resources. The performance and utilization information for a set of multithreaded applications is provided. Using the performance and utilization information, the invention determines overutilized resources. Using the performance information, the invention also identifies threads and corresponding applications using an overutilized resource. The priority of the identified threads using said overutilized resource is adjusted to maximise a number of applications meeting their performance targets. The adjustments of priorities are executed via a channel that provides the performance and utilization information.Type: GrantFiled: March 11, 2013Date of Patent: April 15, 2014Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Avishai H. Hochberg, Thomas Prause, Thorsten Schaefer
-
Patent number: 8683472Abstract: The present invention optimizes the utilization of computer system resources by considering predefined performance targets of multithreaded applications using the resources. The performance and utilization information for a set of multithreaded applications is provided. Using the performance and utilization information, the invention determines overutilized resources. Using the performance information, the invention also identifies threads and corresponding applications using an overutilized resource. The priority of the identified threads using said overutilized resource is adjusted to maximize a number of applications meeting their performance targets. The adjustments of priorities are executed via a channel that provides the performance and utilization information.Type: GrantFiled: September 1, 2010Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Avishai H. Hochberg, Thomas Prause, Thorsten Schaefer
-
Patent number: 8639880Abstract: Embodiments for managing data in a hierarchical storage server storing data blocks of a database system comprising primary storage devices being in an active mode and secondary storage devices being in one of an active and passive mode are provided. In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage devices. Read requests switch over secondary storage devices to the active mode when they are in the passive mode. Write requests write data blocks only to the primary storage devices. Secondary storage devices that have not been accessed for a minimum activation time may be switched over from the active to the passive mode to save power consumption and cooling. Data migration and data recall policies control moving of data blocks between the primary and secondary storage devices and are primarily based on threshold values.Type: GrantFiled: July 31, 2012Date of Patent: January 28, 2014Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Bender, Karl Fleckenstein, Andreas Uhl
-
Patent number: 8572040Abstract: The present invention provides methods and an infrastructure for performing repetitive data protection and a corresponding restore of data for block oriented data objects comprising several indexed segments. For implementing the invention, timestamps tk are set by a timer k. Only the first data modification of a segment is recorded, after a timestamp tk has been set, by storing the old data contents of said segment together with the segment index j and said timestamp tk as undo-log block in a first journal j0, before overwriting said segment with the modified new data. Besides, said undo-log blocks are transmitted to N journals ji for storing redundant undo-log information, with N>1 and i=0, . . . , N?1. According to the present invention for each journal ji journal-specific timestamps tk/i are generated, so that each journal ji is written for a different set of timestamps tk/i.Type: GrantFiled: April 27, 2007Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Thomas Prause
-
Patent number: 8566285Abstract: A method, system, and article to manage a backup procedure of one or more backup tasks in a computing system. A backup window within which the backup tasks are to be executed is defined, and the backup tasks within the backup window are scheduled. The process of the backup procedure is controlled during execution. The process of controlling the backup procedure includes calculating the prospective duration of all actually running and all future backup tasks, and cancelling low priority backup tasks in case a higher priority backup task is projected to continue beyond an end time (Tend) of the backup window.Type: GrantFiled: May 15, 2009Date of Patent: October 22, 2013Assignee: International Business Machines CorporationInventors: Ralf Altrichter, Oliver Augenstein, Stefan Huetter, Hans-Ulrich Oldengott
-
Publication number: 20130254406Abstract: A method, system, and computer program product for displaying components assigned to events produced by resources, includes: registering a new resource by generating a label to which is associated a system specific device identifier used by the new resource within a computing environment; storing in a mapping table the generated label identifying the registered new resource together with an associated system specific device identifier; and updating the mapping table by associating to the label any other system specific device identifier used by the new resource within the computing environment; receiving events produced by resources when being executed within the computing environment, each event being associated with a list of labels for the resources relevant for the generation of the event; and maintaining a tag cloud including different tags, the different tags including labels for the resources associated with the received events to be displayed as components.Type: ApplicationFiled: May 10, 2013Publication date: September 26, 2013Applicant: International Business Machines CorporationInventors: Oliver AUGENSTEIN, Joerg ERDMENGER, Hans-Ulrich OLDENGOTT, Thomas PRAUSE, Martin RAITZA
-
Patent number: 8527749Abstract: A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multiple network storage volumes as specified by the volume mapping schema, the data transfer between the user device and the one or multiple network storage volumes being mapped to one or multiple network connections as specified by the connection mapping schema, the driver thereby being operable to provide the user device with a logical storage volume.Type: GrantFiled: November 11, 2010Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8516106Abstract: A method, system, and computer program product for displaying components assigned to events produced by resources, includes: registering a new resource by generating a label to which is associated a system specific device identifier used by the new resource within a computing environment; storing in a mapping table the generated label identifying the registered new resource together with an associated system specific device identifier; and updating the mapping table by associating to the label any other system specific device identifier used by the new resource within the computing environment; receiving events produced by resources when being executed within the computing environment, each event being associated with a list of labels for the resources relevant for the generation of the event; and maintaining a tag cloud including different tags, the different tags including labels for the resources associated with the received events to be displayed as components.Type: GrantFiled: March 26, 2010Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Joerg Erdmenger, Hans-Ulrich Oldengott, Thomas Prause, Martin Raitza
-
Patent number: 8515909Abstract: The present invention provides for an enhanced method and system for assuring integrity of deduplicated data objects stored within a storage system. A digital signature of the data object is generated to determine if the data object reassembled from a deduplicated state is identical to its pre-deduplication state. In one embodiment, generating the object signature of a data object before deduplication comprises generating an object signature from intermediate hash values computed from a hash function operating on each data chunk within the data object, the hash function also used to determine duplicate data chunks. In an alternative embodiment, generating the object signature of a data object before deduplication comprises generating an object signature on a portion of each data chunk of the data object.Type: GrantFiled: April 29, 2008Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, Oliver Augenstein, David M. Cannon
-
Patent number: 8380929Abstract: In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage devices. Read requests switch over secondary storage devices to the active mode when they are in the passive mode. Write requests write data blocks only to the primary storage devices. Secondary storage devices that have not been accessed for a minimum activation time may be switched over from the active to the passive mode to save power consumption and cooling. Data migration and data recall policies control moving of data blocks between the primary and secondary storage devices and are primarily based on threshold values.Type: GrantFiled: May 3, 2012Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Bender, Karl Fleckenstein, Andreas Uhl
-
Publication number: 20120297138Abstract: Embodiments for managing data in a hierarchical storage server storing data blocks of a database system comprising primary storage devices being in an active mode and secondary storage devices being in one of an active and passive mode are provided. In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage devices. Read requests switch over secondary storage devices to the active mode when they are in the passive mode. Write requests write data blocks only to the primary storage devices. Secondary storage devices that have not been accessed for a minimum activation time may be switched over from the active to the passive mode to save power consumption and cooling. Data migration and data recall policies control moving of data blocks between the primary and secondary storage devices and are primarily based on threshold values.Type: ApplicationFiled: July 31, 2012Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver AUGENSTEIN, Stefan BENDER, Karl FLECKENSTEIN, Andreas UHL
-
Patent number: 8316182Abstract: In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage devices. Read requests switch over secondary storage devices to the active mode when they are in the passive mode. Write requests write data blocks only to the primary storage devices. Secondary storage devices that have not been accessed for a minimum activation time may be switched over from the active to the passive mode to save power consumption and cooling. Data migration and data recall policies control moving of data blocks between the primary and secondary storage devices and are primarily based on threshold values.Type: GrantFiled: June 10, 2010Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Bender, Karl Fleckenstein, Andreas Uhl
-
Publication number: 20120221791Abstract: In response to read and write requests for data blocks at logical storage locations, a block mapping device determines physical storage locations on the storage devices. Read requests switch over secondary storage devices to the active mode when they are in the passive mode. Write requests write data blocks only to the primary storage devices. Secondary storage devices that have not been accessed for a minimum activation time may be switched over from the active to the passive mode to save power consumption and cooling. Data migration and data recall policies control moving of data blocks between the primary and secondary storage devices and are primarily based on threshold values.Type: ApplicationFiled: May 3, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver AUGENSTEIN, Stefan BENDER, Karl FLECKENSTEIN, Andreas UHL
-
Publication number: 20120204024Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: ApplicationFiled: October 25, 2010Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver Augenstein, Stefan A. Letz
-
Publication number: 20120144136Abstract: A method is provided for restoring data from a backup storage volume onto a source storage volume. A content of a memory unit of the backup storage volume and a content of the corresponding memory unit of the source storage volume are loaded into a computer memory, and are compared in the computer memory for identity. The content of the memory unit of the backup storage volume is written to the corresponding memory unit of the source storage volume if the comparison indicates that the content of the compared memory units is not identical. The invention further relates to a system for restoring data from a backup storage volume onto a source storage volume comprising a restore software running on a data processing device, which is connected to the backup storage volume and the source storage volume, whereby the restore software performs the above method.Type: ApplicationFiled: November 29, 2011Publication date: June 7, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8176272Abstract: A backup method that uses snapshot delta views to create backups of a data collection is provided. The method comprises taking a first snapshot of the data collection, in response to determining that a previous snapshot used to create a backup does not exist; creating a backup of the data collection using the first snapshot, in response to determining that the previous snapshot does not exist; recording that the first snapshot was used as a source for the creation of a backup; and taking a second snapshot of the data collection, in response to determining that the previous snapshot that was used as a source for a backup does exist.Type: GrantFiled: September 4, 2008Date of Patent: May 8, 2012Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Toby Lyn Marek, James Patrick Smith, Thomas Prause