Patents by Inventor Pamela C. Durham
Pamela C. Durham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9910593Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: GrantFiled: October 14, 2015Date of Patent: March 6, 2018Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.Inventors: Pamela C. Durham, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Patent number: 9619145Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: GrantFiled: September 30, 2013Date of Patent: April 11, 2017Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.Inventors: Pamela C. Durham, Henry Pesulima, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Publication number: 20160034199Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: ApplicationFiled: October 14, 2015Publication date: February 4, 2016Inventors: Pamela C. Durham, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Patent number: 9213610Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: GrantFiled: June 6, 2013Date of Patent: December 15, 2015Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.Inventors: Pamela C. Durham, Henry Pesulima, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Publication number: 20140365818Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: ApplicationFiled: September 30, 2013Publication date: December 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pamela C. Durham, Henry Pesulima, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Publication number: 20140365820Abstract: An array can include a controller and multiple storage devices of a first type. When a storage device of the first type is replaced by a replacement storage device of a second type, and other storage devices of the first type remain in the array, the controller instructs the replacement storage device to configure itself as a storage device of the first type. When the last storage device of the first type in the array is replaced by a replacement storage device of the second type, the controller instructs all the storage devices of the array to configure themselves as storage devices of the second type.Type: ApplicationFiled: June 6, 2013Publication date: December 11, 2014Inventors: Pamela C. Durham, Henry Pesulima, Eric A. Stegner, Julian Sia Kai Tan, Eric W. Townsend
-
Patent number: 8418185Abstract: A computer implemented method is provided, including monitoring the utilization of resources available within a compute node, wherein the resources include an input/output capacity, a processor capacity, and a memory capacity. The method further comprises allocating virtual machines to the compute node to maximize use of a first one of the resources; and then allocating an additional virtual machine to the compute node to increase the utilization of the resources other than the first one of the resources without over-allocating the first one of the resources. In a web server, the input/output capacity may be the resource to be maximized. However, unused memory capacity and/or processor capacity of the compute node may be used more effectively by identifying an additional virtual machine that is memory intensive or processor intensive to be allocated or migrated to the compute node.Type: GrantFiled: October 19, 2010Date of Patent: April 9, 2013Assignee: International Business Machines CorporationInventors: Pamela C. Durham, Nils Peter Joachim Hansson, Edward S. Suffern, James L. Wooldridge
-
Publication number: 20120284398Abstract: A computer implemented method is provided, including monitoring network traffic among virtual machines allocated to a plurality of compute nodes on a network, and identifying first and second virtual machines having inter-virtual machine communication over the network in an amount that is greater than a threshold amount of the network traffic. The method further comprises migrating at least one of the first and second virtual machines so that the first and second virtual machines are allocated to the same compute node and the inter-virtual machine communication between the first and second virtual machines is no longer directed over the network. In one embodiment, each compute node is coupled to an Ethernet link of a network switch, and data is obtained from a management information database of the network switch to determine the amount of network bandwidth that is being utilized for communication between the first and second virtual machines.Type: ApplicationFiled: July 3, 2012Publication date: November 8, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pamela C. Durham, Nils Peter Joachim Hansson, Edward S. Suffern, James L. Wooldridge
-
Publication number: 20120266163Abstract: Virtual machine migration, including: monitoring, by a management agent, the utilization of a system resource in a computing system; determining, by the management agent, a rate of change in the utilization of the system resource over a predetermined period of time; comparing, by the management agent, the rate of change in the utilization of the system resource over a predetermined period of time to a predetermined maximum allowable rate of change in the utilization of the system resource over the predetermined period of time; and taking, by the management agent, corrective action upon determining that the rate of change in the utilization of the system resource over the predetermined period of time exceeds the predetermined maximum allowable rate of change in the utilization of the system resource over the predetermined period of time.Type: ApplicationFiled: April 13, 2011Publication date: October 18, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pamela C. Durham, Bruce A. Smith, Edward S. Suffern
-
Publication number: 20120102190Abstract: A computer implemented method is provided, including monitoring network traffic among virtual machines that are allocated to a plurality of compute nodes on a network, and identifying first and second virtual machines having inter-virtual machine communication over the network in an amount that is greater than a threshold amount of the network traffic. The method further comprises migrating at least one of the first and second virtual machines so that the first and second virtual machines are allocated to the same compute node and the inter-virtual machine communication between the first and second virtual machines is no longer directed over the network. In one embodiment, each compute node is coupled to an Ethernet link of a network switch, and data is obtained from a management information database of the network switch to determine the amount of network bandwidth that is being utilized for communication between the first and second virtual machines.Type: ApplicationFiled: October 26, 2010Publication date: April 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pamela C. Durham, Nils Peter Joachim Hansson, Edward S. Suffern, James L. Wooldridge
-
Publication number: 20120096473Abstract: A computer implemented method is provided, including monitoring the utilization of resources available within a compute node, wherein the resources include an input/output capacity, a processor capacity, and a memory capacity. The method further comprises allocating virtual machines to the compute node to maximize use of a first one of the resources; and then allocating an additional virtual machine to the compute node to increase the utilization of the resources other than the first one of the resources without over-allocating the first one of the resources. In a web server, the input/output capacity may be the resource to be maximized. However, unused memory capacity and/or processor capacity of the compute node may be used more effectively by identifying an additional virtual machine that is memory intensive or processor intensive to be allocated or migrated to the compute node.Type: ApplicationFiled: October 19, 2010Publication date: April 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pamela C. Durham, Nils Peter Joachim Hansson, Edward S. Suffern, James L. Wooldridge