Patents by Inventor Paul A. Jennas, II

Paul A. Jennas, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160291890
    Abstract: Extent migration is provided in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a time delta approximately equal to a time of an intended migration at the primary storage entity such that the primary and secondary storage entities conduct the extent migration at approximately a same time. A relative priority is used against a secondary ordered heat map of the tiered storage devices of the secondary storage entity to perform the extent migration, regardless of whether the primary and secondary storage entities are identical.
    Type: Application
    Filed: June 7, 2016
    Publication date: October 6, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. JENNAS, II, Larry JUAREZ, David MONTGOMERY, Todd C. SORENSON
  • Publication number: 20160266806
    Abstract: A command is received to copy a first extent in a source volume to a second extent in a target volume, wherein the source volume and the target volume are in a copy relationship. In response to determining that it takes longer to copy all changed data of the first extent to the second extent than to copy all of the changed data of the first extent to a third extent and to copy all other data from the second extent to the third extent, operations are performed to copy all of the changed data of from the first extent to the third extent and to copy all of the other data from the second extent to the third extent. Operations are also performed to assign the third extent to replace the second extent in the target volume.
    Type: Application
    Filed: March 10, 2015
    Publication date: September 15, 2016
    Inventors: JOSHUA J. CRAWFORD, PAUL A. JENNAS, II, JASON L. PEIPELMAN, MATTHEW J. WARD
  • Patent number: 9423973
    Abstract: A metadata object identifying a set of disk locations which have been written to during a consistency group is maintained. Backup data for the consistency group is written. Writing backup data for the consistency group includes identifying a disk location from the set of disk locations, generating a record containing the disk location, data stored at the disk location, and a consistency group value identifying the consistency group, and writing the record to tape storage. Records written to tape storage can be used to restore data to disk storage for a given consistency group.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9389801
    Abstract: Extent migration is provided in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a time delta approximately equal to a time of an intended migration at the primary storage entity adjusted for a transmission time such that the primary and secondary storage entities conduct the extent migration at approximately a same time.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: July 12, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Larry Juarez, David Montgomery, Todd C. Sorenson
  • Publication number: 20160139839
    Abstract: A metadata object identifying a set of disk locations which have been written to during a consistency group is maintained. Backup data for the consistency group is written. Writing backup data for the consistency group includes identifying a disk location from the set of disk locations, generating a record containing the disk location, data stored at the disk location, and a consistency group value identifying the consistency group, and writing the record to tape storage. Records written to tape storage can be used to restore data to disk storage for a given consistency group.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9323621
    Abstract: A method for dynamic monitoring of command line queries. The method includes receiving a command that includes a query and one or more parameters, mapping the command to a system resource, monitoring for a state change event pertaining to the system resource or a terminal event until a detection of the terminal event, and retrieving one or more characteristics of the system resource in response to detecting the state change event pertaining to the system resource. The system resource has a plurality of characteristics, each characteristic having a name and a value. A state change event corresponds to a change in one or more characteristics of a system resource.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: April 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Dale H. Anderson, Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20160092370
    Abstract: A command to write data to a virtual location is received at a disk storage system. The virtual location is mapped to a tape storage system. A record is generated including the data, the virtual location, and a sequence value. The sequence value indicates relative sequence when compared to other sequence values. The record is written to a record location on a tape cartridge loaded in a tape drive. Record metadata on the disk storage system is modified to indicate that the first record location contains the first record. The data on the record can be read from the tape cartridge.
    Type: Application
    Filed: November 17, 2015
    Publication date: March 31, 2016
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20160070487
    Abstract: Data is relocated, based on an intelligent data placement algorithm, from a first storage location to a second storage location in a disk storage system. A data placement record is generated including a virtual disk location associated with the data, the second storage location, and a first sequence value. The first sequence value indicates relative sequence when compared to other sequence values. The data placement record is written to a first record location on a first tape cartridge loaded in a tape drive. The data placement records are used with data records to restore data to disk storage from tape backup.
    Type: Application
    Filed: September 9, 2014
    Publication date: March 10, 2016
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20160048340
    Abstract: Extent migration is provided in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a time delta approximately equal to a time of an intended migration at the primary storage entity adjusted for a transmission time such that the primary and secondary storage entities conduct the extent migration at approximately a same time.
    Type: Application
    Filed: October 28, 2015
    Publication date: February 18, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. JENNAS, II, Larry JUAREZ, David MONTGOMERY, Todd C. SORENSON
  • Patent number: 9240209
    Abstract: A command to write data to a virtual location is received at a disk storage system. The virtual location is mapped to a tape storage system. A record is generated including the data, the virtual location, and a sequence value. The sequence value indicates relative sequence when compared to other sequence values. The record is written to a record location on a tape cartridge loaded in a tape drive. Record metadata on the disk storage system is modified to indicate that the first record location contains the first record. The data on the record can be read from the tape cartridge.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: January 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20160004560
    Abstract: A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. A determination operation is performed for determining if the parent process is alive for a predetermined number of tries. The PID of the background process is written from the first temporary file into a first PID variable when the parent process ends. A determination operation is performed for determining whether a second, global temporary file is empty. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed.
    Type: Application
    Filed: September 10, 2015
    Publication date: January 7, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mario F. ACEDO, Ezequiel CERVANTES, Paul A. JENNAS, II, Jason L. PEIPELMAN, Matthew J. WARD
  • Patent number: 9207874
    Abstract: Extent migration is provided in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a relative priority based on a primary ordered heat map of the tiered storage devices of the primary storage entity. The relative priority is used against a secondary ordered heat map of the tiered storage devices of the secondary storage entity to perform the extent migration, regardless of whether the primary and secondary storage entities are identical.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: December 8, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Larry Juarez, David Montgomery, Todd C. Sorenson
  • Patent number: 9170807
    Abstract: An approach to generating logical configuration commands for logical objects in a system. A method may involve receiving a command requesting the logical configuration commands to configure the specified logical object (subject logical object) and the logical objects that support the logical object (the support logical objects). The method may also involve determining what logical objects in the system support the subject logical object. This may require determining the support logical objects that directly support the subject logical object, and then recursively examining each support logical objects to find the logical objects on which they depend. For each logical object (whether the subject logical object or one of the support logical objects), the method may involve determining the logical configuration commands to appropriately create and modify the logical object. The logical configuration commands may then be presented to the user.
    Type: Grant
    Filed: January 4, 2011
    Date of Patent: October 27, 2015
    Assignee: International Business Machines Corporation
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9170838
    Abstract: A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. The PID is stored by a parent process and subsequently accessed by the background process. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: October 27, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20150302189
    Abstract: For efficient authorization settings in a computing environment, user access permissions are created or modified by mapping, granting, and/or limiting access to resources by resource type, and using checkboxes for controlling user access for individual resources and for mapping one of a multiplicity of icons to control a type of user access and control over the individual resources.
    Type: Application
    Filed: April 16, 2014
    Publication date: October 22, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. JENNAS, II, Jason L. PEIPELMAN, Cory THORPE, Chris ZUKOWSKI
  • Publication number: 20150254121
    Abstract: A computer program product for command result verification is configured to receive a command and an expected result from a command line interface, execute the command, receive one or more result codes resulting from the execution of the command, determine whether the one or more result codes satisfy the expected result, and send a response to the command line interface in response to determining whether the one or more result codes satisfy the expected result.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 10, 2015
    Applicant: International Business Machines Corporation
    Inventors: Dale H. Anderson, Paul A. Jennas, II, Jason L. Peipelman
  • Publication number: 20150254138
    Abstract: A method for dynamic monitoring of command line queries. The method includes receiving a command that includes a query and one or more parameters, mapping the command to a system resource, monitoring for a state change event pertaining to the system resource or a terminal event until a detection of the terminal event, and retrieving one or more characteristics of the system resource in response to detecting the state change event pertaining to the system resource. The system resource has a plurality of characteristics, each characteristic having a name and a value. A state change event corresponds to a change in one or more characteristics of a system resource.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 10, 2015
    Applicant: International Business Machines Corporation
    Inventors: Dale H. Anderson, Joshua J. Crawford, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Patent number: 9124423
    Abstract: Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel.
    Type: Grant
    Filed: May 14, 2010
    Date of Patent: September 1, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Jason L. Peipelman, Joshua Marshall Rhoades, Matthew J. Ward
  • Patent number: 9116853
    Abstract: A command to write data to a disk location is received at a disk storage system. The data is written to the disk location and a record including the data, the disk location, and a sequence value is generated. The first sequence value indicates relative sequence when compared to other sequence values. The record is written to a record location on a tape cartridge loaded in a tape drive. Record metadata on the disk storage system is modified to indicate that the record location contains current data. Tape cartridges containing records may be used to restore data to disk storage.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: August 25, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Jennas, II, Jason L. Peipelman, Chris Zukowski
  • Publication number: 20150237024
    Abstract: Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel.
    Type: Application
    Filed: May 6, 2015
    Publication date: August 20, 2015
    Inventors: Paul A. Jennas, II, Jason L. Peipelman, Joshua M. Rhoades, Matthew J. Ward