Patents by Inventor Paul A. Jennas, II

Paul A. Jennas, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120036327
    Abstract: A method for migrating extents between extent pools in a tiered storage architecture maintains a data access profile for an extent over a period of time. Using the data access profile, the method generates an extent profile graph that predicts data access rates for the extent into the future. The slope of the extent profile graph is calculated and used to determine whether the extent will reach a migration threshold within a specified “look-ahead” time. If so, the method calculates a migration window that allows the extent to be migrated prior to reaching the migration threshold. In certain embodiments, the method determines the overall performance impact on the source extent pool and destination extent pool during the migration window. If the overall performance impact is below a designated impact threshold, the method migrates the extent during the migration window. A corresponding apparatus and computer program product are also disclosed herein.
    Type: Application
    Filed: August 3, 2010
    Publication date: February 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Larry Juarez, David Montgomery, Todd C. Sorenson
  • Publication number: 20110280404
    Abstract: Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel.
    Type: Application
    Filed: May 14, 2010
    Publication date: November 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Jennas, II, Jason L. Peipelman, Joshua Marshall Rhoades, Matthew J. Ward
  • Publication number: 20110258363
    Abstract: Exemplary method, system, and computer program embodiments for profiling input/output (I/O) for solid state drive (SSD) devices in a computing storage environment by a processor device are provided. In one embodiment, a read/write ratio for each of a plurality of data segments classified in a hot category as hot data segments is determined. Each of the plurality of hot data segments is ordered by the read/write ratio in a descending order. Each of a plurality of available SSD devices is ordered by a remaining life expectancy in an ascending order. Those of the plurality of hot data segments are matched with those of the plurality of hot data segments with those of the plurality of available SSD devices such that a hot data segment having a higher read/write ratio is provided to an SSD device having a smaller remaining life expectancy than another hot data segment having a lower read/write ratio.
    Type: Application
    Filed: April 19, 2010
    Publication date: October 20, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Philip M. DOATMAS, Paul A. JENNAS, II, Larry JUAREZ, David MONTGOMERY, Jason L. PEIPELMAN, Joshua M. RHOADES, Todd C. SORENSON
  • Publication number: 20110191556
    Abstract: Exemplary method, system, and computer program embodiments for data migration between first and second storage mediums of an available plurality of storage mediums in a computing storage environment are provided. In one embodiment, pursuant to migrating the data from the first to the second storage medium, the data is allocated to the second storage medium while retaining an allocation of the data in the first storage medium. If the data is migrated from the second storage medium back to the first storage medium, the data is pointed to the allocation of the data in the first storage medium to alleviate data movement from the second storage medium to the first storage medium. If the allocation of the data in the first storage medium is determined to be needed for other data, the allocation of the data in the first storage medium is freed.
    Type: Application
    Filed: February 1, 2010
    Publication date: August 4, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dale H. ANDERSON, Philip M. DOATMAS, Michael R. GROSECLOSE, JR., Paul A. JENNAS, II, Larry JUAREZ, Brian S. McCAIN, David MONTGOMERY, Jason L. PEIPELMAN, Joshua M. RHOADES, Todd C. SORENSON, David V. VALVERDE
  • Patent number: 7882060
    Abstract: A method for storing data includes establishing a space efficient storage system including a virtual repository, a staging repository and a remote repository. The virtual repository includes a first pointer to the staging repository, and the staging repository includes a second pointer to the remote repository. The method further includes receiving data at the virtual repository, storing the received data in the staging repository based on the first pointer, and transferring the stored data to the remote repository based on the second pointer.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: February 1, 2011
    Assignee: International Business Machines Corporation
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20100175076
    Abstract: A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server, and generating a task object generation command having at least a first software routine identifier, parameter data, and event information. The event information has an event identifier and a first flag value. The method further includes generating a first task object in response to the task object generation command, which includes the first software routine identifier, the parameter data, and the event information.
    Type: Application
    Filed: January 6, 2009
    Publication date: July 8, 2010
    Applicant: International Business Machines Corporation
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Brian S. McCain, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20100175075
    Abstract: A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server. The method further includes generating a task object generation command having at least a first software routine identifier, parameter data, and link task information and generating a second task object in response to the task object generation command. The second task object includes the first software routine identifier, the parameter data, and the link task information.
    Type: Application
    Filed: January 6, 2009
    Publication date: July 8, 2010
    Applicant: International Business Machines Corporation
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Brian S. McCain, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20090198699
    Abstract: A method for storing data includes establishing a space efficient storage system including a virtual repository, a staging repository and a remote repository. The virtual repository includes a first pointer to the staging repository, and the staging repository includes a second pointer to the remote repository. The method further includes receiving data at the virtual repository, storing the received data in the staging repository based on the first pointer, and determining a data access frequency based on the storage in the staging repository. In addition, the method includes comparing the determined data access frequency to a threshold frequency and transferring the stored data to the remote repository based on the second pointer and comparison and storing the stored data at the staging repository based on the comparison.
    Type: Application
    Filed: January 31, 2008
    Publication date: August 6, 2009
    Applicant: International Business Machines Corporation
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20090198710
    Abstract: A method for storing data includes establishing a space efficient storage system including a virtual repository, a staging repository and a remote repository. The virtual repository includes a first pointer to the staging repository, and the staging repository includes a second pointer to the remote repository. The method further includes receiving data at the virtual repository, storing the received data in the staging repository based on the first pointer, and transferring the stored data to the remote repository based on the second pointer.
    Type: Application
    Filed: January 31, 2008
    Publication date: August 6, 2009
    Applicant: International Business Machines Corporation
    Inventors: Mark F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason L. Peipelman, Matthew J. Ward
  • Publication number: 20090055738
    Abstract: A technique for providing assistance to a user of a system includes receiving a current command entered into a command line interface of the system and determining a current state of a system. Command help for the current command is then generated based on the current state of the system.
    Type: Application
    Filed: August 23, 2007
    Publication date: February 26, 2009
    Inventors: Mario F. Acedo, Ezequiel Cervantes, Paul A. Jennas, II, Jason Peipelman, Matthew J. Ward
  • Patent number: 7493601
    Abstract: A system and method implementable in a JAVA® application for providing C++ language friend-style access that grants JAVA® objects access to methods of another JAVA® object. The method comprises steps of: providing a method in the implementing JAVA object for determining the name of a JAVA object class that has called a method within the implementing JAVA object; comparing the JAVA object class name against a list of object names that have been granted access rights to the method in the implementing JAVA object; and, in response to the comparing, one of: enabling execution of the method of the implementing JAVA object upon determination that the calling object class is a member of the list, or, preventing execution of the method upon determination that the calling object is not a member of the list.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Joseph A. Gimness, Jason L. Peipelman, Paul A. Jennas, II