Patents by Inventor Per Lutkemeyer
Per Lutkemeyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11153291Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: GrantFiled: September 12, 2019Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Patent number: 10949287Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.Type: GrantFiled: September 19, 2018Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Donald Charles Laing, John J. Auvenshine, Michael L. Camarco, III, Dominic Thibodeau, Per Lutkemeyer
-
Patent number: 10749748Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.Type: GrantFiled: March 23, 2017Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
-
Patent number: 10671327Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: GrantFiled: March 8, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
-
Publication number: 20200089561Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.Type: ApplicationFiled: September 19, 2018Publication date: March 19, 2020Inventors: Donald Charles LAING, John J. AUVENSHINE, Michael L. CAMARCO, III, Dominic THIBODEAU, Per LÜTKEMEYER
-
Patent number: 10581821Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: GrantFiled: August 10, 2017Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Patent number: 10528415Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.Type: GrantFiled: February 28, 2017Date of Patent: January 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
-
Publication number: 20200007521Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: ApplicationFiled: September 12, 2019Publication date: January 2, 2020Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Patent number: 10423480Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.Type: GrantFiled: December 18, 2017Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
-
Publication number: 20190205032Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: ApplicationFiled: March 8, 2019Publication date: July 4, 2019Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
-
Patent number: 10331382Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: GrantFiled: December 17, 2017Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
-
Patent number: 10303400Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: GrantFiled: April 25, 2017Date of Patent: May 28, 2019Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
-
Publication number: 20190052615Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: ApplicationFiled: August 10, 2017Publication date: February 14, 2019Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Publication number: 20180307441Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: ApplicationFiled: April 25, 2017Publication date: October 25, 2018Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
-
Publication number: 20180307442Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: ApplicationFiled: December 17, 2017Publication date: October 25, 2018Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
-
Publication number: 20180278477Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.Type: ApplicationFiled: March 23, 2017Publication date: September 27, 2018Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
-
Publication number: 20180246777Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.Type: ApplicationFiled: December 18, 2017Publication date: August 30, 2018Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
-
Publication number: 20180246776Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.Type: ApplicationFiled: February 28, 2017Publication date: August 30, 2018Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
-
Patent number: 9626123Abstract: A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. A device from the list of devices is selected and available credentials for connecting and authenticating the device are determined. Configuration and operational state data for the device are retrieved. A backup device associated with the device is selected and associated policies are loaded. Each policy is evaluated with respect to the backup devices, associated dependencies, and the configuration and operational state data. Compliant and non-compliant policies with respect to the backup devices are determined.Type: GrantFiled: August 18, 2016Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Bent Braum Holst, Nicolai Kildal, Donald C. Laing, Thomas Lindgaard, Per Lutkemeyer, Susan K. Schreitmueller, Christian Sonder, Stanley C. Wood
-
Publication number: 20160357445Abstract: A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. A device from the list of devices is selected and available credentials for connecting and authenticating the device are determined. Configuration and operational state data for the device are retrieved. A backup device associated with the device is selected and associated policies are loaded. Each policy is evaluated with respect to the backup devices, associated dependencies, and the configuration and operational state data. Compliant and non-compliant policies with respect to the backup devices are determined.Type: ApplicationFiled: August 18, 2016Publication date: December 8, 2016Inventors: Bent Braum Holst, Nicolai Kildal, Donald C. Laing, Thomas Lindgaard, Per Lutkemeyer, Susan K. Schreitmueller, Christian Sonder, Stanley C. Wood