Patents by Inventor R. Lowe

R. Lowe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130047159
    Abstract: Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.
    Type: Application
    Filed: June 26, 2012
    Publication date: February 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew R. LOW, Prashanth K. NAGESHAPPA, Saket SAURABH, SHIVASHEESH, Balbir SINGH
  • Patent number: 8341838
    Abstract: A coupling body for a coaxial connector is dimensioned to couple with connector body at a connector end. An inner body of the coupling body is provided with a bore dimensioned to receive the coaxial cable. The inner body is formed of transparent material partially covered in an opaque material. An uncovered portion of the inner body functions as a visual installation portal. Methods of installation include inserting the coaxial cable into the cable end of the bore of the inner body until a desired portion of a prepared end of the coaxial cable is visible.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: January 1, 2013
    Assignee: Andrew LLC
    Inventor: David R. Low
  • Patent number: 8341643
    Abstract: Shared memory and sockets are used to protect shared resources where multiple operating systems execute concurrently on the same hardware. Rather than using spinlocks for serializing access, when a thread is unable to acquire a shared resource because that resource is already held by another thread, the thread creates a socket with which it will wait to be notified that the shared resource has been released. The sockets may be network sockets or in-memory sockets that are accessible across the multiple operating systems; if sockets are not available, communication technology that provides analogous services between operating systems may be used instead. Optionally, fault tolerance is provided to address socket failures, in which case one or more threads may fall back (at least temporarily) to using spinlocks. A locking service may execute on each operating system to provide a programming interface through which threads can invoke lock operations.
    Type: Grant
    Filed: March 29, 2010
    Date of Patent: December 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Michael Fulton, Angela Lin, Andrew R. Low, Prashanth K. Nageshappa
  • Publication number: 20120324443
    Abstract: A computer-implemented method is provided for reducing network traffic associated with live migration. The method comprises selecting a virtual machine on a first physical host for migration to a second physical host, and providing each application running in the selected virtual machine with notification that the migration has started. In response to receiving the notification that the migration has started, each application reducing the number of memory pages in use during the migration. The selected virtual machine and each application is then migrated from the first physical host to the second physical host, wherein the migration of each application includes migration of the reduced number of memory pages.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew R. Low, Prashanth K. Nageshappa, Sathiskumar Palaniappan, Balbir Singh
  • Publication number: 20120305501
    Abstract: A rail clip to be used to fasten rail seals or flangeway fillers to a rail. The rail clip includes a generally U-shaped hinged clip with one or more hinges formed by two curved arms of the same or different curvatures and an elongated back. The elongated back is designed to fit between the foot of the rail and the ballast. One or more of the arms may be rotatable such that it is perpendicular to the elongated arm and the other arm, allowing the clip to be put in place. Once the clip is in place, the arm is rotated to the desired position and locked into place, holding each rail seal against the rail.
    Type: Application
    Filed: June 1, 2012
    Publication date: December 6, 2012
    Applicant: Dacon Industries
    Inventors: Tyler R. Lowe, Brit Carroll
  • Publication number: 20120272239
    Abstract: This docucment descirbes techniques for sharing Java class information in virtualized computing environments. In some embodimetns, an apparatus includes hardware components including one or more central processing units and main memory, wherein a portion of the main memory is configured to store shared Java classes. The apparatus can also include a hypervisor configured to control access to the hardware components, and to host a plurality of operating systems. Each of the operating systems can include a character device driver configured to write directly to the portion of main memory configured to store the shared Java classes. The apparatus can also include one or more Java virtual machines configured to execute the shared Java classes and modify the shared Java classes using the character device driver.
    Type: Application
    Filed: April 25, 2011
    Publication date: October 25, 2012
    Applicant: International Business Machines Corporation
    Inventors: Prasanna K. Kalle, Roopa K. Rao, Andrew R. Low, Aneesh K.K. Veetil
  • Patent number: 8269987
    Abstract: A document printing method includes receiving a print job of electronic document data representing a document including a security character string with at least one character defined in the electronic document data in terms of a security mark creation font. The security mark creation font is a scalable outline based font, wherein the security character string is defined with a selected security effect, and wherein the security mark creation font provides an indication of the selected security effect without implementing the security effect. An SI Font is selected that corresponds to the security mark creation font of the at least one character of the security character string. The SI Font includes a bitmap representation of the at least one character of the security character string. The SI Font is suitable for printing the security character string with the selected security effect.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: September 18, 2012
    Assignee: Xerox Corporation
    Inventors: Reiner Eschbach, Sharon A. Krueger, James R. Low, William A. Fuss
  • Patent number: 8232862
    Abstract: A biometrically authenticated portable access device, includes a biometric sensor for measuring a live biometric parameter of an unverified user, an authenticator controlling a switch that enables and disables a conventional RFID tag and a stored biometric template corresponding to a previously measured biometric parameter of an authorized user. The authenticator compares the live biometric parameter of the unverified user to the stored biometric template and enables the RFID tag when the live biometric parameter matches the stored biometric template. The RFID tag is programmable in conventional RFID tag programmers that may be proprietary permitting the portable access device to be used with existing installed systems of proprietary and non-proprietary RFID tag programmers and readers.
    Type: Grant
    Filed: May 17, 2004
    Date of Patent: July 31, 2012
    Assignee: Assa Abloy AB
    Inventor: Peter R Lowe
  • Publication number: 20120166498
    Abstract: Garbage collection processes are automatically tuned on a system comprising a plurality of virtual machines running on a physical processing device with multiple physical processors. Tuning is implemented for each garbage collection process, by updating a load variable to reflect that a new garbage collection process has started, the load variable having a value that is based at least in part on a number of garbage collection processes that are currently running on the system. Tuning further comprises creating a number of garbage collection threads based at least in part on the current value of the load variable and/or number of processors, where the garbage collection threads are used to perform at least a portion of at least one phase of the new garbage collection process. Tuning further comprises re-updating the load variable to reflect completion of the new garbage collection process.
    Type: Application
    Filed: December 22, 2010
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles R. Gracie, Andrew R. Low, Ashutosh Mehra, Prashanth K. Nageshappa
  • Publication number: 20120167067
    Abstract: A batching mechanism is provided that batches multiple Java Native Interface calls together such that the batch crosses the Java Native Interface boundary in a single transition. The batching mechanism operates by identifying a sequence of Java Native Interface calls to be made by native code, by encapsulating the identified sequence of Java Native Interface calls into a batch, and by communicating the batch as a single transition across the Java Native Interface boundary. In this manner, each call of the batch is encapsulated by iteratively performing for each call to be made, processes including identifying the Java Native Interface function to call, identifying the arguments to pass into the Java Native Interface function, dispatching to the Java Native Interface function and capturing the return value.
    Type: Application
    Filed: December 23, 2010
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew R. Low, Marcel Mitran, Kishor V. Patil, Gavin Rolleston, Ivan Sham, Karl M. Taylor
  • Publication number: 20120157058
    Abstract: The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system.
    Type: Application
    Filed: February 24, 2012
    Publication date: June 21, 2012
    Applicant: ASSA ABLOY AB
    Inventor: Peter R. Lowe
  • Publication number: 20120124820
    Abstract: A coupling body for a coaxial connector is dimensioned to couple with connector body at a connector end. An inner body of the coupling body is provided with a bore dimensioned to receive the coaxial cable. The inner body is formed of transparent material partially covered in an opaque material. An uncovered portion of the inner body functions as a visual installation portal. Methods of installation include inserting the coaxial cable into the cable end of the bore of the inner body until a desired portion of a prepared end of the coaxial cable is visible.
    Type: Application
    Filed: November 22, 2010
    Publication date: May 24, 2012
    Applicant: Andrew LLC
    Inventor: David R. Low
  • Publication number: 20120117553
    Abstract: An enhanced function-descriptor-based dispatch in a multi-linkage environment receives user code containing a function compiled in a supplementary linkage convention of a caller to form an invoked function and determines whether the supplementary linkage convention of the caller for the invoked function matches a supplementary linkage implementation provided by a library. Responsive to a determination that the supplementary linkage convention of the caller for the invoked function matches a supplementary linkage implementation provided by the library, an embodiment selects the supplementary linkage implementation provided by the library and dispatches the invoked function in the selected supplementary linkage implementation provided by the library.
    Type: Application
    Filed: October 8, 2011
    Publication date: May 10, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Allan H. Kielstra, Andrew R. Low, Marcel Mitran, Kishor V. Patil, Ivan K. Y. Sham
  • Patent number: 8150374
    Abstract: The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system.
    Type: Grant
    Filed: December 1, 2009
    Date of Patent: April 3, 2012
    Assignee: Assa Abloy AB
    Inventor: Peter R. Lowe
  • Publication number: 20120024953
    Abstract: A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.
    Type: Application
    Filed: September 21, 2011
    Publication date: February 2, 2012
    Applicant: Xerox Corporation
    Inventors: Zhigang Fan, Reiner Eschbach, Calvin John Marlett, William A. Fuss, James R. Low, Shen-ge Wang
  • Publication number: 20120007607
    Abstract: A sensing system comprises a material having a matrix structure in which a plurality of sensing elements are embedded, the sensing elements having electron distribution and/or transport properties that change in response to a change in a physical or chemical property of the material. The sensing system further comprises a receiver, including an antenna, the receiver arranged to receive a source RF signal and a returned RF signal, the returned RF signal being received from the material. A change in the electron distribution and/or transport properties of the sensing elements cause the source RF signal to change, such that a change in a property of the material can be determined from the returned RF signal. A corresponding method of sensing a change in a property of a material is also provided.
    Type: Application
    Filed: November 28, 2008
    Publication date: January 12, 2012
    Inventors: Christopher R. Lowe, Quentin Tannock, Adrian Stevenson, Karishima Jain
  • Patent number: 8056821
    Abstract: A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: November 15, 2011
    Assignee: Xerox Corporation
    Inventors: Zhigang Fan, Reiner Eschbach, Calvin Jon Marlett, William A. Fuss, James R. Low, Shen-ge Wang
  • Publication number: 20110264841
    Abstract: A method, system and computer program product for sharing class data among virtual machine applications running on one or more guests in a virtualized environment. A control program in a virtual operating system is used to manage the user portions of the virtual operating system, each commonly referred to as a guest. A guest operating system runs on each guest and applications can run on each guest operating system. A memory management facility manages shared memory which includes a class cache configured to store class data. The shared memory may be mounted onto each guest using a cluster file system or accessed via an API interface thereby allowing the class cache to be shared across the guests. By sharing the class cache among the guests, multiple copies of the same class data are no longer necessary thereby optimally using the physical memory on the host.
    Type: Application
    Filed: April 26, 2010
    Publication date: October 27, 2011
    Applicant: International Business Machines Corporation
    Inventors: Gianni S. Duimovich, Prasanna K. Kalle, Angela Lin, Andrew R. Low, Prashanth K. Nageshappa
  • Publication number: 20110239219
    Abstract: Shared memory and sockets are used to protect shared resources in an environment where multiple operating systems execute concurrently on the same hardware. Rather than using spinlocks for serializing access to the shared resources, when a thread is unable to acquire a shared resource because that resource is already held by another thread, the thread that was unable to acquire the resource creates a socket with which it will wait to be notified that the shared resource has been released. The sockets may be network sockets or in-memory sockets that are accessible across the multiple operating systems; if sockets are not available in a particular implementation, communication technology that provides analogous services between operating systems may be used instead. In an optional aspect, fault tolerance is provided to address socket failures, in which case one or more threads may fall back (at least temporarily) to using spinlocks.
    Type: Application
    Filed: March 29, 2010
    Publication date: September 29, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Fulton, Angela Lin, Andrew R. Low, Prashanth K. Nageshappa
  • Publication number: 20110177540
    Abstract: An isolated recombinant luciferase having luciferase activity. The recombinant luciferase has an amino acid sequence which differs from the wild-type luciferase from Photinus pyralis, Luciola mingrelica, Luciola cruciata, Luciola lateralis, Hotaria parvula, Pyrophorus plagiophthalamus, Lampyris noctiluca, Pyrocoelia miyako or Photinus pennsylvanica. In the sequence of the recombinant luciferase, the amino acid residue corresponding to phenylalanine 295 in Photinus pyralis wild-type luciferase or to leucine 297 in Luciola mingrelica, Luciola cruciata or Luciola lateralis wild-type luciferases, is mutated compared to the corresponding amino acid which appears in the corresponding wild-type luciferase sequence. The recombinant luciferase has increased thermostability compared to the corresponding wild-type luciferase.
    Type: Application
    Filed: February 9, 2011
    Publication date: July 21, 2011
    Inventors: David J. Squirrell, Melenie J. Murphy, Rachel L. Price, Christopher R. Lowe, Peter J. White, Laurence C. Tisi, James A. H. Murray