Patents by Inventor Rhonda Childress

Rhonda Childress has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070061358
    Abstract: The invention is a computer-implemented workflow application comprising one or more workflow components, each workflow component comprising an object having a metadata property; a workflow program comprising workflow components connected together to execute an operational workflow; a class loader program operable to introspect the objects and extract the metadata properties when each workflow component of the workflow program is executed, and store the metadata properties in a memory; and a workflow manager program operable to analyze the metadata stored in the memory and provide requested status information.
    Type: Application
    Filed: September 13, 2005
    Publication date: March 15, 2007
    Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20070061182
    Abstract: The invention comprises a method of reporting and displaying workflow status information in a computer system having a workflow application and a graphical user interface including a display, the method comprising retrieving a set of metadata properties from a memory in the computer system, wherein at least one metadata property represents the number of workflow instances running in the workflow application, and at least one metadata property represents the type of each workflow instance running in the workflow application; and displaying on the display the number and type of each workflow instances running in the workflow application.
    Type: Application
    Filed: September 13, 2005
    Publication date: March 15, 2007
    Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20070046282
    Abstract: Generating a description of a test grid environment for use in a grid computing environment. A database containing a number of test snapshots is generated. Each test snapshot reflects a previously used grid test environment, and each test snapshot includes a grid configuration used to implement a particular test scenario for a particular application. When a new, desired, test scenario is generated, a description of the new test scenario is entered as a query to the database. Based on the information in the database, a proposed test grid environment description is produced.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 1, 2007
    Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
  • Publication number: 20060294057
    Abstract: Transactions with respect to database operations are fingerprinted by associating transaction identifiers with logged information about those database operations. An SQL query is obtained prior to its evaluation by a database engine. A transaction identifier to be associated with the SQL query is also obtained. The SQL query is then modified to generate a modified SQL query, wherein the modified SQL query includes a WHERE clause that contains an expression that always evaluates to a logical true value, and wherein the expression contains the transaction identifier. The modified SQL query is then sent to the database engine for evaluation within the data processing system. When the processing of the modified SQL query is logged with a copy of the modified SQL query, the logged information contains a copy of the transaction identifier.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventors: Edward Childress, Rhonda Childress, David Kumhyr, Neil Pennell
  • Publication number: 20060235964
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.
    Type: Application
    Filed: April 19, 2005
    Publication date: October 19, 2006
    Inventors: Rhonda Childress, Edmond Chow, Stephen Watt, David Kumhyr
  • Publication number: 20060227810
    Abstract: A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment.
    Type: Application
    Filed: April 7, 2005
    Publication date: October 12, 2006
    Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
  • Publication number: 20060225070
    Abstract: Setting up management and monitoring programs on one or more servers is simplified. When a pre-selected monitoring/management vendor is to be used, a general-purpose agent is installed after the vendor agent is installed and can determine the contents of the server(s), then manage additional setup for the vendor agent, such as configurations, best practices, and license management. When the user has not yet determined which vendor or vendors to utilize, a vendor-neutral agent will determine the contents of the server(s) and can then choose between various vendor programs, utilizing weightings according to the strengths and weaknesses of each vendor, as well as user preferences, to determine the best vendor or vendors to select. Any needed vendor agents are then downloaded by the vendor-neutral agent and installed. The vendor-neutral agent also includes the capabilities of the general-purpose agent and manages other setup needs, such as configurations, best practices, and license management.
    Type: Application
    Filed: April 5, 2005
    Publication date: October 5, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
  • Publication number: 20060225123
    Abstract: A system and method for using hierarchical policy levels for distribution of software in a computer network. In one embodiment, computers of the network are arranged into a hierarchy. A management policy server with access to the network queries the hierarchy to identify computers at or below its own level within the hierarchy. Once a set of computers is identified, software programs, updates or policies are distributed, bypassing human intervention.
    Type: Application
    Filed: April 1, 2005
    Publication date: October 5, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, Alan Keel, David Kumhyr, Neil Pennell
  • Publication number: 20060206906
    Abstract: A web services endpoint emulator for testing and developing web server client program, which generates a service interface and makes the interface available for client consumption. Service interfaces are exposed with configuration options for each service. The configuration options produced by the invention includes pre-configured responses or the ability to prescript service responses from a configuration file, and to prompt a user for input during real time emulation of an endpoint service.
    Type: Application
    Filed: March 10, 2005
    Publication date: September 14, 2006
    Applicant: International Business Machines Corporation
    Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
  • Publication number: 20060168171
    Abstract: Method, system and computer program product for communicating information regarding a managed resource in a network data processing system. A method, in a network data processing system, for communicating information regarding a managed resource includes receiving management information regarding at least one managed resource. The received management information is converted into a specified format, and the converted management information is then sent to at least one management application in conjunction with the sending of presence information to the at least one management application. The converted management information may then be extracted from the presence information for use in any desired manner. The invention provides a convenient mechanism for communicating status information and other appropriate information regarding a managed resource to interested parties connected to the network data processing system.
    Type: Application
    Filed: October 29, 2004
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell, Randy Scott
  • Publication number: 20060159127
    Abstract: An example of a solution provided here comprises automatically measuring bandwidth of a network connection; comparing results of the measuring, with bandwidth parameters; preventing a transfer of a file via the network connection, if measured bandwidth is less than a minimum acceptable value; providing to an end user an option of transferring a file via the network connection, if measured bandwidth is not less than a minimum acceptable value, but is less than an optimal value; and automatically transferring a file via the network connection, if measured bandwidth is greater than or equal to an optimal value.
    Type: Application
    Filed: January 20, 2005
    Publication date: July 20, 2006
    Inventors: Rhonda Childress, David Kumhyr, Neil Pennell, Thomas Ruiz
  • Publication number: 20060161615
    Abstract: A method and program for providing the ability for systems personnel to use a personal wireless device, such as a mobile phone, palm device, or blackberry device, to receive a system alert regarding a developing situation requiring action and to be notified of pre-selected workflows that can resolve the situation prompting the alert. The systems personnel are then able to select a workflow, provide needed parameters, and provide the human approval to execute the workflow. The application packages the information provided by the user into a form usable by the orchestration/provisioning server. The server will perform the requested workflow as if entered on a local console and will respond to the device with a workflow status.
    Type: Application
    Filed: January 20, 2005
    Publication date: July 20, 2006
    Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
  • Publication number: 20060136526
    Abstract: An improved method, apparatus, and computer instructions for installing software on a data processing system. The process identifies files for the data processing system to be provisioned and to form identified files. The identified files are located using a location map. The location map identifies a set of files and identifies each node in a network data processing system on which a file in the set of files is located. The identified files are transferred to the data processing system from the plurality of nodes in the network data processing system using the location map to form installation files. The data processing system is provisioned using the installation files.
    Type: Application
    Filed: December 16, 2004
    Publication date: June 22, 2006
    Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
  • Publication number: 20060136903
    Abstract: A method in a processing system for managing backup data on a set of nodes in a network data processing system. An inventory of files is generated on a set of nodes in the network data processing system. An initial map from the inventory is created, wherein the first initial map includes an identification of each file located on a node in the set of nodes. A location map is built from the initial map and the location map identifies a set of files and identifies each node on which a file in the set of files is located, wherein at least one node in the set of nodes is a peer node to another node in the set of nodes.
    Type: Application
    Filed: December 16, 2004
    Publication date: June 22, 2006
    Inventors: Rhonda Childress, David Kumhyr, Robert Madey, Neil Pennell
  • Publication number: 20060095577
    Abstract: A method, apparatus, and computer instructions for optimizing Web services binding. A request is received from a client for Web services binding information for a Web service. The current availability of the Web service requested by the client is identified in response to receiving the request to form an identified current availability. An indication of the identified current availability of the Web service is sent to the client in response to identifying the current availability of the Web service requested by the client. The client uses the indication of the identified current availability to selectively use the Web service.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, David Kumhyr, Neil Pennell, Ward Harold
  • Publication number: 20060095519
    Abstract: A method, apparatus, and computer instructions for programmatic communications via an instant messaging network. A connection is established to the instant messaging network. A script is received though the connection. The script is then executed.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, Ward Harold, David Kumhyr, Reid Minyen, Neil Pennell
  • Publication number: 20060095561
    Abstract: An improved method, apparatus, and computer instructions for correlating system management information in a network data processing system. Monitoring an instant messaging chat group for system management information sent by a set of agents located in the network data processing system using an instant messaging system, wherein the system management information forms collected system management information, correlating the collected system management information form correlated system management information, and initiating an action based on the correlated system management information.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell
  • Publication number: 20060025950
    Abstract: Provided is a method for monitoring resources in a utility computing environment (UCE). Measurements are evaluated to determine whether or not a particular resource requires remedial or other type of action. A sliding measurement window is employed to assemble a number of measurements corresponding to a particular resource. The number of intervals in a sliding measurement window is based upon best practices corresponding to the resource being measured and analyzed. A first threshold-crossing event and subsequent events are stored until the window is full, or closed. When the window is closed, the threshold-crossing measurements are analyzed to determine whether or not there exists an issue with the resource that requires action. Once a window has been closed and analyzed, the first threshold-crossing event and each subsequent event up to a second threshold-crossing event are discarded and the window reopens.
    Type: Application
    Filed: July 29, 2004
    Publication date: February 2, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda Childress, Miguel Gasca, Elfred Pagan, Abigail Tittizer
  • Publication number: 20060015608
    Abstract: Disclosed are a tool, a method, and a computer program for suppressing events. The tool comprises a database having a resource table, a batch loader interface for creating or updating said resource table, and a web based user interface to said database. The event suppression tool further comprises a batch interface to receive data about planned activities and affected resources; and code for creating suppression activity windows from said data and said resource table, and for suppressing from said user interface, new events that fall within said activity windows. The preferred embodiment of the invention allows temporarily suppressing various actions for events received for certain resources during specified times.
    Type: Application
    Filed: July 13, 2004
    Publication date: January 19, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kenneth Becker, Rhonda Childress, Brent Lamm, Thomas Newton, Michael Oliver, Ravirajan Rajan, Sara Waggoner
  • Publication number: 20050262235
    Abstract: A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage.
    Type: Application
    Filed: April 8, 2004
    Publication date: November 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Rhonda Childress, David Kumhyr, Neil Pennell