Patents by Inventor Rhonda Childress
Rhonda Childress has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070061358Abstract: The invention is a computer-implemented workflow application comprising one or more workflow components, each workflow component comprising an object having a metadata property; a workflow program comprising workflow components connected together to execute an operational workflow; a class loader program operable to introspect the objects and extract the metadata properties when each workflow component of the workflow program is executed, and store the metadata properties in a memory; and a workflow manager program operable to analyze the metadata stored in the memory and provide requested status information.Type: ApplicationFiled: September 13, 2005Publication date: March 15, 2007Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20070061182Abstract: The invention comprises a method of reporting and displaying workflow status information in a computer system having a workflow application and a graphical user interface including a display, the method comprising retrieving a set of metadata properties from a memory in the computer system, wherein at least one metadata property represents the number of workflow instances running in the workflow application, and at least one metadata property represents the type of each workflow instance running in the workflow application; and displaying on the display the number and type of each workflow instances running in the workflow application.Type: ApplicationFiled: September 13, 2005Publication date: March 15, 2007Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20070046282Abstract: Generating a description of a test grid environment for use in a grid computing environment. A database containing a number of test snapshots is generated. Each test snapshot reflects a previously used grid test environment, and each test snapshot includes a grid configuration used to implement a particular test scenario for a particular application. When a new, desired, test scenario is generated, a description of the new test scenario is entered as a query to the database. Based on the information in the database, a proposed test grid environment description is produced.Type: ApplicationFiled: August 31, 2005Publication date: March 1, 2007Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
-
Publication number: 20060294057Abstract: Transactions with respect to database operations are fingerprinted by associating transaction identifiers with logged information about those database operations. An SQL query is obtained prior to its evaluation by a database engine. A transaction identifier to be associated with the SQL query is also obtained. The SQL query is then modified to generate a modified SQL query, wherein the modified SQL query includes a WHERE clause that contains an expression that always evaluates to a logical true value, and wherein the expression contains the transaction identifier. The modified SQL query is then sent to the database engine for evaluation within the data processing system. When the processing of the modified SQL query is logged with a copy of the modified SQL query, the logged information contains a copy of the transaction identifier.Type: ApplicationFiled: June 28, 2005Publication date: December 28, 2006Inventors: Edward Childress, Rhonda Childress, David Kumhyr, Neil Pennell
-
Publication number: 20060235964Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.Type: ApplicationFiled: April 19, 2005Publication date: October 19, 2006Inventors: Rhonda Childress, Edmond Chow, Stephen Watt, David Kumhyr
-
Publication number: 20060227810Abstract: A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment.Type: ApplicationFiled: April 7, 2005Publication date: October 12, 2006Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Paolo Magnone, Neil Pennell
-
Publication number: 20060225070Abstract: Setting up management and monitoring programs on one or more servers is simplified. When a pre-selected monitoring/management vendor is to be used, a general-purpose agent is installed after the vendor agent is installed and can determine the contents of the server(s), then manage additional setup for the vendor agent, such as configurations, best practices, and license management. When the user has not yet determined which vendor or vendors to utilize, a vendor-neutral agent will determine the contents of the server(s) and can then choose between various vendor programs, utilizing weightings according to the strengths and weaknesses of each vendor, as well as user preferences, to determine the best vendor or vendors to select. Any needed vendor agents are then downloaded by the vendor-neutral agent and installed. The vendor-neutral agent also includes the capabilities of the general-purpose agent and manages other setup needs, such as configurations, best practices, and license management.Type: ApplicationFiled: April 5, 2005Publication date: October 5, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
-
Publication number: 20060225123Abstract: A system and method for using hierarchical policy levels for distribution of software in a computer network. In one embodiment, computers of the network are arranged into a hierarchy. A management policy server with access to the network queries the hierarchy to identify computers at or below its own level within the hierarchy. Once a set of computers is identified, software programs, updates or policies are distributed, bypassing human intervention.Type: ApplicationFiled: April 1, 2005Publication date: October 5, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Alan Keel, David Kumhyr, Neil Pennell
-
Publication number: 20060206906Abstract: A web services endpoint emulator for testing and developing web server client program, which generates a service interface and makes the interface available for client consumption. Service interfaces are exposed with configuration options for each service. The configuration options produced by the invention includes pre-configured responses or the ability to prescript service responses from a configuration file, and to prompt a user for input during real time emulation of an endpoint service.Type: ApplicationFiled: March 10, 2005Publication date: September 14, 2006Applicant: International Business Machines CorporationInventors: Patrick Brooks, Rhonda Childress, Michael Spisak
-
Publication number: 20060168171Abstract: Method, system and computer program product for communicating information regarding a managed resource in a network data processing system. A method, in a network data processing system, for communicating information regarding a managed resource includes receiving management information regarding at least one managed resource. The received management information is converted into a specified format, and the converted management information is then sent to at least one management application in conjunction with the sending of presence information to the at least one management application. The converted management information may then be extracted from the presence information for use in any desired manner. The invention provides a convenient mechanism for communicating status information and other appropriate information regarding a managed resource to interested parties connected to the network data processing system.Type: ApplicationFiled: October 29, 2004Publication date: July 27, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell, Randy Scott
-
Publication number: 20060159127Abstract: An example of a solution provided here comprises automatically measuring bandwidth of a network connection; comparing results of the measuring, with bandwidth parameters; preventing a transfer of a file via the network connection, if measured bandwidth is less than a minimum acceptable value; providing to an end user an option of transferring a file via the network connection, if measured bandwidth is not less than a minimum acceptable value, but is less than an optimal value; and automatically transferring a file via the network connection, if measured bandwidth is greater than or equal to an optimal value.Type: ApplicationFiled: January 20, 2005Publication date: July 20, 2006Inventors: Rhonda Childress, David Kumhyr, Neil Pennell, Thomas Ruiz
-
Publication number: 20060161615Abstract: A method and program for providing the ability for systems personnel to use a personal wireless device, such as a mobile phone, palm device, or blackberry device, to receive a system alert regarding a developing situation requiring action and to be notified of pre-selected workflows that can resolve the situation prompting the alert. The systems personnel are then able to select a workflow, provide needed parameters, and provide the human approval to execute the workflow. The application packages the information provided by the user into a form usable by the orchestration/provisioning server. The server will perform the requested workflow as if entered on a local console and will respond to the device with a workflow status.Type: ApplicationFiled: January 20, 2005Publication date: July 20, 2006Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
-
Publication number: 20060136526Abstract: An improved method, apparatus, and computer instructions for installing software on a data processing system. The process identifies files for the data processing system to be provisioned and to form identified files. The identified files are located using a location map. The location map identifies a set of files and identifies each node in a network data processing system on which a file in the set of files is located. The identified files are transferred to the data processing system from the plurality of nodes in the network data processing system using the location map to form installation files. The data processing system is provisioned using the installation files.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Rhonda Childress, Catherine Crawford, David Kumhyr, Neil Pennell
-
Publication number: 20060136903Abstract: A method in a processing system for managing backup data on a set of nodes in a network data processing system. An inventory of files is generated on a set of nodes in the network data processing system. An initial map from the inventory is created, wherein the first initial map includes an identification of each file located on a node in the set of nodes. A location map is built from the initial map and the location map identifies a set of files and identifies each node on which a file in the set of files is located, wherein at least one node in the set of nodes is a peer node to another node in the set of nodes.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Rhonda Childress, David Kumhyr, Robert Madey, Neil Pennell
-
Publication number: 20060095577Abstract: A method, apparatus, and computer instructions for optimizing Web services binding. A request is received from a client for Web services binding information for a Web service. The current availability of the Web service requested by the client is identified in response to receiving the request to form an identified current availability. An indication of the identified current availability of the Web service is sent to the client in response to identifying the current availability of the Web service requested by the client. The client uses the indication of the identified current availability to selectively use the Web service.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, David Kumhyr, Neil Pennell, Ward Harold
-
Publication number: 20060095519Abstract: A method, apparatus, and computer instructions for programmatic communications via an instant messaging network. A connection is established to the instant messaging network. A script is received though the connection. The script is then executed.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Reid Minyen, Neil Pennell
-
Publication number: 20060095561Abstract: An improved method, apparatus, and computer instructions for correlating system management information in a network data processing system. Monitoring an instant messaging chat group for system management information sent by a set of agents located in the network data processing system using an instant messaging system, wherein the system management information forms collected system management information, correlating the collected system management information form correlated system management information, and initiating an action based on the correlated system management information.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventors: Rhonda Childress, Ward Harold, David Kumhyr, Neil Pennell
-
Publication number: 20060025950Abstract: Provided is a method for monitoring resources in a utility computing environment (UCE). Measurements are evaluated to determine whether or not a particular resource requires remedial or other type of action. A sliding measurement window is employed to assemble a number of measurements corresponding to a particular resource. The number of intervals in a sliding measurement window is based upon best practices corresponding to the resource being measured and analyzed. A first threshold-crossing event and subsequent events are stored until the window is full, or closed. When the window is closed, the threshold-crossing measurements are analyzed to determine whether or not there exists an issue with the resource that requires action. Once a window has been closed and analyzed, the first threshold-crossing event and each subsequent event up to a second threshold-crossing event are discarded and the window reopens.Type: ApplicationFiled: July 29, 2004Publication date: February 2, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda Childress, Miguel Gasca, Elfred Pagan, Abigail Tittizer
-
Publication number: 20060015608Abstract: Disclosed are a tool, a method, and a computer program for suppressing events. The tool comprises a database having a resource table, a batch loader interface for creating or updating said resource table, and a web based user interface to said database. The event suppression tool further comprises a batch interface to receive data about planned activities and affected resources; and code for creating suppression activity windows from said data and said resource table, and for suppressing from said user interface, new events that fall within said activity windows. The preferred embodiment of the invention allows temporarily suppressing various actions for events received for certain resources during specified times.Type: ApplicationFiled: July 13, 2004Publication date: January 19, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenneth Becker, Rhonda Childress, Brent Lamm, Thomas Newton, Michael Oliver, Ravirajan Rajan, Sara Waggoner
-
Publication number: 20050262235Abstract: A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage.Type: ApplicationFiled: April 8, 2004Publication date: November 24, 2005Applicant: International Business Machines CorporationInventors: Rhonda Childress, David Kumhyr, Neil Pennell