Patents by Inventor Richard Marejka
Richard Marejka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8856635Abstract: A system and method of accessing remote services through a network including generating a message within a local computer system using a process having a specified type and version. The message is associated with the specified type and version and transported to an remote service provider system. The remote service provider system parses the message to identify the type and version information, then passes the message to a particular process that corresponds to the process used to generate the message based upon the type and version information.Type: GrantFiled: May 5, 2006Date of Patent: October 7, 2014Assignee: Oracle America, Inc.Inventors: Richard Marejka, David Haynes
-
Patent number: 7512950Abstract: Mechanisms and processes for synchronizing a group of threads that use a semaphore for each waiting thread to implement a barrier. A barrier is created comprising a counter, a semaphore list, and at least one mutual exclusion (mutex) lock. For each thread using the barrier, it is determined whether that thread is the last to arrive. For each thread that is not the last to arrive at the barrier, the thread is caused to wait on a semaphore. The last thread to arrive at the barrier causes each waiting thread to resume execution.Type: GrantFiled: August 14, 2003Date of Patent: March 31, 2009Assignee: Sun Microsystems, Inc.Inventor: Richard Marejka
-
Patent number: 7362701Abstract: A computer-based system that permits a service-provider to monitoring other computer systems includes a plurality of relays. A monitored relay collects data from one or more monitored computers in the system. This data is forwarded through a secure communication pipeline implemented by the monitoring system to a forwarding relay. The forwarding relay controls data flow between a service provider node and the monitored relays, and includes an instrumentation process that collects data regarding one or more message threads in the relay and sends the data downstream to a service provider system. Computers at the service provider node analyze the data to generate meaningful information about the monitored system, which can be accessed by the service provider or by the owner/operator of the computer system. In addition, the information may be used to generate notices or alarms of specific events.Type: GrantFiled: June 27, 2002Date of Patent: April 22, 2008Assignee: Sun Microsystems, Inc.Inventors: Richard Marejka, Guy Birkbeck, Dariusz Dabrowski
-
Patent number: 7231455Abstract: A system and method for throttling transmissions of gathered computer system monitoring and asset data within a customer's communications network. A relay is provided within the network with an interface for transmitting messages to a downstream device such as the Internet. A data transmission throttle controls the downstream interface to transmit data at or below a data transfer threshold defining an allowable data transfer volume per transmission period. The method includes receiving customer input and modifying the data transfer threshold based on the input, with thresholds being set for a matrix of transmission periods (such as 24 hour by 7 day). The data transmission throttle determines whether messages exceed thresholds for the current transmission period, such as by comparing the size of the message to a data flow counter, and controls data transmissions by the relay to not exceed the threshold and by resetting the counter for each threshold.Type: GrantFiled: June 25, 2002Date of Patent: June 12, 2007Assignee: Sun Microsystems, Inc.Inventors: Richard Marejka, Dean Kemp
-
Patent number: 7149898Abstract: A registration and authentication scheme that may be used in conjunction with a computer-based system for monitoring other computer systems is disclosed. A monitored relay transmits a unique identifier to a server in the monitoring system. The server generates a random number pair, ensures the random number pair is unique, and associates the unique relay identifier with the random number pair to form an unbound key, which is registered in a database associated with the server. The unbound key is encrypted and made available to the relay. Subsequently, when the relay is instantiated it transmits the contents of the unbound key file to the monitoring system. The monitoring system decrypts the unbound key file and searches associated databases to determine whether the relay is registered and authenticates the relay.Type: GrantFiled: June 27, 2002Date of Patent: December 12, 2006Assignee: Sun Microsystems, Inc.Inventors: Richard Marejka, David Haynes
-
Publication number: 20060212793Abstract: A system and method of accessing remote services through a network including generating a message within a local computer system using a process having a specified type and version. The message is associated with the specified type and version and transported to an remote service provider system. The remote service provider system parses the message to identify the type and version information, then passes the message to a particular process that corresponds to the process used to generate the message based upon the type and version information.Type: ApplicationFiled: May 5, 2006Publication date: September 21, 2006Inventors: Richard Marejka, David Haynes
-
Patent number: 7080093Abstract: A system and method for database design is disclosed. DDL code, which may be generated by a suitable CASE tool, is bound to tags rather than to specific system parameters. The DDL code may be stored in a suitable data structure, such as a directory tree. A series of scripts are provided with the DDL code. The scripts may invoke an editor, such as the Unix stream editor, to bind the tagged DDL code to specific system parameters.Type: GrantFiled: December 2, 2002Date of Patent: July 18, 2006Assignee: Sun Microsystems, Inc.Inventors: Richard Marejka, Guy Birkbeck, Louis Ferrante, Dariusz Dabrowski
-
Publication number: 20030144987Abstract: A system and method for database design is disclosed. DDL code, which may be generated by a suitable CASE tool, is bound to tags rather than to specific system parameters. The DDL code may be stored in a suitable data structure, such as a directory tree. A series of scripts are provided with the DDL code. The scripts may invoke an editor, such as the Unix stream editor, to bind the tagged DDL code to specific system parameters.Type: ApplicationFiled: December 2, 2002Publication date: July 31, 2003Inventors: Richard Marejka, Guy Birkbeck, Louis Ferrante, Dariusz Dabrowski
-
Publication number: 20030140149Abstract: A communication protocol for relay-to-relay communications. Message format includes a fixed length and format header including protocol, command, and length fields and a variable length data section defined by commands in the header selected from a limited command set and by the length field of the header. The protocol includes starting transmission by transmitting a relay identification command to the receiving relay which verifies status of the sending relay and transmits a relay identification acknowledgment. The sending relay transmits the highest priority message in its queues by sending a start of message command identifying the message to be sent and its priority. The receiving relay responds with an acknowledgment and the sending relay sends message segments. The receiving relay does not acknowledge the message segments. The sending relay indicates an empty message file by transmitting an end of message command and the receiving relay replies with an acknowledgment.Type: ApplicationFiled: June 24, 2002Publication date: July 24, 2003Inventors: Richard Marejka, David Haynes
-
Publication number: 20030140139Abstract: A database structure, system and method as part of a self-monitoring system that provides a scalable solution to delivering self-service solutions including system monitoring, trend reporting, asset tracking, and asset time delta reporting. The database structure is represented by Entity Relationship Diagrams (ERDs) that illustrate how tables and columns of data are interrelated. The database is organized to store and retrieve data from customer systems on a customer network, including data about the configuration of the customer systems and customer network and trends occurring on the customer systems and network. The configuration and trend data stored in the database can be processed by service provider system and displayed as custom tailored reports to operators of the customer network through customer management nodes.Type: ApplicationFiled: June 27, 2002Publication date: July 24, 2003Inventors: Richard Marejka, Guy Birkbeck, Louis Ferrante, Dariusz Dabrowski
-
Publication number: 20030135575Abstract: A data transmission method utilizing priority-based messaging and providing a storing and forwarding of delayed messages. The method includes receiving messages with an assigned priority at a forwarding relay that are examined for priority and inserted based on assigned priority into FIFO queues provided for each message priority. A file of messages of a priority is assembled and the file is placed in the priority-based queue. The highest priority message is identified and transmitted to the appropriate recipient or stored until the recipient is available or the message deliverable. A next determination of the highest priority message is made and the next message in that priority queue is transmitted. Messages of a lower priority file are sent until a higher priority message is received. Messages for transmittal upstream and downstream of the forwarding relay are received concurrently and priority queues are provided for received upstream and downstream messages.Type: ApplicationFiled: June 27, 2002Publication date: July 17, 2003Inventors: Richard Marejka, Dean Kemp, David Haynes
-
Publication number: 20030135382Abstract: A system and method for system monitoring. The system monitors parameters and when parameters cross thresholds, the system transmits an event message to the service provider and determines if an alarm should be generated. During system operation, data is collected periodically and new monitoring data is compared with recently stored monitoring data to identify events and alarms. The service provider transmits monitoring interfaces to the customer including current status concurrently with indicators of prior operating states, such as uncleared alarm indicators. The monitoring interfaces selectively show operating status for the monitored environment, domains, systems, or individual monitored components. For each monitored element, a multi-tier arrangement divides the operating status into three operating ranges, such as normal, non-critical, and critical, with current status displayed on the monitoring interfaces on a domain, system, element, or component basis.Type: ApplicationFiled: June 25, 2002Publication date: July 17, 2003Inventors: Richard Marejka, David Haynes, Louis Ferrante, Guy Birkbeck
-
Publication number: 20030135639Abstract: A system and method for throttling transmissions of gathered computer system monitoring and asset data within a customer's communications network. A relay is provided within the network with an interface for transmitting messages to a downstream device such as the Internet. A data transmission throttle controls the downstream interface to transmit data at or below a data transfer threshold defining an allowable data transfer volume per transmission period. The method includes receiving customer input and modifying the data transfer threshold based on the input, with thresholds being set for a matrix of transmission periods (such as 24 hour by 7 day). The data transmission throttle determines whether messages exceed thresholds for the current transmission period, such as by comparing the size of the message to a data flow counter, and controls data transmissions by the relay to not exceed the threshold and by resetting the counter for each threshold.Type: ApplicationFiled: June 25, 2002Publication date: July 17, 2003Inventors: Richard Marejka, Dean Kemp
-
Publication number: 20030135735Abstract: A registration and authentication scheme that may be used in conjunction with a computer-based system for monitoring other computer systems is disclosed. A monitored relay transmits a unique identifier to a server in the monitoring system. The server generates a random number pair, ensures the random number pair is unique, and associates the unique relay identifier with the random number pair to form an unbound key, which is registered in a database associated with the server. The unbound key is encrypted and made available to the relay. Subsequently, when the relay is instantiated it transmits the contents of the unbound key file to the monitoring system. The monitoring system decrypts the unbound key file and searches associated databases to determine whether the relay is registered and authenticates the relay.Type: ApplicationFiled: June 27, 2002Publication date: July 17, 2003Inventors: Richard Marejka, David Haynes
-
Publication number: 20030135823Abstract: A system and method of accessing remote services through a network including generating a message within a local computer system using a process having a specified type and version. The message is associated with the specified type and version and transported to an remote service provider system. The remote service provider system parses the message to identify the type and version information, then passes the message to a particular process that corresponds to the process used to generate the message based upon the type and version information.Type: ApplicationFiled: June 27, 2002Publication date: July 17, 2003Inventors: Richard Marejka, David Haynes
-
Publication number: 20030133464Abstract: A computer-based system that permits a service-provider to monitoring other computer systems includes a plurality of relays. A monitored relay collects data from one or more monitored computers in the system. This data is forwarded through a secure communication pipeline implemented by the monitoring system to a forwarding relay. The forwarding relay controls data flow between a service provider node and the monitored relays, and includes an instrumentation process that collects data regarding one or more message threads in the relay and sends the data downstream to a service provider system. Computers at the service provider node analyze the data to generate meaningful information about the monitored system, which can be accessed by the service provider or by the owner/operator of the computer system. In addition, the information may be used to generate notices or alarms of specific events.Type: ApplicationFiled: June 27, 2002Publication date: July 17, 2003Inventors: Richard Marejka, Guy Birkbeck, Dariusz Dabrowski