Patents by Inventor Rod Waltermann

Rod Waltermann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070016786
    Abstract: A method for updating an ISO file, e.g., to add a digital signature to the ISO file, includes adding a supplemental file composed of, e.g., all zeroes to the ISO file before recording, and then recording the ISO file with supplemental file to an optical disk using ISO format. A digital signature is computed after recording. The zeroes in the supplemental file are replaced by the values of the digital signature and the file is re-saved. Also, an ISO file that might have a common part and several unique parts, e.g., for respective languages, is deconstructed such that only a single copy of the common part is recorded to disk, avoiding multiple recordations of the same data.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Inventors: Rod Waltermann, Mark Davis, Seiichi Kawano
  • Publication number: 20070011445
    Abstract: A method for booting into computer memory a non-operating system (O.S.) program from a hard disk drive (HDD) prior to booting into memory an O.S. from the HDD. The method includes establishing a table of contents (TOC) on the HDD that contains entries for special O.S. programs. A pointer to the TOC is placed in non-volatile memory of the computer that is associated with the HDD, and when BIOS of the computer is prompted to load into memory one of the special O.S. programs, the pointer is accessed and used to locate the TOC, which in turn is accessed to load the special O.S. program.
    Type: Application
    Filed: July 11, 2005
    Publication date: January 11, 2007
    Inventors: Rod Waltermann, Nathan Peterson, Joseph Freeman, Randall Springfield, Mark Davis, Steven Goodman, Isaac Karpel, Scott Kelso
  • Publication number: 20070005951
    Abstract: If a user forgets the power-on password of his computer, he can depress the “enter” key or “access” key once to cause the BIOS to locate the power-on password in memory and attempt to unlock the HDD using the power-on password to boot a secure O.S. The HDD password either can be the same as the power-on password or the HDD can recognize the power-on password for the limited purpose of allowing access to the secure O.S. In any case, the secure O.S. is booted for password reset.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 4, 2007
    Inventors: Mark Davis, Randall Springfield, David Challener, Rod Waltermann
  • Publication number: 20060294298
    Abstract: A “setmax” command is issued in BIOS to hide the service area (HPA) of a HDD during normal operation, so that the HPA cannot be accessed or erased inadvertently by the user or by a virus. Pressing a special key (e.g., F11) during booting permits access to the HPA.
    Type: Application
    Filed: June 27, 2005
    Publication date: December 28, 2006
    Inventors: Nathan Peterson, Joseph Freeman, Rod Waltermann, Randall Springfield, Mark Davis, Steven Goodman, Howard Locker, Daryl Cromer
  • Publication number: 20060287972
    Abstract: An apparatus, system, and method are disclosed for identifying structural stress conditions for computer hardware. The apparatus includes a plurality of modules configured to functionally execute the necessary steps of monitoring a physical condition affecting a computer hardware component, recognizing a potential damage condition based on a threshold, and responding to the potential damage condition. These modules in the described embodiments include a monitoring module, a recognition module, and a response module. Beneficially, such an apparatus, system, and method would identify potential damage conditions and alert a user to the potential damage condition before physical damage to the computer hardware component occurs. The user can then alleviate the physical condition affecting the computer component and avoid component damage.
    Type: Application
    Filed: June 20, 2005
    Publication date: December 21, 2006
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20060277603
    Abstract: A system and method for autonomically configuring a router are presented. An agent is installed on a client that tracks resource authorizations for particular applications. The agent sends a configuration request to a router that requests the router to change one or more router parameters, such as assigning a port to the client. The router compares the configuration request against its router policies, and changes router parameters (assigns resources) based upon the configuration request. Once the agent and the router authorize the resources, the application uses the resources to communicate with a computer network through the client resource and the router resource. When the application is terminated, the router and the client disable their respective resources.
    Type: Application
    Filed: June 1, 2005
    Publication date: December 7, 2006
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Welsler
  • Publication number: 20060207268
    Abstract: A system and method for increasing the efficiency of a thermal management profile includes a central repository. The central repository is for receiving data for power consumption and location from equipment, combining the data with a current temperature near the equipment, and adjusting the current temperature based on the combined data.
    Type: Application
    Filed: March 17, 2005
    Publication date: September 21, 2006
    Applicant: International Business Machines Corporation
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20060195654
    Abstract: The invention partitions the HDD into three areas, namely, no access, write-only, and the conventional read/write. Sensitive data (antivirus programs, back up data, etc.) is written into write-only areas, which thereafter become designated “no access” by appropriately changing their designation a data structure known as “logical block address” or “LBA”. Only users having approved passwords can change the status of a “no access” block back to “write-only” or “read/write”.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Inventors: David Challener, Rod Waltermann
  • Publication number: 20060190831
    Abstract: Automatic display of a pop-up window on a computer is delayed until a time period has elapsed since the last user keyboard entry or mouse manipulation, to avoid distracting the user while the user is busy inputting data.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 24, 2006
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20060190484
    Abstract: When a first blade server that is servicing a client computer becomes congested, service is transferred to a second blade server potentially in a different blade center by freezing the first blade and client and then sending, to the second blade server, a pointer to the currently addressed location in the client's virtual storage and an exact memory map in the first blade server that is associated with the client computer, along with the client's IP address. These are used to reconstruct the state of the first blade in the second blade, at which time the second blade resumes service to the client.
    Type: Application
    Filed: February 18, 2005
    Publication date: August 24, 2006
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060168486
    Abstract: A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
    Type: Application
    Filed: January 27, 2005
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060164421
    Abstract: A method and system are disclosed in which a management module (MM) designates an idle blade in a client blade farm to be an “administrative blade” that has administrator access to the virtual images of all users. The MM identifies when a particular user image is, or is not, in use and conveys this information to the administrative blade. The administrative blade performs virus scans, backups, defrags, patch installs, software upgrades, and other such maintenance functions on user images when they are inactive, thereby eliminating the performance impact to active users.
    Type: Application
    Filed: December 28, 2004
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060161796
    Abstract: A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060161765
    Abstract: A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060161972
    Abstract: Various methods are disclosed for ensuring compliance with operating system license requirements in a server blade center environment in which a server blade may have plural images of an O.S., one for each of plural thin clients serviced by the blade.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060143612
    Abstract: A screen saver is run from the deskside device of a workstation used by a first user, rather than from a blade being used by the first user. Screen saver software and the necessary hardware to run the screen saver are located on the deskside device, thereby making the screen saver independent from the blade. This enables the blade to be reallocated for use by a second user, in a manner that is transparent to the idle first user. When the first user wants to resume use of the computer system, a new blade (or the same blade, if available) is allocated to the first user, and the newly-allocated blade is restored to the status of the first blade at the time it entered its suspended state. From the perspective of the first user, nothing appears different, i.e., to the first user everything looks as though he or she is on the same blade as when they entered the idle state.
    Type: Application
    Filed: December 28, 2004
    Publication date: June 29, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060143262
    Abstract: The boot-time required for a log-on to a desktop blade system is improved, and a more streamlined process for performing maintenance operations, such as software updates, across an enterprise desktop blade system is facilitated. All activities being performed by a user are cached, in an off-blade storage location, on an ongoing basis. The caching is performed using “divided caching”, that is, different elements of the user image are stored in different locations. The specific divisions utilized are based upon classifications of the information to be cached, e.g., a first class of information used by all users of the system; a second class of information utilized by a certain class of users; a third class of information utilized only by a particular individual, etc.
    Type: Application
    Filed: December 28, 2004
    Publication date: June 29, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20060118624
    Abstract: Systems and methods for preventing the use of card skimmers on electronic card terminals are disclosed. Embodiments include a method that generally includes ejecting from a card slot in a rear faceplate an electronic card and determining the relative movement between a front faceplate and the card slot. Embodiments also include before receiving a second electronic card, changing the relative position of the card slot and the front faceplate. Embodiments may include moving the rear faceplate or moving the front faceplate. Further embodiments may include detecting an error during the changing of the relative position of the card slot and the front faceplate and, if an error is detected, moving the card slot to a lockdown position. Movements between the front faceplate and the card slot may be vertical, horizontal, radial, etc., and may be randomly generated.
    Type: Application
    Filed: December 6, 2004
    Publication date: June 8, 2006
    Applicant: International Business Machines Corporation
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20060085686
    Abstract: A system and method that restores a computer system is provided. An image is created of a primary drive that includes an operating system and one or more applications. A copy of the image is stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. Patches are received for the operating system and the applications and applied to the corresponding operating system or applications. A copy of the patch files is stored in the second nonvolatile storage area. When the system is restored, the primary drive is reformatted and the image stored on the second nonvolatile storage area is copied to the primary drive. The patches stored on the second nonvolatile storage area are then applied to the operating system and applications included in the image that was copied to the primary drive.
    Type: Application
    Filed: October 13, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Lee Highsmith, Howard Locker, Rod Waltermann
  • Publication number: 20060085685
    Abstract: A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
    Type: Application
    Filed: October 13, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Rod Waltermann