Patents by Inventor Ronald P. Doyle
Ronald P. Doyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7689872Abstract: An autonomic system for diagnosing and correcting error conditions among interrelated components and resources. The system can include one or more commonly formatted log files utilizing standardized naming conventions for the interrelated components and resources. Each of the commonly formatted log files can include an association with one of the interrelated components and resources. An autonomic system administrator can be coupled to each of the interrelated components and resources and can be configured to parse the log files to identify both error conditions arising in associated ones of the interrelated components and resources, and also dependent ones of the interrelated components and resources giving rise to the identified error conditions.Type: GrantFiled: July 1, 2003Date of Patent: March 30, 2010Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, David Louis Kaminsky
-
Patent number: 7685645Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: GrantFiled: April 14, 2008Date of Patent: March 23, 2010Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20100057505Abstract: A community input method can be provided. The method can include receiving from an end user a request to access a portion of a workflow in a business process instance, prompting the end user to provide community input to community documentation for the portion of the workflow, and rendering the community documentation accessible by other end users accessing the portion of the workflow. Optionally, an interval (whether fixed or random) of a number of end users requesting access to the portion of the workflow in the business process instance can be determined, and the end user can be programmatically prompted to provide community input only if the request from the end user is received on the determined interval.Type: ApplicationFiled: August 27, 2008Publication date: March 4, 2010Applicant: International Business Machines CorporationInventors: Ronald P. Doyle, Edith H. Stern, Barry E. Willner
-
Publication number: 20100050156Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.Type: ApplicationFiled: August 20, 2008Publication date: February 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
-
Publication number: 20100037225Abstract: Workload requests are routed in response to server greenness conditions. A workload request is received for a remotely invocable computing service executing separately in different remotely and geographically dispersed host computing servers. Greenness conditions pertaining to production or conservation of energy based upon external factors for each of the different remotely and geographically dispersed host computing servers are determined. The workload request is routed to one of the different remotely and geographically dispersed host computing servers based upon the determined greenness conditions.Type: ApplicationFiled: August 7, 2008Publication date: February 11, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, David L. Kaminsky, Edith H. Stern, Barry E. Willner
-
Patent number: 7660997Abstract: A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.Type: GrantFiled: March 11, 2008Date of Patent: February 9, 2010Assignee: International Business Machines CorporationInventor: Ronald P. Doyle
-
Patent number: 7558770Abstract: A method to anticipate and prevent application non-conformance is disclosed. The method includes making available a configuration management database (CMDB) having configuration information of a plurality of system resources and dependency information of a plurality of applications related to the plurality of system resources. The method also includes making available a plurality of rules to establish a plurality of operating conditions that are statistically probable to cause a non-conformance of each system resource of the plurality of system resources, and combining each rule with the CMDB to determine the dependency of each application upon each operating condition. The method proceeds with performing a response action in response to determining that any of the operating conditions are such to cause a statistically probable non-conformance of any of the plurality of applications.Type: GrantFiled: August 23, 2006Date of Patent: July 7, 2009Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, David L. Kaminsky
-
Patent number: 7552235Abstract: The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing policy selector can be configured for communicative linkage to a server cluster having one or more servers and programmed to select a particular one of the request routing policies for use in routing content requests in the server cluster based upon the cache metrics. In this regard, the routing policy selector further can include a coupling to the routing policies and the data store of cache metrics.Type: GrantFiled: December 11, 2003Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: Jeffery S. Chase, Ronald P. Doyle
-
Publication number: 20090113383Abstract: A method, system, and computer program product for implementing a customizable visual configuration (VC) template to retrieve and display a working set of system configuration objects. The computer-implementable method includes selecting a current system configuration object. Once a system configuration object is selected, a VC utility examines all available VC templates. The VC utility displays available VC templates whose starting configuration object matches the selected current system configuration object. In response to a selected VC template, the VC utility retrieves and displays system configuration objects defined by the selected VC template.Type: ApplicationFiled: October 25, 2007Publication date: April 30, 2009Inventors: ROBERTO DELIMA, Ronald P. Doyle, Michael F. Gering, Yongcheng Li
-
Publication number: 20090100503Abstract: The present solution can authenticate a first host to access a memory space of a shared wireless peripheral communicatively linked to the first host via a bus and a device controller. Digital content displayed within a graphical user interface of the first host can be selected. Either a CUT or COPY clipboard operation can be detected that is conducted from the first host. The selected content can be copied to the memory space of the peripheral. The second host can be authenticated to access a memory space of the peripheral communicatively linked to the second host via a bus and a device controller. A PASTE clipboard operation conducted from the second host can be detected. The selected content obtained from the first host can be conveyed from the memory space of the shared wireless peripheral to a cursor specified location within a graphical user interface of the second host.Type: ApplicationFiled: October 15, 2007Publication date: April 16, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: RONALD P. DOYLE
-
Publication number: 20090100192Abstract: A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system.Type: ApplicationFiled: November 12, 2008Publication date: April 16, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, David Louis Kaminsky
-
Publication number: 20090099880Abstract: A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context.Type: ApplicationFiled: October 12, 2007Publication date: April 16, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
-
Publication number: 20090100431Abstract: Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance.Type: ApplicationFiled: October 12, 2007Publication date: April 16, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
-
Publication number: 20090100423Abstract: A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk.Type: ApplicationFiled: October 16, 2007Publication date: April 16, 2009Inventors: Ronald P. Doyle, Stephen J. Schmidt, Qingbo Wang, Ruth E. Willenborg
-
Patent number: 7515717Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: GrantFiled: July 31, 2003Date of Patent: April 7, 2009Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20090060187Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20090063849Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 7461166Abstract: A method for routing service requests to service instances in a service providing infrastructure is disclosed. A service request is received. Computing resource vectots for at least two service hosts are computed, and each of the service hosts have a corresponding service providing infrastructure. A resource model for the service request is retrieved. The retrieved resource model are matched to each of the resource vectors to identify a best-fit resource vector. The service request is routed to a selected service host associated with the identified best-fit resource vector. Processing of received service requests is monitored. Individual resource components in the service hosts which are consumed during the processing are identified. Resource models for the service requests are produced based upon the identified individual resource components in the service hosts. A time series model is computed for each of the service requests based upon the identified individual resource components.Type: GrantFiled: February 21, 2003Date of Patent: December 2, 2008Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, David Louis Kaminsky
-
Publication number: 20080235173Abstract: A method for the autonomic management of autonomic systems can include monitoring a managed system and recommending a course of action to be performed in the managed system. It can be determined whether the recommended course of action has been performed by an administrator. Responsive to the determination, it further can be determined whether an outcome from the course of action comports with a predicted outcome. If so, a point count can be changed responsive to a further determination that the outcome from the course of action comports with the predicted outcome. Conversely, the point count can be oppositely changed responsive to a further determination that the outcome from the course of action does not comports with the predicted outcome. In any case, when the point count crosses a threshold value, the management of the managed system can be transitioned to an adaptive component.Type: ApplicationFiled: April 24, 2008Publication date: September 25, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, David L. Kaminsky, David M. Ogle, Richard Dean Telford
-
Publication number: 20080212848Abstract: A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.Type: ApplicationFiled: March 11, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Ronald P. Doyle