Patents by Inventor Ronald P. Doyle

Ronald P. Doyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7689872
    Abstract: An autonomic system for diagnosing and correcting error conditions among interrelated components and resources. The system can include one or more commonly formatted log files utilizing standardized naming conventions for the interrelated components and resources. Each of the commonly formatted log files can include an association with one of the interrelated components and resources. An autonomic system administrator can be coupled to each of the interrelated components and resources and can be configured to parse the log files to identify both error conditions arising in associated ones of the interrelated components and resources, and also dependent ones of the interrelated components and resources giving rise to the identified error conditions.
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: March 30, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David Louis Kaminsky
  • Patent number: 7685645
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: March 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20100057505
    Abstract: A community input method can be provided. The method can include receiving from an end user a request to access a portion of a workflow in a business process instance, prompting the end user to provide community input to community documentation for the portion of the workflow, and rendering the community documentation accessible by other end users accessing the portion of the workflow. Optionally, an interval (whether fixed or random) of a number of end users requesting access to the portion of the workflow in the business process instance can be determined, and the end user can be programmatically prompted to provide community input only if the request from the end user is received on the determined interval.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, Edith H. Stern, Barry E. Willner
  • Publication number: 20100050156
    Abstract: Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules.
    Type: Application
    Filed: August 20, 2008
    Publication date: February 25, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James M. Bonanno, Ronald P. Doyle, Michael L. Fraenkel, Aaron J. Tarter
  • Publication number: 20100037225
    Abstract: Workload requests are routed in response to server greenness conditions. A workload request is received for a remotely invocable computing service executing separately in different remotely and geographically dispersed host computing servers. Greenness conditions pertaining to production or conservation of energy based upon external factors for each of the different remotely and geographically dispersed host computing servers are determined. The workload request is routed to one of the different remotely and geographically dispersed host computing servers based upon the determined greenness conditions.
    Type: Application
    Filed: August 7, 2008
    Publication date: February 11, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, David L. Kaminsky, Edith H. Stern, Barry E. Willner
  • Patent number: 7660997
    Abstract: A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.
    Type: Grant
    Filed: March 11, 2008
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventor: Ronald P. Doyle
  • Patent number: 7558770
    Abstract: A method to anticipate and prevent application non-conformance is disclosed. The method includes making available a configuration management database (CMDB) having configuration information of a plurality of system resources and dependency information of a plurality of applications related to the plurality of system resources. The method also includes making available a plurality of rules to establish a plurality of operating conditions that are statistically probable to cause a non-conformance of each system resource of the plurality of system resources, and combining each rule with the CMDB to determine the dependency of each application upon each operating condition. The method proceeds with performing a response action in response to determining that any of the operating conditions are such to cause a statistically probable non-conformance of any of the plurality of applications.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: July 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David L. Kaminsky
  • Patent number: 7552235
    Abstract: The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing policy selector can be configured for communicative linkage to a server cluster having one or more servers and programmed to select a particular one of the request routing policies for use in routing content requests in the server cluster based upon the cache metrics. In this regard, the routing policy selector further can include a coupling to the routing policies and the data store of cache metrics.
    Type: Grant
    Filed: December 11, 2003
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Jeffery S. Chase, Ronald P. Doyle
  • Publication number: 20090113383
    Abstract: A method, system, and computer program product for implementing a customizable visual configuration (VC) template to retrieve and display a working set of system configuration objects. The computer-implementable method includes selecting a current system configuration object. Once a system configuration object is selected, a VC utility examines all available VC templates. The VC utility displays available VC templates whose starting configuration object matches the selected current system configuration object. In response to a selected VC template, the VC utility retrieves and displays system configuration objects defined by the selected VC template.
    Type: Application
    Filed: October 25, 2007
    Publication date: April 30, 2009
    Inventors: ROBERTO DELIMA, Ronald P. Doyle, Michael F. Gering, Yongcheng Li
  • Publication number: 20090100503
    Abstract: The present solution can authenticate a first host to access a memory space of a shared wireless peripheral communicatively linked to the first host via a bus and a device controller. Digital content displayed within a graphical user interface of the first host can be selected. Either a CUT or COPY clipboard operation can be detected that is conducted from the first host. The selected content can be copied to the memory space of the peripheral. The second host can be authenticated to access a memory space of the peripheral communicatively linked to the second host via a bus and a device controller. A PASTE clipboard operation conducted from the second host can be detected. The selected content obtained from the first host can be conveyed from the memory space of the shared wireless peripheral to a cursor specified location within a graphical user interface of the second host.
    Type: Application
    Filed: October 15, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: RONALD P. DOYLE
  • Publication number: 20090100192
    Abstract: A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system.
    Type: Application
    Filed: November 12, 2008
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, David Louis Kaminsky
  • Publication number: 20090099880
    Abstract: A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090100431
    Abstract: Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090100423
    Abstract: A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk.
    Type: Application
    Filed: October 16, 2007
    Publication date: April 16, 2009
    Inventors: Ronald P. Doyle, Stephen J. Schmidt, Qingbo Wang, Ruth E. Willenborg
  • Patent number: 7515717
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20090060187
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20090063849
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 7461166
    Abstract: A method for routing service requests to service instances in a service providing infrastructure is disclosed. A service request is received. Computing resource vectots for at least two service hosts are computed, and each of the service hosts have a corresponding service providing infrastructure. A resource model for the service request is retrieved. The retrieved resource model are matched to each of the resource vectors to identify a best-fit resource vector. The service request is routed to a selected service host associated with the identified best-fit resource vector. Processing of received service requests is monitored. Individual resource components in the service hosts which are consumed during the processing are identified. Resource models for the service requests are produced based upon the identified individual resource components in the service hosts. A time series model is computed for each of the service requests based upon the identified individual resource components.
    Type: Grant
    Filed: February 21, 2003
    Date of Patent: December 2, 2008
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David Louis Kaminsky
  • Publication number: 20080235173
    Abstract: A method for the autonomic management of autonomic systems can include monitoring a managed system and recommending a course of action to be performed in the managed system. It can be determined whether the recommended course of action has been performed by an administrator. Responsive to the determination, it further can be determined whether an outcome from the course of action comports with a predicted outcome. If so, a point count can be changed responsive to a further determination that the outcome from the course of action comports with the predicted outcome. Conversely, the point count can be oppositely changed responsive to a further determination that the outcome from the course of action does not comports with the predicted outcome. In any case, when the point count crosses a threshold value, the management of the managed system can be transitioned to an adaptive component.
    Type: Application
    Filed: April 24, 2008
    Publication date: September 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, David L. Kaminsky, David M. Ogle, Richard Dean Telford
  • Publication number: 20080212848
    Abstract: A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.
    Type: Application
    Filed: March 11, 2008
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Ronald P. Doyle