Patents by Inventor Scott J. Broussard
Scott J. Broussard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10826881Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request (i) requests processing of data away from a geo-location-aware client device and (ii) includes an instruction that instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data responsive to the instruction in the location-reporting request. In response to determining that the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: GrantFiled: November 14, 2018Date of Patent: November 3, 2020Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20190081935Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request (i) requests processing of data away from a geo-location-aware client device and (ii) includes an instruction that instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data responsive to the instruction in the location-reporting request. In response to determining that the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: ApplicationFiled: November 14, 2018Publication date: March 14, 2019Inventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Patent number: 10158615Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request (i) requests processing of data away from a geo-location-aware client device and (ii) includes an instruction that instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data responsive to the instruction in the location-reporting request. In response to determining that the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: GrantFiled: March 31, 2017Date of Patent: December 18, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Patent number: 10009249Abstract: Resources used by a plurality of applications that are located in system memory can be managed by monitoring usage statistics for the plurality of applications running on a hardware platform. Usage statistics for a particular application that are outside of a usage threshold profile can result in the creation of an on-demand profile that specifies a set of resources used by the particular application and a set of destination inputs mapped to the particular application. The destination inputs can be mapped to a management module. At least some of the resources of the set of resources used by the particular application can be released. Using the management module, an access to an input of the set of destination inputs can be detected. In response, resources of the set of resources can be allocated to the particular application.Type: GrantFiled: October 22, 2015Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Patent number: 10009248Abstract: Resources used by a plurality of applications that are located in system memory can be managed by monitoring usage statistics for the plurality of applications running on a hardware platform. Usage statistics for a particular application that are outside of a usage threshold profile can result in the creation of an on-demand profile that specifies a set of resources used by the particular application and a set of destination inputs mapped to the particular application. The destination inputs can be mapped to a management module. At least some of the resources of the set of resources used by the particular application can be released. Using the management module, an access to an input of the set of destination inputs can be detected. In response, resources of the set of resources can be allocated to the particular application.Type: GrantFiled: December 12, 2014Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20180024909Abstract: Computer implemented methods for monitoring growth of memory buffers in logging and dynamically adapting quantity and detail of logging. In one method, a computer determines whether an operation of a thread has a failure and whether the failure is severe and logs details from a pre-thread logging buffer. In another method, a computer calculates an increase in a log buffer size, reads from a configuration file a maximum allowed increase in the log buffer size, and returns logging details, in response to determining that the increase is more than the maximum allowed increase. In yet another method, a computer writes a log of a use case to a disk, calculates an actual size of the log in the database, and returns logging details, in response to determining that the actual size is more than the allowed size.Type: ApplicationFiled: July 25, 2016Publication date: January 25, 2018Inventors: Scott J. Broussard, Thangadurai Muthusamy, Amartey S. Pearson, Rejy V. Sasidharan
-
Patent number: 9716666Abstract: A computer-implemented method may include running the process on a first processing node. The process running on the first processing node initially operates on first data. The method may include monitoring the process to identify a first data node that provides the first data to the process. In addition, the method may include determining whether performance would likely be improved by transferring the process to a second processing node. The method may include transferring the process to the second processing node. Further, the method may include transferring a result of the process operating on the first data from the second processing node to the first processing node.Type: GrantFiled: November 27, 2013Date of Patent: July 25, 2017Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20170208048Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request (i) requests processing of data away from a geo-location-aware client device and (ii) includes an instruction that instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data responsive to the instruction in the location-reporting request. In response to determining that the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: ApplicationFiled: March 31, 2017Publication date: July 20, 2017Inventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Patent number: 9641630Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request requests processing of data away from a geo-location-aware client device and instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data. A determination is made as to whether the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device. In response to determining that the asserted geographic location of the available remote server satisfies the location-based data processing restrictions, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: GrantFiled: December 15, 2014Date of Patent: May 2, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20160173402Abstract: Resources used by a plurality of applications that are located in system memory can be managed by monitoring usage statistics for the plurality of applications running on a hardware platform. Usage statistics for a particular application that are outside of a usage threshold profile can result in the creation of an on-demand profile that specifies a set of resources used by the particular application and a set of destination inputs mapped to the particular application. The destination inputs can be mapped to a management module. At least some of the resources of the set of resources used by the particular application can be released. Using the management module, an access to an input of the set of destination inputs can be detected. In response, resources of the set of resources can be allocated to the particular application.Type: ApplicationFiled: December 12, 2014Publication date: June 16, 2016Inventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20160173641Abstract: Resources used by a plurality of applications that are located in system memory can be managed by monitoring usage statistics for the plurality of applications running on a hardware platform. Usage statistics for a particular application that are outside of a usage threshold profile can result in the creation of an on-demand profile that specifies a set of resources used by the particular application and a set of destination inputs mapped to the particular application. The destination inputs can be mapped to a management module. At least some of the resources of the set of resources used by the particular application can be released. Using the management module, an access to an input of the set of destination inputs can be detected. In response, resources of the set of resources can be allocated to the particular application.Type: ApplicationFiled: October 22, 2015Publication date: June 16, 2016Inventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20160173623Abstract: A location-reporting request is sent by a processor to at least one remote server. The location-reporting request requests processing of data away from a geo-location-aware client device and instructs any available server to respond with a reported geographic location. An asserted geographic location is received from a remote server available to process the data. A determination is made as to whether the asserted geographic location of the available remote server satisfies location-based data processing restrictions that regulate remote processing of the data away from the geo-location-aware client device. In response to determining that the asserted geographic location of the available remote server satisfies the location-based data processing restrictions, the asserted geographic location is verified using a geo-location assertion server. In response to a successful verification of the asserted geographic location of the available remote server, the data is sent to the available remote server to process.Type: ApplicationFiled: December 15, 2014Publication date: June 16, 2016Inventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Patent number: 9262727Abstract: A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.Type: GrantFiled: May 30, 2008Date of Patent: February 16, 2016Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Tony C. Kwong, Jr., Eduardo N. Spring, Anthony W. Wrobel, Jr.
-
Patent number: 9122691Abstract: A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep).Type: GrantFiled: May 13, 2010Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Steven D. Clay, Eduardo N. Spring, Shunguo Yan
-
Patent number: 9116911Abstract: Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.Type: GrantFiled: November 2, 2010Date of Patent: August 25, 2015Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Eduardo N. Spring, Shunguo Yan
-
Publication number: 20150149615Abstract: A computer-implemented method may include running the process on a first processing node. The process running on the first processing node initially operates on first data. The method may include monitoring the process to identify a first data node that provides the first data to the process. In addition, the method may include determining whether performance would likely be improved by transferring the process to a second processing node. The method may include transferring the process to the second processing node. Further, the method may include transferring a result of the process operating on the first data from the second processing node to the first processing node.Type: ApplicationFiled: November 27, 2013Publication date: May 28, 2015Applicant: International Business Machines CorporationInventors: Scott J. Broussard, Jacob D. Eisinger, Ritu Mehta, Karthikeyan Ramamoorthy
-
Publication number: 20140372970Abstract: A method, computer program product, and system for auto generating a Java application programming interface (JAX-RS) for representational state transfer (REST) web services. A reference interface for a REST service object is received by a server computer system. A set of determiners defines a plurality of configuration values for a REST service object to generate a service binding. A plurality of resource methods for each resource class in the reference interface is determined, and for each resource method, a parameter, a return type, and an exception are determined. Each resource method of each class is sequentially processed and the name of each resource is written into a string buffer. The operation type for each resource method for each resource class is determined based on at least one predefined match and an operation name is written into the string buffer for each resource method. A return type is determined for each resource method for each resource class.Type: ApplicationFiled: June 13, 2013Publication date: December 18, 2014Inventors: Scott J. Broussard, Swagat Chakravarty, Amartey S. Pearson
-
Patent number: 8392906Abstract: A computer implemented method, a tangible storage medium, and a data processing system build a runtime environment of a system. A profile manager receives a service request containing a profile identifier. The profile identifier specifies a required version of at least one software component. The profile manager identifies a complete installation of the software component, and at least one delta file. The profile manager dynamically constructs a classpath for the required version by preferentially utilizing files from the at least one delta file followed by files from the complete installation. The runtime environment is then built utilizing the classpath.Type: GrantFiled: April 10, 2012Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Pralhad D. Galagali, Dhandapani Shanmugam
-
Patent number: 8375382Abstract: A computer implemented method, a tangible storage medium, and a data processing system build a runtime environment of a system. A profile manager receives a service request containing a profile identifier. The profile identifier specifies a required version of at least one software component. The profile manager identifies a complete installation of the software component, and at least one delta file. The profile manager dynamically constructs a classpath for the required version by preferentially utilizing files from the at least one delta file followed by files from the complete installation. The runtime environment is then built utilizing the classpath.Type: GrantFiled: May 13, 2009Date of Patent: February 12, 2013Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Pralhad Dhruvaraj Galagali, Dhandapani Shanmugam
-
Publication number: 20120198433Abstract: A computer implemented method, a tangible storage medium, and a data processing system build a runtime environment of a system. A profile manager receives a service request containing a profile identifier. The profile identifier specifies a required version of at least one software component. The profile manager identifies a complete installation of the software component, and at least one delta file. The profile manager dynamically constructs a classpath for the required version by preferentially utilizing files from the at least one delta file followed by files from the complete installation. The runtime environment is then built utilizing the classpath.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Pralhad Dhruvaraj Galagali, Dhandapani Shanmugam