Patents by Inventor Susann Keohane

Susann Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050132133
    Abstract: A method is presented for using a hard disk drive which contains a non-volatile random access memory (NVRAM) and a computer-usable disk medium. A usage value is maintained for the number of accesses to the computer-usable disk medium, and the usage value is stored within the NVRAM. In a system that is connected to multiple hard disk drives, the usage values for the hard disk drives can be compared to determine a youngest disk drive or a lowest amount of usage amongst the multiple hard disk drives. When data needs to be mirrored or backed-up to one of the hard disk drives, it can be copied to the youngest or least-used hard disk drive. If an operating system installation needs to be performed, the operating system files can be stored on the youngest or least-used hard disk drive.
    Type: Application
    Filed: December 10, 2003
    Publication date: June 16, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050091318
    Abstract: A method, system, and program for enabling a sender to control future recipients of an email are provided. An email is received with at least one pre-selected future recipient at a computer system accessible to a primary recipient of the email. The pre-selected future recipient is distinguishable from a sender of an email. The received email is displayed. Then, responsive to the primary recipient electing to respond to the email, a response email is automatically addressed to the at least one pre-selected future recipient, such that a sender of the email controls future recipients of the email by pre-selecting the at least one future recipient. Future recipients may be selected by the sender for each email or automatically selected from a database of addresses each with a pre-selected future recipient based on the primary recipient of the email.
    Type: Application
    Filed: October 9, 2003
    Publication date: April 28, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050091401
    Abstract: A method, system, and program for selective mirrored site access from a communication are provided. When composing a communication, multiple mirrored site addresses are embedded with a target site address. The sender may request to enter the mirrored site addresses or a browser supplies the mirrored site addresses. At each client system receiving the communication, selections of site addresses accessible for each intended recipient are detected. Thus, each client system, when outputting the communication, displays the selection of mirrored site address accessible to the intended recipient accessing that client system.
    Type: Application
    Filed: October 9, 2003
    Publication date: April 28, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050091355
    Abstract: Providing a necessary level of security for a computer capable of connecting to different computing environments, including monitoring (402) a type of connection between the computer and a network in a current computing environment; determining (406) a security level of data (408) before sending the data across the network; storing (416) the data in a buffer instead of sending the data across the network if the connection to the network lacks a security control (410) required for the determined security level of the data; and sending (420) the data from the buffer when the computer is connected to a changed computing environment having a new type of connection that has (412) the security control required for the data.
    Type: Application
    Filed: October 2, 2003
    Publication date: April 28, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Shawn Mullen, Johnny Shieh, Gerald McBrearty, Jessica Murillo
  • Publication number: 20050086249
    Abstract: A logical volume is converted from a first format on a first physical volume to a second format on a second physical volume while the logical volume remains available to applications and users. The online conversion is made possible by allowing a temporary mirroring of the existing physical volume(s) with the new physical volumes, using different characteristics on the two physical volumes.
    Type: Application
    Filed: October 16, 2003
    Publication date: April 21, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050083749
    Abstract: A method and system for providing storage area network SAN level boot/installation services for appliances on a SAN. A generic maintenance “bootlv” is mirrored on at least one disk (or set of disks) that are located out on the SAN. The disk(s) are encoded with similar boot functions as a conventional boot CD. The disk(s) provides physical storage for a volume group that has the base install images and all of the optional Programming Product (OPP) images selected by the system administrator to be included in the install volume group. In one embodiment, a volume group made up of several disks is able to boot up and run from any one of the several disks since the bootlv is mirrored/copied on each of the disks.
    Type: Application
    Filed: October 16, 2003
    Publication date: April 21, 2005
    Applicant: International Business Machines Corp.
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050080991
    Abstract: A method and apparatus for providing hardware aware logical volume mirrors are provided. In particular, the an improved logical volume system and method are provided in which a mirroring device driver is provided that selects a physical storage device from which data is to be read based on information obtained regarding the physical devices used in the mirror of the data. The mirroring device driver may be part of a logical volume device driver (LVDD), such that a modified LVDD is provided, or may work in concert with the logical volume device driver to achieve the purposes of the present invention. The information regarding the physical devices used in the mirror may include characteristic data of physical storage devices (e.g., whether a write cache is used, whether a read-ahead cache is used, RPM speed, connector type, etc.) and may also include operational history data.
    Type: Application
    Filed: October 9, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050081005
    Abstract: A system and method of servicing a plurality of read requests using a common mirror are provided. When a plurality of requests is received, it is determined whether the amount of data requested by the read requests is within a user-configurable threshold. The read requests are chained together if the amount of data requested by the read requests is within the user-configurable threshold. After being chained together, the read requests may be sent to the common mirror for servicing. The common mirror, in this case, is a least used mirror in a set of mirrors. To reduce seek and/or rotational time of the common mirror, it may be ascertained that the data being requested by the read requests is within a user-configurable range before chaining the read requests together. In some cases, it may be ascertained that the plurality of read requests is to be grouped together before the read requests are chained together.
    Type: Application
    Filed: October 9, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050076105
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Application
    Filed: September 18, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050066009
    Abstract: An apparatus, system and method of rescinding previously transmitted e-mail messages are provided. After a sender composes an e-mail message, the message may be stored on a computing system when it is sent to the recipients. As customary, the e-mail message may contain a list of recipients to whom it is to be sent. A notification message is then generated and sent to the recipients (and to the sender) instead of the actual e-mail message. The notification message allows the recipients to automatically access the stored e-mail message. When and if the sender decides to rescind the message, the user may access the message and modify the list of recipients to exclude any number of recipients as well as to modify the text of the e-mail message. Any recipient whose e-mail address has been excluded will not be allowed to access the e-mail message.
    Type: Application
    Filed: September 18, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050060354
    Abstract: A system and method of facilitating an icon selection among a plurality of icons on a desktop are provided. When a user desires to select an icon among a plurality of icons on a desktop, the user may assert an option that will prompt the user to enter a file extension. The file extension to be entered is preferably the file extension of the file that is represented by the icon to be selected. After entering or selecting the file extension, the file extensions of all the files that are represented by icons on the desktop are compared against the entered extension. All the icons that represent files with the same file extension as the one entered are grouped together and moved toward a pointing device. Once there, the user may easily select the proper icon.
    Type: Application
    Filed: September 11, 2003
    Publication date: March 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050060384
    Abstract: A system, method and program to link a user activating a hyperlink in a Web page to alternate Web documents or sites appropriate to the needs of the users and the owners or hosts of the Web sites. An implementation for linking at least one of the hyperlinks in a Web document when activated to access a selectable one of a plurality of alternate Web documents respectively at alternate sites, then for predetermining one of the plurality of alternate Web documents selected to be accessed upon said activation of the hyperlink and then responsive to this determination for accessing the alternate Web document selected to be accessed.
    Type: Application
    Filed: September 11, 2003
    Publication date: March 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050054341
    Abstract: A method, apparatus, and computer instructions for providing updated time at a mobile data processing system. An area code is determined from a call made to a server from the mobile data processing system. A time zone is determined using the area code to form an identified time zone; and an adjusted time based on the identified time zone is sent to the mobile data processing system.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050055413
    Abstract: A method, apparatus, and computer instructions for sending a notice that a user is away. An away indication is received to enable automatic away notifications for a period of time. Email addresses of recipients to which email messages have been previously sent within a configurable time period are identified to form a set of determined email addresses. A reply is sent with a notification that the user is away only in response to receiving an email message having a same email address within a set of determined email addresses.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050038862
    Abstract: A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
    Type: Application
    Filed: August 14, 2003
    Publication date: February 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050015450
    Abstract: A mechanism to alert to a user that an address of an e-mail message may be undeliverable is provided. If a “bounced” mail notification is received, an indicator is associated with the address to which the notification pertains. When accessed by the user, in response to the indicator being set, the address is displayed in conjunction with one or more perceptive cues, such as highlighted color etc. If an indication that the delivery problems with respect to the address are resolved, such as receipt of an e-mail from the addressee or a successful delivery notification, the indicator is cleared whereby the alert is terminated.
    Type: Application
    Filed: July 17, 2003
    Publication date: January 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050005007
    Abstract: The tracking of usage of pre-accessed Web documents that are browsed off-line. The combination of apparatus for storing previously accessed network documents, e.g. Web pages, at a receiving display station; and at said receiving display station for tracking data on the extent of usage of these previously accessed documents. The previously accessed and stored Web pages may be hypertext documents that have a plurality of hyperlinks to other previously accessed and stored Web pages, and the tracking of data tracks the number of times that each of said hyperlinks is used to access the stored Web document linked to said hyperlink. In addition, there may be an implementation for transmitting the means for tracking the extent of usage of the previously accessed Web document to said receiving display station along with said previously accessed Web document.
    Type: Application
    Filed: July 1, 2003
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050005175
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Application
    Filed: July 1, 2003
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20040243796
    Abstract: A mechanism is provided for configuring a set of devices for a given machine attached to a storage area network. The initial program load firmware and network adapter firmware for each machine on the storage area network are modified to query a storage area network appliance for lists of devices. The storage area network appliance may be identified by a world wide name and may store lists of boot devices, root volume group devices, primary devices, and secondary devices for each machine on the storage area network. The storage area network appliance then listens for queries and returns the appropriate list of devices based on query type and/or boot type. The boot type for a machine may be set to normal boot, maintenance boot, or install boot.
    Type: Application
    Filed: May 29, 2003
    Publication date: December 2, 2004
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Kelley Murillo, Johnny M. Shieh