Patents by Inventor William J. Rooney

William J. Rooney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230418961
    Abstract: Providing fine granularity read access to generational copies of safeguarded copy data. In some instances, a fine granularity read access to generational copies of safeguarded copy data includes the ability to use a generation ID to determine the exact generation copy that contains relevant enterprise related data that must be recovered and/or utilized. Additionally, the fine granularity read access is done in a manner that does not require a restore of the relevant enterprise related data to a recovery volume and that does not compromise other generation copies.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: William J. Rooney, Gregory Edward McBride, Dale F Riedy, Scott B. Compton, Theresa Mary Brown
  • Publication number: 20230418960
    Abstract: Ensuring that enterprise data that has potentially become corrupted is recoverable and usable by creating safeguarded copy volumes of the enterprise data. One important aspect of any corruption detection scheme is to determine when the data has become corrupted and locate the last known uncorrupted copy of the data as quickly as possible. Once this set of data is identified, the restoration process can begin with that data, and subsequent logged transactions can be reapplied if possible, which brings the data to the most recent and uncorrupted version.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Theresa Mary Brown, Dale F Riedy, William J. Rooney, Scott B. Compton, Gregory Edward McBride, John R. Paveza
  • Publication number: 20230305727
    Abstract: Provided is a method for migrating from a first storage system to a second storage system. The method includes receiving a command to migrate from a first storage system to a second storage system, wherein the first storage system comprises a first primary storage and a first secondary storage, and wherein the second storage system comprises a second primary storage and a second secondary storage. The method further includes initiating, in response to receiving the command, data replication between the first primary storage and the second primary storage. The method further includes initiating, in response to receiving the command, data replication between the first primary storage and the second secondary storage. The method further includes migrating from the first storage system to the second storage system.
    Type: Application
    Filed: March 22, 2022
    Publication date: September 28, 2023
    Inventors: David R. Blea, William J. Rooney
  • Patent number: 11475040
    Abstract: A computer-implemented method according to one approach includes identifying an inability to access a first storage volume during a first data replication session, creating a second data replication session including the first storage volume, and removing the first storage volume from the first data replication session.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: October 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Damian Trujillo, Anthony Ciaravella, Pamela Schull, Gregory E. McBride, William J. Rooney
  • Patent number: 11226746
    Abstract: Provided is a method for correcting untrusted data and avoiding logical device swapping for at least one logical subsystem of at least one computer system. A processor may monitor a primary storage for one or more errors that indicate untrusted data on the primary storage. An error indicating that a data set on the primary storage is an untrusted data set may be identified. In response to the error being identified, a corresponding uncompromised version of the data set may be read from a secondary storage. The corresponding uncompromised version of the data set may be written over the untrusted data set on the primary storage.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: January 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: William J. Rooney, Carol S. Mellgren, David R. Blea, Gregory E. McBride, Dale F. Riedy, Tabor R. Powelson
  • Patent number: 11099953
    Abstract: Provided is a method for correcting pinned data in a primary storage. A primary storage controller may detect a pinned data set on a primary storage. In response to detecting the pinned data set, the primary storage controller may instruct a secondary storage controller to transmit a copy of the pinned data set to the primary storage controller. The copy of the pinned data set may be stored in a secondary storage that is communicatively coupled to the secondary storage controller. The secondary storage may include a synchronous copy of the primary storage. The primary storage controller may receive the copy of the pinned data set from the secondary storage controller. The primary storage controller may also write the copy of the pinned data set over the pinned data set on the primary storage.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: August 24, 2021
    Assignee: International Business Machines Corporation
    Inventors: William J. Rooney, Tabor R. Powelson, David R. Blea, Gregory E. McBride, Dale F. Riedy, Carol S. Mellgren
  • Patent number: 11079966
    Abstract: A method, computer system, and a computer program product for soft fencing is provided. The present invention may include identifying a logical device swap occurred. The present invention may also include, in response to a logical device swap, creating a soft fence command. The present invention may then include issuing the created soft fence command.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Scott B. Compton, Tariq Hanif, Tri M. Hoang, Gregory E. McBride, Carol S. Mellgren, William J. Rooney
  • Patent number: 10977142
    Abstract: Provided are a computer program product, system, and method for after swapping from a first storage to a second storage, mirroring data from the second storage to the first storage for data in the first storage that experienced data errors. A swap operation redirects host Input/Output (I/O) requests to data from the first server to the second server in response to a health condition at the first server. A determination is made of data errors with respect to data in the first storage that experienced data errors. The second server is instructed to mirror data in the second storage to the first server including data for the data in the first storage that experienced the data errors to store in the first storage in response to determining that the first server is available for the data mirroring operations.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: April 13, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David R. Blea, Gregory E. McBride, Carol S. Mellgren, Tabor R. Powelson, William J. Rooney
  • Patent number: 10929326
    Abstract: A system and method of implementing a firm channel in a computer system are provided. The method including identifying at least one of a channel and a channel path ID (CHPID) as a first firm channel, automatically defining a logical path between a first device and a second device using the first firm channel, and storing the logical path in a configuration file of the computer system, wherein the logical path is accessible at system initialization.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: February 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Scott B. Compton, Dale F. Riedy, William J. Rooney
  • Patent number: 10915406
    Abstract: In one embodiment, I/O operations may be swapped from an original storage unit to a replacement storage unit in a manner which can reduce or eliminate delays caused by copying of data from the original storage unit to the replacement storage unit. A point-in-time snap copy relationship between the original storage unit and the replacement storage unit of storage locations is established and I/O operations are swapped from the original storage unit to the replacement storage unit. The I/O operations are resumed, accessing the replacement storage unit instead of the original storage unit in the input/output operations issued by the at least one host. Other aspects are described.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: February 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Amy N. Blea, David Randall Blea, Gregory E. McBride, William J. Rooney, John Jay Wolfgang
  • Patent number: 10846187
    Abstract: Provided are a computer program product, system, and method for managing health conditions to determine when to restart replication after a swap triggered by a storage health event. A determination is made of a health condition with respect to access to a first storage that triggers a swap operation. The swap operation redirects host Input/Output (I/O) requests to data from a first server to a second server in response to determining the health condition. After the swap operation the I/O requests are directed to the second server and a second storage. The second server is instructed to mirror data in the second storage to the first server to store in the first storage in response to determining that the health condition is resolved.
    Type: Grant
    Filed: June 15, 2018
    Date of Patent: November 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David R. Blea, Gregory E. McBride, Carol S. Mellgren, Tabor R. Powelson, William J. Rooney
  • Patent number: 10834077
    Abstract: A computer program product and a computer system for generating and deploying a secure boot image and encrypted client data to a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image and encrypted client data from a client to a trusted computer system. Embodiments of the present invention disclose booting a confidential image on a trusted computer system. Embodiments of the present invention also disclose a process of dumping a confidential image on the trusted computer system.
    Type: Grant
    Filed: November 8, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Publication number: 20200218731
    Abstract: A computer-implemented method according to one approach includes identifying an inability to access a first storage volume during a first data replication session, creating a second data replication session including the first storage volume, and removing the first storage volume from the first data replication session.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Damian Trujillo, Anthony Ciaravella, Pamela Schull, Gregory E. McBride, William J. Rooney
  • Patent number: 10684844
    Abstract: A methodology for creating and using information identifying what and how software and/or firmware modules are used in computer systems, called functional exploitation data. The functional exploitation data can be used to identify what modules should be updated and how updates should be implemented. The functional exploitation data can also be used to identify other computer systems as candidates for updates based on similarity to computer systems that have reported problems, and propose implementing similar updates on the candidates. Functional exploitation data can also be used to identify under-utilized modules for enhancements or greater advocacy. The functional exploitation data can be implemented in the form of a concatenated string.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Scott B. Compton, William J. Rooney, Dale F. Riedy, Barbara J. Bryant, David H. Surman
  • Publication number: 20200142790
    Abstract: Provided is a method for correcting pinned data in a primary storage. A primary storage controller may detect a pinned data set on a primary storage. In response to detecting the pinned data set, the primary storage controller may instruct a secondary storage controller to transmit a copy of the pinned data set to the primary storage controller. The copy of the pinned data set may be stored in a secondary storage that is communicatively coupled to the secondary storage controller. The secondary storage may include a synchronous copy of the primary storage. The primary storage controller may receive the copy of the pinned data set from the secondary storage controller. The primary storage controller may also write the copy of the pinned data set over the pinned data set on the primary storage.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 7, 2020
    Inventors: William J. Rooney, Tabor R. Powelson, David R. Blea, Gregory E. McBride, Dale F. Riedy, Carol S. Mellgren
  • Publication number: 20200142614
    Abstract: Provided is a method for correcting untrusted data and avoiding logical device swapping for at least one logical subsystem of at least one computer system. A processor may monitor a primary storage for one or more errors that indicate untrusted data on the primary storage. An error indicating that a data set on the primary storage is an untrusted data set may be identified. In response to the error being identified, a corresponding uncompromised version of the data set may be read from a secondary storage. The corresponding uncompromised version of the data set may be written over the untrusted data set on the primary storage.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 7, 2020
    Inventors: William J. Rooney, Carol S. Mellgren, David R. Blea, Gregory E. McBride, Dale F. Riedy, Tabor R. Powelson
  • Patent number: 10585767
    Abstract: Provided is a method for correcting pinned data in a primary storage. A primary storage controller may detect a pinned data set on a primary storage. In response to detecting the pinned data set, the primary storage controller may instruct a secondary storage controller to transmit a copy of the pinned data set to the primary storage controller. The copy of the pinned data set may be stored in a secondary storage that is communicatively coupled to the secondary storage controller. The secondary storage may include a synchronous copy of the primary storage. The primary storage controller may receive the copy of the pinned data set from the secondary storage controller. The primary storage controller may also write the copy of the pinned data set over the pinned data set on the primary storage.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: William J. Rooney, Tabor R. Powelson, David R. Blea, Gregory E. McBride, Dale F. Riedy, Carol S. Mellgren
  • Patent number: 10579285
    Abstract: Provided is a method for correcting untrusted data and avoiding logical device swapping for at least one logical subsystem of at least one computer system. A processor may monitor a primary storage for one or more errors that indicate untrusted data on the primary storage. An error indicating that a data set on the primary storage is an untrusted data set may be identified. In response to the error being identified, a corresponding uncompromised version of the data set may be read from a secondary storage. The corresponding uncompromised version of the data set may be written over the untrusted data set on the primary storage.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: William J. Rooney, Carol S. Mellgren, David R. Blea, Gregory E. McBride, Dale F. Riedy, Tabor R. Powelson
  • Publication number: 20190384535
    Abstract: A method, computer system, and a computer program product for soft fencing is provided. The present invention may include identifying a logical device swap occurred. The present invention may also include, in response to a logical device swap, creating a soft fence command. The present invention may then include issuing the created soft fence command.
    Type: Application
    Filed: September 3, 2019
    Publication date: December 19, 2019
    Inventors: Scott B. Compton, Tariq Hanif, Tri M. Hoang, Gregory E. McBride, Carol S. Mellgren, William J. Rooney
  • Patent number: 10437517
    Abstract: A method, computer system, and a computer program product for soft fencing is provided. The present invention may include identifying a logical device swap occurred. The present invention may also include, in response to a logical device swap, creating a soft fence command. The present invention may then include issuing the created soft fence command.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: October 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Scott B. Compton, Tariq Hanif, Tri M. Hoang, Gregory E. McBride, Carol S. Mellgren, William J. Rooney