Search Patents
-
Publication number: 20030131088Abstract: Computer program product and systems using the method are also provided.Type: ApplicationFiled: January 10, 2002Publication date: July 10, 2003Applicant: IBM CorporationInventors: Christopher M. Morrissey, Xiaoping Chen
-
Patent number: 8990410Abstract: Certain exemplary embodiments can provide a method, which can comprise, responsive to a determination that a Web-based transaction has caused an exceedance of a maximum threshold percentage of transactions processed offline, at a user interface of an information device, rendering an automatic alert indicative of the exceedance. The Web-based transaction can be requested from a browser.Type: GrantFiled: December 11, 2008Date of Patent: March 24, 2015Assignee: IBM International Group BVInventor: Suresh Damodaran
-
Publication number: 20080147833Abstract: A system and method of managing networks and, more particularly, to a system and method for interfacing with virtual networking devices using SNMP (Simple Network Management Protocol). A system comprises a configuration statement configured to provide an identity to a virtual device. An SNMP subagent is configured to interface between an SNMP agent and a control program of the virtual device. The SNMP subagent acquires information extracted by the control program for the identified virtual device and provides the acquired information to the SNMP agent to be returned to the SNMP client.Type: ApplicationFiled: December 13, 2006Publication date: June 19, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION ("IBM")Inventors: Tracy Jo ADAMS, Mary Ellen CAROLLO, Susan Marie FARRELL, Joseph Michael HUST, Angelo MACCHIANO, Dennis Ray MUSSELWHITE
-
Publication number: 20020078129Abstract: A method, system, and computer program product for managing result information in a multi-node networked data processing system is provided. In one embodiment, first results of execution from a task executed on a second node in the networked data processing system are received at a first node. The results comprise an array of result messages, wherein each result message contains a unique message identifier and associated message text content. The result messages is modified, if necessary, to create second results, wherein the second results comprise an array of result message. The second results are sent to a requesting client node.Type: ApplicationFiled: December 15, 2000Publication date: June 20, 2002Applicant: IBM CorporationInventors: Steven Michael French, Joseph Herbert McIntyre
-
Patent number: 8880893Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: GrantFiled: September 24, 2004Date of Patent: November 4, 2014Assignee: IBM International Group B.V.Inventors: Pratyush Moghe, Narain Gehani, Peter T. Smith
-
Publication number: 20120179798Abstract: In a data processing system having a plurality of virtual input/output servers (VIOSes) configured within a VIOS cluster, a method, data processing system and computer program product provide for autonomous election of a primary node within a virtual input/output server (VIOS) cluster. A first VIOS performs the functions of: detecting that a primary node is required for the VIOS cluster; and autonomously initiating an election process to elect a next primary node from among the VIOSes within the VIOS cluster. When the first VIOS meets the pre-established requirements for becoming a primary node, the first VIOS obtains a lock on a primary node ID field within a VIOS database (DB) and then initiates a primary node commit process to assign the first VIOS as the primary node. The first VIOS issues a notification to the VIOS cluster to notify the other VIOSes that a primary node has been elected.Type: ApplicationFiled: January 11, 2011Publication date: July 12, 2012Applicant: IBM CorporationInventors: James A. Pafumi, Jacob Jason Rosales, Morgan Jeffrey Rosas, Vasu Vallabhaneni
-
Patent number: 7231501Abstract: A data initiator device designates an initial data tag set for tagging data transfers to thereby attach data tags from the designated set to commands directed to data transfers between the data initiator device and a data target device subsequent to the designation of the initial data tag set. The data transfer commands are issued with the attached data tags from the designated data tag set until an occurrence of a reset error associated with one of the issued data transfer commands. In response to the reset error, the data initiator device designates a different data tag set for tagging data transfers to thereby attach data tags from the newly designated data tag set to commands directed to data transfers between the data initiator device and the data target device subsequent to the designation of the new data tag set.Type: GrantFiled: March 30, 2004Date of Patent: June 12, 2007Assignee: IBM CorporationInventors: Michael J. Azevedo, Carol Spanel, Andrew D. Walls
-
Publication number: 20020112039Abstract: A method, system, apparatus, and computer program product are presented for management of a distributed data processing system. Resources within the distributed data processing system are dynamically discovered, and the discovered resources are adaptively monitored using the network management framework. A network or system administrator configures some mission critical endpoints with multiple network interface cards (NICs) and specifies mission critical endpoints, non-mission critical actions, etc. During status collection activities associated with network or system management activities, the categorization of an endpoint as a mission-critical or non-mission critical endpoint affects the manner in which the status collection activity is performed.Type: ApplicationFiled: December 15, 2000Publication date: August 15, 2002Applicant: IBM CorporationInventor: Lorin Evan Ullman
-
Publication number: 20030005104Abstract: Embodiments of the present invention separates raw server configuration data (data describing how the server is to operate—e.g., network port number, security settings, software drivers, etc.) from server instance data (data which describes where to run a server and how to process user code—e.g., which directories to access, where the user code is located, etc.). Embodiments of the present invention may have raw server configuration data and server instance data stored as, for example, text files. A file embodying raw server configuration data may be copied and reused on multiple computer systems. Similarly, a file embodying server instance data may also be copied and reused on multiple computer systems. Embodiments of the present invention process the raw server configuration data file and the server instance file to generate an overall server configuration file which configures a server to operate in the desired manner so that user code can be successfully deployed on the configured server.Type: ApplicationFiled: May 30, 2002Publication date: January 2, 2003Applicant: IBMInventors: Timothy G. Deboer, Timothy M. Francis, Sheldon B. Wosnick, Siu Chung Yuen