Search Patents
-
Patent number: 8990410Abstract: Certain exemplary embodiments can provide a method, which can comprise, responsive to a determination that a Web-based transaction has caused an exceedance of a maximum threshold percentage of transactions processed offline, at a user interface of an information device, rendering an automatic alert indicative of the exceedance. The Web-based transaction can be requested from a browser.Type: GrantFiled: December 11, 2008Date of Patent: March 24, 2015Assignee: IBM International Group BVInventor: Suresh Damodaran
-
Publication number: 20020073197Abstract: A method of customizing performance of a browser for a given network connection of a user, comprising upon launching of the browser, issuing a request to a benchmarking server and returning given data from the benchmarking server to the browser. The given data is used to calculate connection speed data that is passed in a client request to a web server. This connection speed data is then referenced by either the client side or server side to formulate web pages “best” suited for the the connection speed in question.Type: ApplicationFiled: December 11, 2000Publication date: June 13, 2002Applicant: IBM CorporationInventors: Kulvir S. Bhogal, Baljeet S. Baweja, Nizamudeen Ishmael, Mandeep Sidhu
-
Publication number: 20020174362Abstract: A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. A system management framework monitors multiple sources of network packets within the distributed data processing system. After identifying a source of network packets that generates network packets that surpass a predetermined threshold limitation on small packet size, a system administrator is alerted to the identified source of network packets. At the discretion of the system administrator, execution of the identified source can be paused, stopped, or restarted.Type: ApplicationFiled: March 29, 2001Publication date: November 21, 2002Applicant: IBM CorporationInventors: Lorin Evan Ullmann, Ching-Jye Chang
-
Patent number: 7181462Abstract: Data on place objects in a distributed environment are generated in a system including a plurality of server objects instantiated in the environment in the same address domain, which share a same user directory and authentication system, are on a same user network, and are administered by a single administration team. A service catalog is provided for cataloging a plurality of place objects as nodes on a tree, place objects including the plurality of servers objects within the distributed environment. A document file is provided for encapsulating cataloged relationships of server objects in the distributed environment and for storing object attributes generated by traversing the tree.Type: GrantFiled: June 4, 2003Date of Patent: February 20, 2007Assignee: International Business Machines CorporationInventors: Sami M. Shalabi, Mustansir Banatwala, Joseph A. Russo, Miguel A. Estrada
-
Patent number: 7194480Abstract: Methods on objects in a distributed environment are accessed and invoked on a system including a plurality of server objects instantiated in the environment in the same address domain, which share a same user directory and authentication system, are on a same user network, and are administered by a single administration team. A service catalog is provided for cataloging a plurality of objects as nodes on a tree, objects including the plurality of servers objects within the distributed environment. A document file is provided for encapsulating cataloged relationships of server objects in the distributed environment and for storing object attributes generated by traversing the tree.Type: GrantFiled: June 4, 2003Date of Patent: March 20, 2007Assignee: International Business Machines CorporationInventors: Sami M. Shalabi, Antonio Estrada, Mustansir Banatwala, Joseph A. Russo
-
Patent number: 8880893Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: GrantFiled: September 24, 2004Date of Patent: November 4, 2014Assignee: IBM International Group B.V.Inventors: Pratyush Moghe, Narain Gehani, Peter T. Smith
-
Publication number: 20030074444Abstract: A data processing system, method, and computer program product are disclosed for reporting a loss of a service application to a particular system administrator. The data processing system includes a logically partitioned computer system and a hardware management console. The hardware management console is a stand-alone system separate from the computer system. A service application is executable by the hardware management console for managing service of and placing service calls for the logically partitioned computer system. The logically partitioned computer system includes a service partition. A service processor included in the logically partitioned computer system monitors a presence of the service application, and reports the absence of the service application to the service partition. In response to an absence of the service application, the service partition reports the absence of the service application to a system administrator of the service partition.Type: ApplicationFiled: October 16, 2001Publication date: April 17, 2003Applicant: IBM CorporationInventors: George Henry Ahrens, Chetan Mehta
-
Publication number: 20110295995Abstract: A method and system for controlling load admission rate of an application server is provided. In the method, actual heap utilization and load admission rate of the application server in current control cycle are detected; based on the detected actual heap utilization and load admission rate, load characteristics variation parameters of the application server are estimated; and control gain of a feedback controller is calculated based on the load characteristics variation parameters; the feedback controller calculates desired load admission rate of the application server in next control cycle by using the calculated control gain. The load admission rate of the application server can be adaptively controlled by tracking changes in workload characteristics of the application server, such that the actual heap utilization of the application server is maintained at or close to target heap utilization.Type: ApplicationFiled: May 25, 2010Publication date: December 1, 2011Applicant: IBM CORPORATIONInventors: Yixin Diao, Xiao Lei Hu, Michael Joseph Spreitzer, Asser Nasreldin Tantawi, Rui Xiong Tian, Hai Shan Wu
-
Publication number: 20080183857Abstract: A client information handling system (IHS) connects to a network in a manner that provides transparent network connectivity. In one embodiment, the client IHS includes a polling application that monitors the network connection to determine if the client IHS exhibits a connected status or a disconnected status. An interceptor application in the client IHS permits transmission of a request for a network task from the client IHS if the client IHS currently exhibits a connected status. However, the interceptor application intercepts and stores a request for a network task if the client IHS currently exhibits a disconnected status. At a later time when the client IHS again exhibits a connected status, the interceptor application transmits the stored request over the network. In this manner, the user of the client IHS experiences transparent network connectivity and need not worry with respect to the network connection status of the client IHS at any particular point in time.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: IBM CorporationInventors: Janel Guillory Barfield, Nancy N. Li
-
Patent number: 6941325Abstract: A multimedia archive description scheme is provided for characterizing a multimedia archive having records and associated record descriptions. The multimedia archive description scheme provides a data structure which relates records by similarity measures. The principle data structure in the multimedia archive description scheme is a cluster. A cluster includes one or more attributes of the records in the archive and can include one or more cluster relationships. Cluster attributes can include feature space attributes, semantic attributes, media attributes and meta attributes of the records in the archive. The cluster relationships can relate records to clusters or clusters to clusters. Cluster relationships can include feature space (syntactic) relationships, semantic relationships, media relationships and meta relationships. The multimedia archive description scheme provides an efficient form for describing a collection of records.Type: GrantFiled: February 1, 2000Date of Patent: September 6, 2005Assignees: The Trustees of Columbia University, IBM Thomas J. Watson Search CenterInventors: Ana B. Benitez, Alejandro Jaimes, Paek Seungyup, Shih-Fu Chang, Chung-Sheng Li, John R. Smith
-
Publication number: 20030105815Abstract: An apparatus and method for monitoring instant messaging user accounts are provided. The apparatus and method provide a mechanism by which transcripts of instant messages may be generated and analyzed to determine if inappropriate contact with unapproved users is occurring. A user is registered with an instant messaging service provider such that an indication as to whether or not transcripts of the user's instant messages should be stored. In addition, a listing of destination user identifications that are approved, and thus do not require transcripts, may be provided to the instant messaging service provider. Thereafter, when an instant message is received, a look-up of the source user identification of the instant message, and optionally, the destination user identification, may be used to determine if transcripts are to be stored. The transcript may be reported to an authorized recipient of the transcript.Type: ApplicationFiled: December 5, 2001Publication date: June 5, 2003Applicant: IBM CorporationInventors: Carl Phillip Gusler, Rick Allen Hamilton, Harry Schatz