-
公开(公告)号:US12028276B2
公开(公告)日:2024-07-02
申请号:US17409889
申请日:2021-08-24
Applicant: International Business Machines Corporation
Inventor: Pasquale A. Catalano , Michael James Becht , Christopher J. Colonna , Stephen Robert Guendert
CPC classification number: H04L49/208 , H04L49/3045 , H04L49/90
Abstract: Aspects include includes receiving, at an input/output (I/O) processor, a transport control word (TCW) that includes an instruction to perform virtual port mirroring. The I/O processor identifies a first port to be mirrored and a virtual port to perform the mirroring. The virtual port is a first memory location in a memory. In response to outbound data being sent to the first port for transmission to a first target device and to the instruction specifying outbound port mirroring, the I/O processor stores a copy of the outbound data in the first memory location. In response to inbound data being received at the first port and to the instruction specifying inbound port mirroring, a copy of the inbound data is stored at the first memory location.
-
公开(公告)号:US11895159B2
公开(公告)日:2024-02-06
申请号:US17363070
申请日:2021-06-30
Applicant: International Business Machines Corporation
Inventor: Christopher J Colonna , Stephen Robert Guendert , Pasquale A. Catalano , Michael James Becht
IPC: H04L9/40 , H04L43/065 , G06Q10/10 , G06Q10/0635
CPC classification number: H04L63/205 , G06Q10/0635 , G06Q10/10 , H04L43/065
Abstract: An approach for improving endpoint security. The approach requests security capabilities from endpoints of communications. The approach can analyze the differences between the security capabilities of the endpoints. The approach can negotiate a security capability supported by the endpoints of the communication. The approach can determine if the negotiation succeeded. If the negotiation failed, then the approach can create a report describing capabilities of the endpoints and suggesting changes to improve the endpoint security. The approach can send the report to the appropriate interested personnel.
-
公开(公告)号:US11765075B1
公开(公告)日:2023-09-19
申请号:US17938766
申请日:2022-10-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Pasquale A. Catalano , Michael James Becht , Christopher J Colonna , Stephen Robert Guendert
IPC: H04L29/06 , H04L45/302 , H04L45/00 , G06Q10/00
CPC classification number: H04L45/302 , H04L45/566
Abstract: A packet of data is obtained at one device of a network. A path from the one device to a next device of the network is determined, as well as at least one toll value for the path from the one device to the next device. Based on the at least one toll value for the path from the one device to the next device, a routing toll is adjusted. The routing toll is stored in a frame used in routing the packet of data in the network.
-
公开(公告)号:US11709607B2
公开(公告)日:2023-07-25
申请号:US17475703
申请日:2021-09-15
Applicant: International Business Machines Corporation
Inventor: Luke Hopkins , Michael James Becht , Christopher J. Colonna , Stephen Robert Guendert , Pasquale A. Catalano
IPC: G06F3/06
CPC classification number: G06F3/064 , G06F3/0604 , G06F3/0613 , G06F3/0659 , G06F3/0679
Abstract: Aspects include obtaining data to be transformed. A selected transformation to be applied to the data is determined based on a storage block address list entry (SBALE) in a storage block address list (SBAL). The SBALE includes at least one field that is used in determining the selected transformation to be applied. The selected transformation is applied on the data to generate transformed data and the transformed data is placed in a location specified by the SBAL.
-
公开(公告)号:US20230007051A1
公开(公告)日:2023-01-05
申请号:US17363070
申请日:2021-06-30
Applicant: International Business Machines Corporation
Inventor: Christopher J Colonna , Stephen Robert Guendert , Pasquale A. Catalano , Michael James Becht
Abstract: An approach for improving endpoint security. The approach requests security capabilities from endpoints of communications. The approach can analyze the differences between the security capabilities of the endpoints. The approach can negotiate a security capability supported by the endpoints of the communication. The approach can determine if the negotiation succeeded. If the negotiation failed, then the approach can create a report describing capabilities of the endpoints and suggesting changes to improve the endpoint security. The approach can send the report to the appropriate interested personnel.
-
公开(公告)号:US20220174021A1
公开(公告)日:2022-06-02
申请号:US17108088
申请日:2020-12-01
Applicant: International Business Machines Corporation
Inventor: Pasquale A. Catalano , Chris Moretti , Stephen Robert Guendert , Christopher J. Colonna , Michael James Becht
IPC: H04L12/801 , H04L12/803 , H04L29/08
Abstract: Embodiments of the invention are directed to registering one or more endpoint devices to receive a notification and detecting a congestion event related to a storage area network. The storage area network includes the one or more endpoint devices. The notification is sent regarding the congestion event to the one or more endpoint devices that have been registered for the notification.
-
公开(公告)号:US11347512B1
公开(公告)日:2022-05-31
申请号:US17166297
申请日:2021-02-03
Applicant: International Business Machines Corporation
Inventor: Christine Soong , Michael James Becht , Raymond Wong , Mushfiq Us Saleheen
IPC: G06F9/38 , G06F13/38 , G06F12/0875 , G06F13/20
Abstract: Aspects of the invention include receiving a request for data. The request is received from a computing element implementing a first bus protocol, and the data is accessible via a reduced instruction set computer (RISC) system implementing a plurality of bus protocols. A type of the received request is determined. A bus protocol is selected from the plurality of bus protocols based at least in part on the type of the received request. The received request is translated into a format that is compatible with the selected bus protocol and transmitted to the RISC system. Data is received from the RISC system in response to transmitting the translated request.
-
公开(公告)号:US12189984B2
公开(公告)日:2025-01-07
申请号:US17476594
申请日:2021-09-16
Applicant: International Business Machines Corporation
Inventor: Stephen Robert Guendert , Michael James Becht , Pasquale A. Catalano , Christopher J Colonna
IPC: G06F3/06
Abstract: Embodiments include performing a host-initiated link reset in a storage area network (SAN). Aspects include identifying, by a host in communication with the SAN, each link in the SAN, wherein each link is defined by a pair of ports. Aspects also include obtaining, by the host, a buffer credit balance for each port in the SAN and obtaining, by the host, a buffer credit for each port in the SAN and causing a reset of a link associated with the port by transmitting a link reset record from the host to a control device of the link based on a determination that the buffer credit of a port in the SAN is below a threshold value.
-
公开(公告)号:US12135599B1
公开(公告)日:2024-11-05
申请号:US18326378
申请日:2023-05-31
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Christopher J Colonna , Pasquale A. Catalano , Michael James Becht , Stephen Robert Guendert
IPC: G06F1/32 , G06F1/3206 , G06F1/3234
Abstract: A plurality of channels coupling at least one computing device to one or more devices are ranked. The ranking of a channel of the plurality of channels is based on one or more criteria including a size of a path group used to couple the channel to a device of the one or more devices. Based on the ranking, a selected channel of the plurality of channels is selected for which utilization state of the selected channel is to be changed. The utilization state of the selected channel is changed, in runtime, to reduce overall power consumption by the plurality of channels.
-
公开(公告)号:US20230315921A1
公开(公告)日:2023-10-05
申请号:US17706747
申请日:2022-03-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Christopher J. Colonna , Pasquale A. Catalano , Michael James Becht , Stephen Robert Guendert
CPC classification number: G06F21/85 , G06F21/602 , G06F21/31 , H04L9/0825 , H04L9/0891
Abstract: An approach for extending encryption to input/output (I/O) on Peripheral Component Interconnect express (PCIe) links. The approach receives a proposal list of available encryption mechanisms. The approach selects an encryption mechanism from the proposal list, the encryption mechanism performs the encryption without encryption services from an associated Host Bus Adapter (HBA). The approach directs the I/O to the encryption mechanism.
-
-
-
-
-
-
-
-
-