Ibm
Ibm Fellow and Vice President Ibm Cloud Storage Architecture and Service Migrations
Lockheed Martin 1998 - 1999
Webmaster
Education:
Marquette University 1992 - 1996
Libertyville High School - Butler Lake
Skills:
Data Center Itil Enterprise Architecture Cloud Computing Storage It Strategy Solution Architecture High Availability Unix It Service Management Virtualization Integration Outsourcing Service Management Enterprise Software Storage Architecture Service Desk Architecture San Disaster Recovery Storage Management Aix Service Delivery Soa Ibm Aix Systems Management It Outsourcing Storage Area Networks Shell Scripting Architectures Service Oriented Architecture Websphere It Operations Hybrid Cloud Cloud Storage Storage Virtualization Cloud Computing Iaas Software Defined Storage Storage Area Network
Ann Corrao - Raleigh NC, US Gregg William Machovec - Cary NC, US Brian Marshall O'Connell - Cary NC, US Brian James Snitzer - Lancaster PA, US Keith Raymond Walker - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 12/54
US Classification:
370328, 370351, 370389, 370428
Abstract:
A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles.
Public Status Determination And Security Configuration Of A Browser
Ann Mead Corrao - Raleigh NC, US Brian Marshall O'Connell - Cary NC, US Brian James Snitzer - Lancaster PA, US Keith Raymond Walker - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709218, 709224, 709227, 709228
Abstract:
The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system.
Protecting Sensitive Information On A Publicly Accessed Data Processing System
Ann Mead Corrao - Raleigh NC, US Brian Marshall O'Connell - Cary NC, US Brian James Snitzer - Lancaster PA, US Keith Raymond Walker - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/04 G06F 17/30
US Classification:
726 2, 726 26
Abstract:
The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system.
Pre-Fetching Virtual Environment In A Virtual Universe Based On Previous Traversals
Rosa M. Bolger - Austin TX, US Ann Corrao - Raleigh NC, US Brian M. O'Connell - Cary NC, US Brian J. Snitzer - Lancaster PA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 12/02
US Classification:
711137, 711E12002, 715757, 345419
Abstract:
An approach is provided for pre-fetching of virtual content in a virtual universe based on previous traversals. In one embodiment, there is a pre-fetching tool, including a ranking component configured to rank each of a plurality of parcels of locations previously visited by an avatar according to predefined ranking criteria. The pre-fetching tool further includes a pre-fetching component configured to pre-fetch a virtual content of said parcels of locations based on the ranking.
System, Method And Program For Selectively Rebooting Computers And Other Components Of A Distributed Computer System
Ann M. Corrao - Raleigh NC, US Vidhi A. Desai - Bellevue WA, US Michael R. Ensley - Raleigh NC, US Todd D. Mytkowicz - Boulder CO, US Brian J. Snitzer - Lancaster PA, US Nam Tran - Chicago IL, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 9/00
US Classification:
713 2
Abstract:
Selectively rebooting components of a computer system. One or more tables which list respective costs to reboot the components and respective likelihoods that reboots of the respective components will correct respective problems with the computer system are generated. Each of the costs is based on a time to reboot or delays caused by the reboot of the respective component. In response to a subsequent problem with the computer system, an order to reboot components of the computer system is determined from the table based on the costs and likelihoods that the reboot will correct the problem, such that a component of the computer system characterized by a relatively low cost and high likelihood to correct the problem will be rebooted before another component characterized by a relatively high cost and low likelihood to correct the problem. The tables are updated through actual experience.
Automatic Optimization Of Display Layout For Mobile Devices
Ann Mead Corrao - Raleigh NC, US Brian Marshall O'Connell - Cary NC, US Brian James Snitzer - Lancaster PA, US Keith Raymond Walker - Austin TX, US
International Classification:
G06F 17/00 H04M 1/00
US Classification:
7071041, 4555501, 707E17009
Abstract:
A computer implemented method, a computer program product, and a mobile device are disclosed for presenting a list of invokable actions to a user of the mobile device. Responsive to identifying the commencing of the invokable action, specific attributes of the invokable action are identified and stored in a corresponding data structure. From the specific attributes stored within the corresponding data structure, a most probable invokable action is identified. When the commencing of a subsequent invokable action is identified, the most probable invokable action is presented to the user.
Prioritized Rendering Of Objects In A Virtual Universe
Rosa M. Bolger - Austin TX, US Ann Corrao - Raleigh NC, US Brian M. O'Connell - Cary NC, US Brian J. Snitzer - Lancaster PA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06T 17/00 G06F 3/048
US Classification:
345420, 345419, 715706
Abstract:
An invention for prioritized rendering of objects in a virtual universe is provided. In one embodiment, there is a prioritization tool including a value component configured to assign a value to each of a set of items within an inventory of an avatar. A priority component is configured to compare a set of objects in the virtual universe to the value assigned to each of the set of items within the inventory of the avatar to determine a priority of each of the set of objects in the virtual universe. A rendering component is configured to render the set of objects in the virtual universe based on the priority of each of the set of objects in the virtual universe.
Pre-Fetching Virtual Content In A Virtual Universe
Rosa M. Bolger - Austin TX, US Ann Corrao - Raleigh NC, US Brian M. O'Connell - Cary NC, US Brian J. Snitzer - Lancaster PA, US
Assignee:
International Business Machines Corporation - Amonk NY
International Classification:
G06T 15/00
US Classification:
345419
Abstract:
An invention that pre-fetches virtual content in a virtual universe is provided. In one embodiment, there is a pre-fetching tool, including a ranking component configured to rank each of a plurality of members belonging to a social network of an avatar according to predefined ranking criteria. The pre-fetching tool further includes a pre-fetching component configured to pre-fetch a virtual content within a proximity of each of the plurality of members belonging to the social network of the avatar based on the ranking.
Youtube
JACK IN A BOX: The Change (Episode 9. Season ...
JACK IN A BOX: The Change (Ep. 9/Season 2 Opener) Jack is ready for a ...
Category:
Comedy
Uploaded:
07 Feb, 2010
Duration:
6m 42s
Dream Role Opening - "9 to 5"
Our Dream Role January opening - 9 to 5! Featuring: Sara Jo Allocco Ly...
Category:
Comedy
Uploaded:
28 Jan, 2010
Duration:
3m 13s
JACK IN A BOX: The Co-Workers (Episode 7)
JACK IN A BOX: The Co-Workers (Episode 7) JACK (Michael Cyril Creighto...
Category:
Comedy
Uploaded:
21 Nov, 2009
Duration:
7m 36s
Mascara Mountain Season Preview
In the wake of lady friend shows like Lipstick Jungle, Cashmere Mafia,...
Category:
Comedy
Uploaded:
21 May, 2008
Duration:
4m 29s
The Good Neighbor Minute: Episode 1
Katina Corrao is America's Favorite Nosey Neighbor. Join her as she vi...
Category:
Comedy
Uploaded:
02 Nov, 2010
Duration:
3m 48s
Matt's Party
A very special St. Patrick's Day Party. Written by & starring Brandy B...