Jun 2011 to 2000 Administrative AssistantLoyola University, Conference Services Chicago, IL Jan 2010 to May 2011 Administrative AssistantLoyola University, Conference Services Chicago, IL Apr 2010 to Aug 2010 At Your Service Desk (AYSD) ManagerLoyola University, Human Resources (WTC) Chicago, IL Aug 2008 to May 2009 Administrative Assistant
Education:
Loyola Univ ersity Chicago Chicago, IL Aug 2007 to May 2011 Bachelor of Arts in History & Classical CivilizationsLoyola University Chicago Roma, Lazio Sep 2009 ItalianDetroit Catholic Central High School Novi, MI Aug 2003 to May 2007
Name / Title
Company / Classification
Phones & Addresses
Joseph Malinowski Owner
Lake K9 Detective/Armored Car Services
22946 Torrence Ave, Chicago Heights, IL 60411 (773)5868351
Joseph Malinowski President
Standard Magneto Sales Co , Inc Whol and Mfg Magnetos · Whol Electrical Equipment Mfg Engine Electrical Equipment · New Motor Vehicle Parts Merchant Whols
4119 W Grand Ave, Chicago, IL 60651 (773)2352010, (773)2352996, (800)6246386
Us Patents
Variable-Length Record, Corruption Recovery Apparatus, System, And Method
Joseph V. Malinowski - Tucson AZ, US David C. Reed - Tucson AZ, US Jeffrey T. Sheridan - Tucson AZ, US Max D. Smith - Tucson AZ, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707803, 707E17007
Abstract:
A method for identifying records of variable length within a data block containing corrupted data is disclosed herein. In certain embodiments, such a method may include scanning backward from an end of a data block containing variable-length records. The backward scan may proceed, one record at a time, to identify a first span of good (i.e., non-corrupt) records. The method may further include scanning forward from a front of the data block, also proceeding one record at a time, to identify a second span of good records. The method may include identifying a problem region by identifying data that resides between the first span and the second span. The method may also include creating a new record between the first span and the second span that contains the problem region. A corresponding computer program product, apparatus, and system are also disclosed.
Neal E. Bohling - Tucson AZ, US Joseph V. Malinowski - Tucson AZ, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 12/00
US Classification:
711154, 711E12001
Abstract:
An approach to allocating storage that has track managed storage and cylinder managed storage. The approach involves receiving a request to allocate a data set for new data and determining if the size of the new data exceeds a breakpoint value. The size of the new data may be determined by allocating a buffer data set that is the size of the breakpoint value, and writing the new data to the buffer data set. If the new data only partially fills the buffer data set, then the size of the new data is smaller than the breakpoint value. If the new data overfills the buffer data set, then the size of the new data set is larger than the breakpoint value. New data that is larger than the breakpoint value is automatically stored in cylinder managed storage, while new data that is smaller than the breakpoint value is automatically stored in track managed storage.
Neal E. Bohling - Tucson AZ, US Joseph V. Malinowski - Tucson AZ, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709226
Abstract:
In one embodiment, a system includes a first storage including track-managed storage and cylinder-managed storage, logic adapted for receiving a request to allocate a target data set on the first storage, logic adapted for determining a size of a source data set on a second storage, wherein data from the source data set will be copied to the target data set, logic adapted for comparing the determined size of the source data set to a break point value to determine if the target data set is to be stored to the track-managed storage or the cylinder-managed storage of the first storage, logic adapted for receiving the data from the source data set, and logic adapted for storing the data from the source data set to the target data set in either track-managed storage or cylinder-managed storage of the first storage based on the comparison.
Joseph V. Malinowski - Tucson AZ, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 17/30
US Classification:
707781, 707E17008
Abstract:
A documentation inventory manager which assigns a protection key to each piece of documentation that is received. More specifically, when providing information to a receiving company, a client provides their files to a common FTP server. As a support team of the receiving company accesses the files and stores some or all of the files to a local storage system, the files are modified to include an imbedded header record. In certain embodiments, the imbedded header record includes information regarding an original file name sent by the client, a key value that is assigned to that version of the downloaded file, permissions such as whether the file can be copied, and the inventory manager location. Each time a version of the file is downloaded to a different location within the receiving company, that file name, location, and new unique key is updated in the documentation inventory manager.
Managing Traces To Capture Data For Memory Regions In A Memory
Neal E. Bohling - Tucson AZ, US Joseph V. Malinowski - Tucson AZ, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 11/34
US Classification:
714 45, 714E11189
Abstract:
Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 21/52 G06F 21/44
Abstract:
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US Eric Seftel - New York NY, US Tabor R. Powelson - Poughkeepsie NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/07 G06F 11/34
Abstract:
A method for monitoring I/O is disclosed. In one embodiment, such a method includes identifying various stages of an I/O process. The method further monitors progress of an I/O operation as it advances through the stages of the I/O process. The method records, in a data structure associated with the I/O operation, timing information indicating time spent in each of the stages. This timing information may include, for example, entry and exit times of the I/O operation relative to each of the stages. In the event the I/O operation exceeds a maximum allowable time spent in one or more of the stages, the method generates an error. Various recovery actions may be taken in response to the error. A corresponding system and computer program product are also disclosed.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US Eric Seftel - New York NY, US Tabor R. Powelson - Poughkeepsie NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G06F 9/50
Abstract:
A method for dynamically tuning I/O performance is disclosed. In one embodiment, such a method includes identifying various stages of an I/O process. The method further monitors progress of an I/O operation as it advances through the stages of the I/O process. The method records, in a data structure associated with the I/O operation, timing information indicating time spent in each of the stages. This timing information may include, for example, entry and exit times of the I/O operation relative to each of the stages. In the event the I/O operation exceeds a maximum allowable time spent in one or more of the stages, the method automatically adjusts an allocation of computing resources to one or more stages of the I/O process. A corresponding system and computer program product are also disclosed.
News
LIVE UPDATES: Hurricane Milton Batters Florida With Deadly Tornados and Storm Surges
Perhaps the most famous of them all is Joseph Malinowski, an amputee who lives on a dilapidated boat on Tampa Bay and is popularly known as "Lieutenant Dan." Brought to the wider public's attention by TikToker Terrence Concannon, Malinowski's story has captivated millions of social media users.In videos shared by journalists on X (formerly known as Twitter) late Wednesday, Oct. 9, the manidentified as Joseph Malinowskiwas seen on his 20-foot boat after the hurricane made landfall as a Category 3 storm. Malinowski's nickname comes from the character played by Gary Sinise in the 1994 film
Raleigh, N.C. Joseph Malinowski told the House Judiciary I Committee on Wednesday that he doesn't want to be a lawbreaker, but neither does he want to suffer with the aftermath of cancer or the symptoms of multiple sclerosis when medical marijuana can ease the pain.