- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 21/52 G06F 21/44
Abstract:
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US Eric Seftel - New York NY, US Tabor R. Powelson - Poughkeepsie NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/07 G06F 11/34
Abstract:
A method for monitoring I/O is disclosed. In one embodiment, such a method includes identifying various stages of an I/O process. The method further monitors progress of an I/O operation as it advances through the stages of the I/O process. The method records, in a data structure associated with the I/O operation, timing information indicating time spent in each of the stages. This timing information may include, for example, entry and exit times of the I/O operation relative to each of the stages. In the event the I/O operation exceeds a maximum allowable time spent in one or more of the stages, the method generates an error. Various recovery actions may be taken in response to the error. A corresponding system and computer program product are also disclosed.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US Eric Seftel - New York NY, US Tabor R. Powelson - Poughkeepsie NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G06F 9/50
Abstract:
A method for dynamically tuning I/O performance is disclosed. In one embodiment, such a method includes identifying various stages of an I/O process. The method further monitors progress of an I/O operation as it advances through the stages of the I/O process. The method records, in a data structure associated with the I/O operation, timing information indicating time spent in each of the stages. This timing information may include, for example, entry and exit times of the I/O operation relative to each of the stages. In the event the I/O operation exceeds a maximum allowable time spent in one or more of the stages, the method automatically adjusts an allocation of computing resources to one or more stages of the I/O process. A corresponding system and computer program product are also disclosed.
- Armonk NY, US Joseph V. Malinowski - Bridgeview IL, US Tabor R. Powelson - Poughkeepsie NY, US David C. Reed - Tucson AZ, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/07
Abstract:
A method for collecting diagnostic information associated with an I/O error is disclosed. In one embodiment, such a method includes detecting an error associated with an input/output (I/O) operation. The method determines whether the error can be re-driven and, if so, enables various diagnostic functions to improve collection of diagnostic information. The method then immediately re-drives the I/O operation associated with the error in order to recreate the error. Using the diagnostic functions that have been enabled, the method captures diagnostic information associated with the recreated error. A corresponding system and computer program product are also disclosed.
- Armonk NY, US Joseph V. Malinowski - Oak Forest IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 21/52 G06F 21/44
Abstract:
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
- Armonk NY, US Joseph V. Malinowski - Bridgeview IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 3/06 G06F 11/14
Abstract:
Provided are a computer program product, system, and method for correcting overlapping data sets in a volume. A determination is made of overlapping data sets in a first volume that are assigned a same data unit. The data sets in the first volume that are not assigned a same data unit are copied to a second volume. The same data unit is processed to determine one of the overlapping data sets for which the same data unit is intended and copied to the determined overlapping data set in the second volume.
Rebuilding Damaged Areas Of A Volume Table Using A Volume Data Set
- Armonk NY, US Joseph V. Malinowski - Bridgeview IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 11/14 G06F 3/06
Abstract:
Provided a computer program product, system, and method for rebuilding damaged areas of a volume table using a volume data set for managing data sets assigned data units in a volume in a storage. A determination is made of damaged areas in a volume table providing information on data sets allocated in the volume. The determined damaged areas are formatted to produce reformatted areas to make the volume table usable. A volume data set in the volume having information on data sets configured in the volume is processed to determine from the volume data set salvaged data sets comprising the data sets in the volume not indicated in the volume table. Data set information is rebuilt in the reformatted areas of the volume table for the salvaged data sets.
- Armonk NY, US Joseph V. Malinowski - Bridgeview IL, US David C. Reed - Tucson AZ, US Max D. Smith - Tucson AZ, US
International Classification:
G06F 21/52
Abstract:
In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
Resumes
Internet Marketing & Social Networking Strategist | Business Social Networking & Internet Marketing Presenter
Jun 2011 to 2000 Administrative AssistantLoyola University, Conference Services Chicago, IL Jan 2010 to May 2011 Administrative AssistantLoyola University, Conference Services Chicago, IL Apr 2010 to Aug 2010 At Your Service Desk (AYSD) ManagerLoyola University, Human Resources (WTC) Chicago, IL Aug 2008 to May 2009 Administrative Assistant
Education:
Loyola Univ ersity Chicago Chicago, IL Aug 2007 to May 2011 Bachelor of Arts in History & Classical CivilizationsLoyola University Chicago Roma, Lazio Sep 2009 ItalianDetroit Catholic Central High School Novi, MI Aug 2003 to May 2007
Name / Title
Company / Classification
Phones & Addresses
Joseph Malinowski Owner
Lake K9 Detective/Armored Car Services
22946 Torrence Ave, Chicago Heights, IL 60411 (773)5868351
Joseph Malinowski President
Standard Magneto Sales Co , Inc Whol and Mfg Magnetos · Whol Electrical Equipment Mfg Engine Electrical Equipment · New Motor Vehicle Parts Merchant Whols
4119 W Grand Ave, Chicago, IL 60651 (773)2352010, (773)2352996, (800)6246386
Joseph Malinowski Managing
Tampa Bay Is Awesome LLC
408 E Columbus Dr, Tampa, FL 33602
Joseph Malinowski
Business Networking Life LLC Business Services at Non-Commercial Site · Nonclassifiable Establishments
Perhaps the most famous of them all is Joseph Malinowski, an amputee who lives on a dilapidated boat on Tampa Bay and is popularly known as "Lieutenant Dan." Brought to the wider public's attention by TikToker Terrence Concannon, Malinowski's story has captivated millions of social media users.In videos shared by journalists on X (formerly known as Twitter) late Wednesday, Oct. 9, the manidentified as Joseph Malinowskiwas seen on his 20-foot boat after the hurricane made landfall as a Category 3 storm. Malinowski's nickname comes from the character played by Gary Sinise in the 1994 film
Raleigh, N.C. Joseph Malinowski told the House Judiciary I Committee on Wednesday that he doesn't want to be a lawbreaker, but neither does he want to suffer with the aftermath of cancer or the symptoms of multiple sclerosis when medical marijuana can ease the pain.