Search

Gordan Greenlee Phones & Addresses

  • 199 State Route 38B, Endicott, NY 13760 (607) 239-4213 (607) 757-9856
  • 199 State Route 38B APT 38B, Endicott, NY 13760 (607) 239-4213
  • Greenville, PA
  • Maine, NY

Publications

Us Patents

System And Program Product For Checking A Health Of A Computer System

View page
US Patent:
7392430, Jun 24, 2008
Filed:
Mar 28, 2003
Appl. No.:
10/402611
Inventors:
Gordan Greenlee - Endicott NY, US
James A. Martin, Jr. - Endicott NY, US
Douglas G. Murray - Johnson City NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 25, 714 36, 714 39, 714 46
Abstract:
Under the present invention, a configurable dictionary is provided. The configurable dictionary includes a set of objects that identify: (1) attribute conditions of the computer system to be checked; (2) associated locations within the computer system for checking the attribute conditions; and (3) actions to be taken based on results of the checks for the computer system. The health of the computer system is checked by processing the set of objects in the configurable dictionary. Specifically, the attribute conditions identified in the configurable dictionary are checked at their associated locations, and any necessary action are implemented.

Virtual Clustering And Load Balancing Servers

View page
US Patent:
7693991, Apr 6, 2010
Filed:
Jan 16, 2004
Appl. No.:
10/758538
Inventors:
Gordan G. Greenlee - Endicott NY, US
Dennis Hartel - Berthoud CO, US
Joseph F. Riina - Wayne NJ, US
Richard E. Weingarten - Erie CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709226, 709223, 709224, 709246
Abstract:
A method and system is provided intelligent network dispatchers that are capable of routing requests to one or more servers (e. g. , LDAP servers) based on the requested application or the identity of the requester. The servers may be grouped into virtual clusters so that a particular cluster may service requests associated with a particular application or based on a type of customer (e. g. , preferred or general customer) in order to grade levels of service. Also, a system resource monitor may provide continual monitoring of servers in virtual clusters to determine when one or more servers are overburdened or under burdened based on statistical performance data. As a servers performance changes, the system resource monitor may advise the intelligent network dispatcher causing a change in the rate of requests to the overburdened/under burdened server. The server may be temporarily removed from the virtual cluster until performance levels normalize. Further, servers may be re-assigned to other virtual clusters on demand to provide increased capacity to a virtual cluster.

Computer-Implemented Method, System, And Program Product For Managing Log-In Strikes

View page
US Patent:
7793335, Sep 7, 2010
Filed:
Sep 12, 2005
Appl. No.:
11/224373
Inventors:
Bahri B. Bali - Apex NC, US
Christopher E. Barnabo - Bethel CT, US
Gordan G. Greenlee - Endicott NY, US
Kan Y. Hsiao - Edison NJ, US
Howard E. Poole - Poughkeepsie NY, US
Richard E. Weingarten - Erie CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 2, 726 21, 380277
Abstract:
The present invention provides a computer-implemented method, system, and program product for managing log-in strikes in a geographically distributed computer infrastructure. Specifically, under the present invention, when a strike message is received on a strikeout server pursuant to an incorrect password input during an attempted log-in of a user, the incorrect password is compared to a strike list to determine if it was previously received on the strikeout server during a predetermined period of time. Based on this determination, the incorrect password and will be stored in a list on the strikeout server with a corresponding timestamp. Thereafter, the strike message and the timestamp will be replicated to all other strikeout servers in the infrastructure.

Integrated Voice And Video Conferencing Management

View page
US Patent:
7870192, Jan 11, 2011
Filed:
Dec 16, 2004
Appl. No.:
11/014391
Inventors:
Gordan G. Greenlee - Endicott NY, US
James A. Martin, Jr. - Endicott NY, US
Renee Christine Mullins - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709204, 709217, 709226, 709227, 370260, 370261, 370262, 370263, 370264, 37920401, 37920501, 37920301, 715751, 715753
Abstract:
A method and system for coordinating a Voice Over Internet Protocol (VoIP) teleconference. A teleconference operator drags the name of invited attendees into a hot window, which connects the invited attendees to a channel for the teleconference. Each invited attendee's name has a status icon associated with it, indicating if the invited attendee is active in the teleconference. Each invited attendee has access to a Graphical User Interface (GUI) that permits the attendee to toggle back and forth between different teleconferences.

System And Method For Authentication To An Application

View page
US Patent:
7877792, Jan 25, 2011
Filed:
Feb 27, 2008
Appl. No.:
12/038350
Inventors:
Christopher E. Barnabo - Bethel CT, US
Gordan G. Greenlee - Endicott NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/04
G06F 15/16
G06F 17/30
H04L 29/06
US Classification:
726 8, 726 27, 713168, 713185
Abstract:
Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.

Solution For Checking A Health Of A Computer System

View page
US Patent:
8024608, Sep 20, 2011
Filed:
Mar 5, 2008
Appl. No.:
12/042389
Inventors:
Gordan Greenlee - Endicott NY, US
James A. Martin, Jr. - Endicott NY, US
Douglas G. Murray - Johnson City NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 25, 714 36, 714 39, 714 46, 714 27, 714 34
Abstract:
Under the present invention, a configurable dictionary is provided. The configurable dictionary includes a set of objects that identify: (1) attribute conditions of the computer system to be checked; (2) associated locations within the computer system for checking the attribute conditions; and (3) actions to be taken based on results of the checks for the computer system. The health of the computer system is checked by processing the set of objects in the configurable dictionary. Specifically, the attribute conditions identified in the configurable dictionary are checked at their associated locations, and any necessary action are implemented.

System For Controlling Write Access To An Ldap Directory

View page
US Patent:
8205254, Jun 19, 2012
Filed:
Jun 24, 2008
Appl. No.:
12/145107
Inventors:
Sean E. Aschen - Torrington CT, US
Bahri B. Bali - Cary NC, US
Catherine Y. Barnes - Mansfield PA, US
Gordan G. Greenlee - Endicott NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
726 21, 726 27
Abstract:
A method is provided to control access to a software application and, more particularly, to control access to a first software application using a second trusted application. The method comprises extracting data from a decrypted client request and determining a request type from the extracted data. The method further comprises ascertaining an entry type value from at least one of the extracted data and an entry and creating at least one string by prepending the entry type value to one or more attributes associated with the entry. Additionally, the method includes comparing the at least one string to one or more record entries to determine whether a client has permission to perform the request type.

Rate Control Technique For A Lightweight Directory Access Protocol Over Mqseries (Lom) Server

View page
US Patent:
8346958, Jan 1, 2013
Filed:
Dec 4, 2008
Appl. No.:
12/328424
Inventors:
Sean E. Aschen - Torrington CT, US
Bahri B. Bali - Cary NC, US
Catherine Y. Barnes - Mansfield PA, US
Gordan G. Greenlee - Endicott NY, US
Dennis L. Hartel - Berthoud CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
G06F 7/00
G06F 17/30
US Classification:
709232, 707769
Abstract:
A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica.
Gordan G Greenlee from Endicott, NY, age ~63 Get Report