Search

Matt R Hogstrom

from Raleigh, NC
Age ~62

Matt Hogstrom Phones & Addresses

  • 6005 Heatherstone Dr, Raleigh, NC 27606 (919) 244-8378
  • Zionville, NC
  • 22213 Birmingham Pl, Santa Clarita, CA 91350
  • Saugus, CA
  • Apex, NC
  • 115 Horne Creek Ct, Cary, NC 27519 (919) 367-2817
  • 101 Deer Valley Dr, Cary, NC 27519 (919) 463-9084
  • Durham, NC
  • Burbank, CA
  • Etters, PA
  • Camp Hill, PA
  • Wade, NC
  • 115 Horne Creek Ct, Cary, NC 27519 (919) 539-2589

Work

Company: Open mainframe project Aug 2018 Position: Zlc chair, zowe - z and os open source

Education

Degree: Bachelors, Bachelor of Arts School / High School: The Master's University 1994 to 1995 Specialities: Communication, Business

Skills

Cloud Computing • Websphere • Java • High Availability • Enterprise Software • Agile Methodologies • Software Development • Aix • Middleware • Websphere Application Server • Integration • Z/Os • Linux • Performance Tuning • Enterprise Architecture • System Architecture • Distributed Systems • Db2 • Operations Management • Architecture • Soa • Virtualization • Storage • Unix • Java Enterprise Edition • Solution Architecture • Solaris • Ibm Aix • Platforms • Data Center • Mainframe • Databases • Apache • Web Services • Operating Systems • It Architectures • Private Cloud • Vmware • Security • Technical Leadership • Tcp/Ip • Servers • Architectures • Web Design • Computer Architecture • Open Source • Pureapplication Platform • Software Engineering

Languages

English

Ranks

Certificate: Certified Safeâ® 4 Agilist

Interests

Children • Cnc Machining (Tormach Pcnc 1100) • Electronics • Scuba • Arduino • Welding • Education • New Technologies • Science and Technology • Raspberry Pi • Metalworking • Woodworking • Hunting • Open Source

Emails

Industries

Computer Software

Resumes

Resumes

Matt Hogstrom Photo 1

Distinguished Engineer

View page
Location:
Cumming, GA
Industry:
Computer Software
Work:
Open Mainframe Project
Zlc Chair, Zowe - Z and Os Open Source

Ibm
Chief Architect and Distinguished Engineer - Z Systems Management and It Optimization Software

Ibm Jan 2012 - Sep 2015
Distinguished Engineer, Cto, Software Defined Environments

Ibm Jan 2012 - Sep 2015
Cto, Systems and Middleware - Cloud Services

Ibm Oct 1, 2012 - Feb 1, 2013
Distinguished Engineer, Architect of Puredata For Transactions and Operational Analytics
Education:
The Master's University 1994 - 1995
Bachelors, Bachelor of Arts, Communication, Business
Los Angeles Valley College 1981 - 1983
Associates, Associate of Arts, General Studies
Skills:
Cloud Computing
Websphere
Java
High Availability
Enterprise Software
Agile Methodologies
Software Development
Aix
Middleware
Websphere Application Server
Integration
Z/Os
Linux
Performance Tuning
Enterprise Architecture
System Architecture
Distributed Systems
Db2
Operations Management
Architecture
Soa
Virtualization
Storage
Unix
Java Enterprise Edition
Solution Architecture
Solaris
Ibm Aix
Platforms
Data Center
Mainframe
Databases
Apache
Web Services
Operating Systems
It Architectures
Private Cloud
Vmware
Security
Technical Leadership
Tcp/Ip
Servers
Architectures
Web Design
Computer Architecture
Open Source
Pureapplication Platform
Software Engineering
Interests:
Children
Cnc Machining (Tormach Pcnc 1100)
Electronics
Scuba
Arduino
Welding
Education
New Technologies
Science and Technology
Raspberry Pi
Metalworking
Woodworking
Hunting
Open Source
Languages:
English
Certifications:
Certified Safeâ® 4 Agilist

Publications

Us Patents

Programmatic Response-Time Based Workload Distribution Techniques

View page
US Patent:
7207043, Apr 17, 2007
Filed:
Dec 31, 2002
Appl. No.:
10/334262
Inventors:
Christopher James Blythe - Morrisville NC, US
Gennaro A. Cuomo - Apex NC, US
Erik A. Daughtrey - Durham NC, US
Matt R. Hogstrom - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/46
G06F 15/16
G06F 15/173
G06F 17/00
US Classification:
718104, 718100, 718102, 718105, 709201, 709223, 709225, 705400, 705412
Abstract:
Workload is programmatically distributed across a set of execution resources. In a multithreaded server environment, response time to end users is improved while increasing the efficiency of software execution and resource usage. Execution time and wait/queued time are tracked, for various types of requests being serviced by a server. Multiple logical pools of threads are used to service these requests, and inbound requests are directed to a selected one of these pools such that requests of similar execution-time requirements are serviced by the threads in that pool. The number and size of thread pools may be adjusted programmatically, and the distribution calculation (i. e. , determining which inbound requests should be assigned to which pools) is a programmatic determination. In preferred embodiments, only one of these variables is adjusted at a time, and the results are monitored to determine whether the effect was positive or negative. The disclosed techniques also apply to tracking and classifying requests by method name (and, optionally, parameters).

Code Analysis For Selective Runtime Data Processing

View page
US Patent:
7219341, May 15, 2007
Filed:
Oct 31, 2002
Appl. No.:
10/285007
Inventors:
Ann Eleanor Dalton - Hants, GB
David Granshaw - Hants, GB
Matt Richard Hogstrom - Cary NC, US
Aaron Stephen Jay Kershenbaum - New City NY, US
Lawrence Koved - Pleasantville NY, US
Bert Laonipon - Raleigh NC, US
Simon Christopher Nash - Hampshire, GB
Marco Pistola - Yorktown Heights NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/45
US Classification:
717154, 717151, 717155
Abstract:
A method, system and apparatus for performing selective data processing based upon a static analysis of the code of a compiled object. A compiled object, for example an enterprise bean, can be analyzed to determine how individual methods in the enterprise bean access specific objects. Those specific objects can include, for instance, data members of a class, or class objects passed into one or more individual methods of the enterprise bean. Where the individual methods of the enterprise bean do not mutate or otherwise change the state of the specific objects, those objects can be accessed by reference only. Importantly, where the specific objects are data fields linked to a table in a database as managed by a container managed persistence (CMP) bean, an update to the table will not be required when the static analysis of the enterprise bean otherwise indicates that the data fields are merely accessed, but not updated.

Dynamic Thread Pool Tuning Techniques

View page
US Patent:
7237242, Jun 26, 2007
Filed:
Dec 31, 2002
Appl. No.:
10/334768
Inventors:
Christopher James Blythe - Morrisville NC, US
Gennaro A. Cuomo - Apex NC, US
Erik A. Daughtrey - Durham NC, US
Matt R. Hogstrom - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/46
US Classification:
718105, 709224
Abstract:
Thread pools in a multithreaded server are programmatically adjusted, based on observed statistics from the server's inbound workload. In a multithreaded server environment, response time to end users is improved while increasing the efficiency of software execution and resource usage. Execution time and wait/queued time are tracked, for various types of requests being serviced by a server. Multiple logical pools of threads are used to service these requests, and inbound requests are directed to a selected one of these pools such that requests of similar execution-time requirements are serviced by the threads in that pool. The number and size of thread pools may be adjusted programmatically, and the distribution calculation (i. e. , determining which inbound requests should be assigned to which pools) is a programmatic determination. In preferred embodiments, only one of these variables is adjusted at a time, and the results are monitored to determine whether the effect was positive or negative.

Software Memory Leak Analysis Using Memory Isolation

View page
US Patent:
7895483, Feb 22, 2011
Filed:
May 25, 2007
Appl. No.:
11/753899
Inventors:
Matt Richard Hogstrom - Cary NC, US
Robbie John Minshall - Chapel Hill NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G11C 29/00
US Classification:
714718
Abstract:
A computerized method, program product, and a service that allocates and isolates leaky memory during the execution of an application in a data processing system. A memory controller having several components first identifies a leaky section of memory and delegates to an allocation component to allocate more memory if possible. If, however, the problematic memory section should not be allocated more memory, an isolator component can isolate the memory section and further divide the memory section into subsections and so on. Each section and each subsection may then be tested to determine if more memory can be allocated, tested to determine if memory resources are strained so as to identify the application or its component causing the strain and then binding the memory. Each section and subsection and further divided and isolated until the leaky portion of memory is identified, and as a result, the software component causing the leak can also be identified. The software component associated with the leaky memory section or subsection can also be taken out-of-service.

Virtual Image Overloading For Solution Deployment

View page
US Patent:
8381211, Feb 19, 2013
Filed:
Apr 26, 2010
Appl. No.:
12/767170
Inventors:
Rohith Ashok - Apex NC, US
Matt R. Hogstrom - Cary NC, US
Jose Ortiz - Raleigh NC, US
Ruth E. Willenborg - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.

Software Memory Leak Analysis Using Memory Isolation

View page
US Patent:
8397111, Mar 12, 2013
Filed:
Dec 23, 2010
Appl. No.:
12/977779
Inventors:
Matt R. Hogstrom - Cary NC, US
Robbie J. Minshall - Chapel Hill NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G11C 29/00
US Classification:
714718
Abstract:
Detecting leaky memory during the execution of an application in a data processing system. A memory controller identifies a leaky section of memory and delegates to an allocation component to allocate more memory. An isolator component isolates the memory section and further divides the memory section into subsections. Each section and each subsection are tested to determine if memory resources are strained to identify an application or its component causing the strain. Each section and subsection are further divided and isolated until the leaky portion of memory is identified, and as a result, the software component causing the leak can also be identified.

Virtual Machine Maintenance With Mapped Snapshots

View page
US Patent:
8458688, Jun 4, 2013
Filed:
Dec 28, 2009
Appl. No.:
12/648052
Inventors:
Rohith K. Ashok - Apex NC, US
Matt R. Hogstrom - Cary NC, US
Jose Ortiz - Raleigh NC, US
Aaron K. Shook - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
G06F 9/445
G06F 9/455
US Classification:
717169, 717175, 718 1
Abstract:
A computer-implemented method, system and/or computer program product manage software maintenance software in a computer system. A first snapshot is taken of first system states of a computer system. The first snapshot is mapped to a first maintenance software, which is further mapped to a specific user. The computer system is instructed to install the first maintenance software in response to an installation request from the specific user. If the specific user subsequently requests that the first maintenance software be removed from the computer system, then the mappings of the first snapshot and the first maintenance software are used to revert the computer system back to the first system states.

Method, System, And Product For Processing Http Requests Based On Request Type Priority

View page
US Patent:
20030009505, Jan 9, 2003
Filed:
Jul 3, 2001
Appl. No.:
09/898366
Inventors:
Gennaro Cuomo - Apex NC, US
Matt Hogstrom - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F009/00
G06F015/16
US Classification:
709/103000, 709/203000
Abstract:
A method, system, and product are disclosed for reordering the processing of HTTP requests. A computer system is included which is executing a Web-based application. A priority is associated with each one of different types of HTTP requests. Multiple HTTP requests are then received by the Web-based application. A priority associated with a type of each of the HTTP requests is determined. The HTTP requests that are associated with a higher priority are processed before processing the HTTP requests that are associated with a lower priority.
Matt R Hogstrom from Raleigh, NC, age ~62 Get Report