1

2
WALKER JOHN WILLIAM, WALKER JAMES WILLIAM: [en] Tan-through fabric. WALKER JOHN WILLIAM, WALKER JAMES WILLIAM, KINIKI HOLDINGS, February 23, 2011: GB2472845-A

[en] A tan through material 10 is formed by knitting polyester and an elastomeric yarn such as elastane such that the material can be stretched to substantially the same degree in perpendicular directions. Preferably the pattern provided in a relaxed condition is an open mesh with diamond and square ...


3
WALKER JOHN WILLIAM, WALKER JAMES WILLIAM: [en] Tan through material. KINIKI HOLDINGS, June 6, 2012: GB2486080-A

[en] A tan through material (10) formed by knitting polyester and elastane in a pattern to provide in a relaxed condition an open mesh with diamond and square shape openings (12). In articles of clothing using such material such as a lady's swimming costume (14), a double layer may be provided at se ...


4
WALKER JAMES WILLIAM, HAIKNEY DAVID, GILBERT DAVID ALAN: [en] UPDATING SOFTWARE. IBM, October 23, 2013: GB2501433-A

[en] This invention relates to a method and apparatus for updating software. In particular this invention relates to a method, system and computer program for updating an operating system in a hypervisor comprising: determining a new version of a component of the operating system installing the new ...


5
WALKER JAMES WILLIAM, WALTON TRAVIS, SHERWOOD DAVID: [en] Managing encryption keys in a computer system. IBM, September 18, 2013: GB2500219-A

[en] A method and apparatus is disclosed for managing encryption keys in a computer system in which in response to the change 401 of a system key the old key and new key 403 are both maintained for subsequent use. In response to a request for a key e.g. for decryption operations, keys may be returne ...


6
WALKER JAMES WILLIAM, MACKINTOSH DAVID, JAMES CHRISTOPHER WHITSON: [en] Virtual machine validation. IBM, October 16, 2013: GB2501205-A

[en] A system, method, computer program product and computer program for providing validation of the compliance of a trusted host environment with a requirement of a virtual machine (VM), the system comprising: a store component for cryptographically storing configuration data associated with the tr ...


7
WALKER JAMES WILLIAM, WALTON TRAVIS, SHERWOOD DAVID: [en] Managing encryption keys in a computer system. IBM, October 30, 2013: GB2501588-A

[en] Managing encryption keys comprising the steps of storing a first key for encrypting data for a selected domain, storing a second key for the domain in addition to the first key in response to a key change and providing the first key or the second key in response to a request for an encryption k ...


8
WALLIS ROBERT , WALKER JAMES WILLIAM : [en] Computer system productivity monitoring. IBM , February 18, 2015: GB2517195-A

[en] A method and system for computer system productivity monitoring comprises gathering data from multiple sensors in the computer system using the data to generate profiles relating to both performance and usage of the computer system and determining if productivity of the user is inhibited by the ...


9
Walker James William, Cocks Ryan Jason: Method and apparatus for administering a process filesystem during program code conversion. Transitive, April 9, 2008: GB2442497-A

A technique is provided for administering references to a subject process filesystem during translation of subject code into target code in a dynamic binary translator. The subject code written for execution on a subject processor is received by a translator, and corresponding target code for execut ...


10
WALKER JAMES WILLIAM, SHERWOOD DAVID, WALTON TRAVIS: [en] Balancing consumption of random data using multiple sources with different levels of entropy. IBM, December 4, 2013: GB2502541-A

[en] When a request for random data is received, the level of randomness or entropy required is determined. If the request is associated with an event requiring a high level of entropy, the random data is obtained from a source with high entropy. Such an event may be the initialization of a secure o ...