Patents by Inventor Alexander H. Poga
Alexander H. Poga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11023325Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: GrantFiled: May 29, 2019Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10999363Abstract: An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.Type: GrantFiled: March 22, 2016Date of Patent: May 4, 2021Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10715318Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: GrantFiled: January 23, 2018Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10636320Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: GrantFiled: November 20, 2017Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10628183Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: January 18, 2017Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10613880Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: May 31, 2016Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190278658Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190229896Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: ApplicationFiled: January 23, 2018Publication date: July 25, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190220597Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: April 3, 2019Publication date: July 18, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10346249Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: GrantFiled: January 10, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10313948Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: July 7, 2016Date of Patent: June 4, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190156696Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10289845Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: December 18, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10289844Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: January 19, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10264500Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: March 31, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10231269Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: December 8, 2017Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10143022Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: December 8, 2017Date of Patent: November 27, 2018Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180203997Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180204000Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: February 6, 2018Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180203999Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: December 18, 2017Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell