Patents by Inventor Charles S. Lingafelt
Charles S. Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9924023Abstract: A method and system for using a voicemail system. A command is received, from a first telephone device connected to the voicemail system after a call from a second telephone device was received by the first telephone device. The command is for the voicemail system to pause a process of recording a voicemail message being spoken by a user using the first telephone device. In response to the receiving the command, the voicemail system is directed to pause the process of recording the voicemail message, which results in the process of recording the voicemail message being paused by a pause/resume invocation system that is remote to the voicemail system.Type: GrantFiled: May 21, 2015Date of Patent: March 20, 2018Assignee: International Business Machines CorporationInventors: Brian M. O'Connell, Charles S. Lingafelt, Keith R. Walker, John E. Moore, Martinianus BudiTjahja Hadinata
-
Publication number: 20180032221Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.Type: ApplicationFiled: October 12, 2017Publication date: February 1, 2018Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Patent number: 9836186Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.Type: GrantFiled: November 19, 2015Date of Patent: December 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
-
Publication number: 20170331949Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. Contextual information about the first user of the first device is received. User preferences of the second user receiving the call using the second device are determined. Responsive to determining the user preferences of the second user of the second device, an action the second device will take is determined based on the user preferences of the second user and the contextual information about the first user.Type: ApplicationFiled: May 11, 2016Publication date: November 16, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Publication number: 20170324864Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. User preferences of the second user receiving the call using the second device is determined. A mode based on the user preferences of the second user is determined. Responsive to determining the mode, a question to transmit to the first device is determined. The question is transmitted to the first device. A response to the question from the first device is received. Responsive to receiving a response to the question from the first device, an action the second device will take is determined based on the received response from the first device.Type: ApplicationFiled: July 27, 2017Publication date: November 9, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Publication number: 20170318154Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. User preferences of the second user receiving the call using the second device is determined. A mode based on the user preferences of the second user is determined. Responsive to determining the mode, a question to transmit to the first device is determined. The question is transmitted to the first device. A response to the question from the first device is received. Responsive to receiving a response to the question from the first device, an action the second device will take is determined based on the received response from the first device.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Patent number: 9787697Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.Type: GrantFiled: July 29, 2015Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Patent number: 9781609Abstract: Embodiments for testing a wireless network location by a processor. A collection of candidate wireless network test locations is selected for testing wireless network communication according to defined constraints, conditions, testing parameters, or a combination thereof. A self-directed, mobile wireless access point (WAP) is dispatched to at least one stationary location from the collection. A self-directed, testing receiver may be commanded to progressively move to each candidate test location along a testing route of the collection. The testing attributes relating to wireless network communication performance are measured for each of the candidate test locations along the testing route of the collection. Qualified WAP locations are identified from the candidate test locations based on the measured testing attributes.Type: GrantFiled: August 8, 2016Date of Patent: October 3, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rachele S. Kurtz, Charles S. Lingafelt, James W. Murray, James T. Swantek
-
Publication number: 20170274730Abstract: A vehicle climate control system. An air conditioner and heater are operatively connected to a controller and control the temperature of the cabin area of a vehicle. A processor, operatively connected to the controller, determines the amount of time for an operator of the vehicle to travel between their location and the location of the vehicle. The processor determines an amount of time required to adjust the temperature of the cabin area of the vehicle to a selected temperature by using one of the air conditioner and the heater. The processor automatically operates one of the air conditioner and the heater to begin adjusting the temperature of the cabin area to the selected temperature when the amount of time required for the operator to travel between their location and the location of the vehicle is less than or equal to the amount of time required to adjust the temperature of the cabin area vehicle to the selected temperature.Type: ApplicationFiled: June 9, 2017Publication date: September 28, 2017Applicant: GLOBALFOUNDRIES INC.Inventors: GREGORY J. BOSS, ANDREW R. JONES, CHARLES S. LINGAFELT, KEVIN C. MCCONNELL, JOHN E. MOORE, JR.
-
Publication number: 20170249552Abstract: In an approach for providing a response based on situational context, a computer determines that an individual is within a proximity of a computing device. The computer identifies an identity associated with the determined individual within the proximity of the computing device. The computer determines a location associated with the identified identity. The computer identifies an entry within a table based on at least in part on the identified identity and the determined location. The computer determines a stimulus associated with the identified entry occurs. The computer provides a response based on determining the stimulus associated with the identified entry occurs.Type: ApplicationFiled: February 29, 2016Publication date: August 31, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Patent number: 9738136Abstract: A vehicle climate control system. An air conditioner and heater are operatively connected to a controller and control the temperature of the cabin area of a vehicle. A processor, operatively connected to the controller, determines the amount of time for an operator of the vehicle to travel between their location and the location of the vehicle. The processor determines an amount of time required to adjust the temperature of the cabin area of the vehicle to a selected temperature by using one of the air conditioner and the heater. The processor automatically operates one of the air conditioner and the heater to begin adjusting the temperature of the cabin area to the selected temperature when the amount of time required for the operator to travel between their location and the location of the vehicle is less than or equal to the amount of time required to adjust the temperature of the cabin area vehicle to the selected temperature.Type: GrantFiled: November 14, 2013Date of Patent: August 22, 2017Assignee: GLOBALFOUNDRIES INC.Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
-
Patent number: 9686146Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: GrantFiled: January 14, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20170161858Abstract: Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.Type: ApplicationFiled: December 4, 2015Publication date: June 8, 2017Inventors: Suzanne C. Deffeyes, Amir Khan, Charles S. Lingafelt, Gary K. Thornton
-
Publication number: 20170149828Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20170149834Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 4, 2016Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20170147667Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.Type: ApplicationFiled: November 19, 2015Publication date: May 25, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Publication number: 20170139393Abstract: A computer-implemented method includes: monitoring, by a computing device, communication flows within an industrial processing system; identifying, by the computing device, a hazardous command based on monitoring the communication flows, wherein identifying the hazardous command includes running a simulation with the communication flows as an input to the simulation; generating, by the computing device, a set of one or more mitigating commands based on identifying the hazardous command; and outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command.Type: ApplicationFiled: November 13, 2015Publication date: May 18, 2017Inventors: Gregory J. BOSS, Andrew R. JONES, Charles S. LINGAFELT, Kevin C. MCCONNELL, John E. MOORE, JR.
-
Patent number: 9654514Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: GrantFiled: November 4, 2016Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20170131871Abstract: An approach is provided for controlling a first application's access of a second application of a mobile device. Based on first and second icons representing the first and second applications, respectively, having been placed into a graphical element displayed by the mobile device, an attribute included in attributes assigned to the graphical element is obtained. The attribute specifies an exchange of information permitted between the first and second applications. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.Type: ApplicationFiled: January 13, 2017Publication date: May 11, 2017Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
-
Patent number: 9645806Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.Type: GrantFiled: September 30, 2014Date of Patent: May 9, 2017Assignee: International Business Machines CorporationInventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek