Patents by Inventor Eric M. Anderson
Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11933221Abstract: A gas turbine engine including a core having a compressor section fluidly connected to a combustor via a primary flowpath and a turbine section connected to the combustor via the core flow path. An assembly is disposed within the gas turbine engine and includes a first part connected to a second part via a radial stack joint. The first part includes a radially inward facing surface contacting a corresponding radially outward facing surface of the second part. A fastener protrudes through the first part and the second part and is configured to maintain the relative positions of the first part and the second part. A channel is disposed on at least one of the radially inward facing surfaces and is positioned between the fastener and a circumferential edge of the first part. The channel is connected to at least one cooling air source.Type: GrantFiled: October 17, 2022Date of Patent: March 19, 2024Assignee: RTX CorporationInventors: Corey D. Anderson, Edward Boucher, Rebecca R. Dunnigan, Nicholas Broulidakis, Matthew Murakami, Daniel R. Brandt, Konrad Kuc, Victoria M. Imlach, Sushruth G. Kamath, Manuel A. Casares Rivas, Eric G. Leamon, Adam Castles, Edmond Cheung, Kyra A. Thole-Wilson, Javier Nebero Johnson
-
Patent number: 11356341Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.Type: GrantFiled: September 26, 2019Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
-
Patent number: 11177972Abstract: A method, and associated computer system and computer program product, for notifying users of events. A notification server that includes a computer receives a notification rule. The notification server generates, for the received notification rule, a unique identifier for communication. The notification server receives an indication of an IT event that occurred in a source computing device. The received notification identifies a software hug associated with the IT event. The notification rule is a condition of a severity level of the software bug exceeding a predefined threshold. The notification server determines whether the received indication satisfies the notification rule. In response to determining that the received indication satisfies the notification rule, the notification server marks the received event, using the unique identifier and broadcasting the marked event for receipt by those users who have access to said unique identifier.Type: GrantFiled: October 1, 2019Date of Patent: November 16, 2021Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski
-
Patent number: 11128568Abstract: A packet is analyzed at an outbound end of a tunnel from a first data network to determine whether the packet is directed to a first remote target in a first remote data network over a first tunnel or to a second remote target in a second remote data network over a second tunnel. A target address of the packet is present in both the first remote data network and the second remote data network. When the packet is to be directed to the first remote target in the first remote data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: GrantFiled: July 10, 2019Date of Patent: September 21, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Patent number: 11093880Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.Type: GrantFiled: January 8, 2020Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 11025542Abstract: At an outbound end of a tunnel from a first data network, a packet is analyzed to determine whether the packet is to be directed to a local target in the first data network or to be sent over the tunnel to a remote target in a second data network. A target address of the packet is present in both the first data network and the second data network. When the packet is to be directed to the remote target in the second data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: GrantFiled: July 10, 2019Date of Patent: June 1, 2021Inventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons, Joseph V. Boyle
-
Publication number: 20200143307Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.Type: ApplicationFiled: January 8, 2020Publication date: May 7, 2020Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 10587482Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.Type: GrantFiled: September 18, 2017Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
-
Patent number: 10552777Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.Type: GrantFiled: November 20, 2014Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Publication number: 20200036541Abstract: A method, and associated computer system and computer program product, for notifying users of events. A notification server that includes a computer receives a notification rule. The notification server generates, for the received notification rule, a unique identifier for communication. The notification server receives an indication of an IT event that occurred in a source computing device. The received notification identifies a software hug associated with the IT event. The notification rule is a condition of a severity level of the software bug exceeding a predefined threshold. The notification server determines whether the received indication satisfies the notification rule. In response to determining that the received indication satisfies the notification rule, the notification server marks the received event, using the unique identifier and broadcasting the marked event for receipt by those users who have access to said unique identifier.Type: ApplicationFiled: October 1, 2019Publication date: January 30, 2020Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski
-
Publication number: 20200028759Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.Type: ApplicationFiled: September 26, 2019Publication date: January 23, 2020Inventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
-
Publication number: 20200021504Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.Type: ApplicationFiled: September 26, 2019Publication date: January 16, 2020Inventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
-
Patent number: 10498550Abstract: A method, and associated computer system and computer program product, for notifying users of events. A notification server that includes a computer receives a notification rule. The notification server generates, for the received notification rule, a unique identifier for communication using a predefined social networking service. The notification server receives an indication of an event that occurred in an event source. The notification server determines whether the received indication satisfies the notification rule. In response to determining that the received indication satisfies the notification rule, the notification server marks the received event, using the unique identifier and broadcasting the marked event using the social networking service for receipt by those users who have access to said unique identifier.Type: GrantFiled: July 29, 2016Date of Patent: December 3, 2019Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski
-
Publication number: 20190334818Abstract: At an outbound end of a tunnel from a first data network, a packet is analyzed to determine whether the packet is to be directed to a local target in the first data network or to be sent over the tunnel to a remote target in a second data network. A target address of the packet is present in both the first data network and the second data network. When the packet is to be directed to the remote target in the second data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: ApplicationFiled: July 10, 2019Publication date: October 31, 2019Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Publication number: 20190334819Abstract: A packet is analyzed at an outbound end of a tunnel from a first data network to determine whether the packet is directed to a first remote target in a first remote data network over a first tunnel or to a second remote target in a second remote data network over a second tunnel. A target address of the packet is present in both the first remote data network and the second remote data network. When the packet is to be directed to the first remote target in the first remote data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: ApplicationFiled: July 10, 2019Publication date: October 31, 2019Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Patent number: 10425330Abstract: A packet is analyzed at an outbound end of a tunnel from a first data network to determine whether the packet is directed to a first remote target in a first remote data network over a first tunnel or to a second remote target in a second remote data network over a second tunnel. A target address of the packet is present in both the first remote data network and the second remote data network. When the packet is to be directed to the first remote target in the first remote data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: GrantFiled: April 24, 2017Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Patent number: 10397109Abstract: At an outbound end of a tunnel from a first data network, a packet is analyzed to determine whether the packet is to be directed to a local target in the first data network or to be sent over the tunnel to a remote target in a second data network. A target address of the packet is present in both the first data network and the second data network. When the packet is to be directed to the remote target in the second data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: GrantFiled: April 24, 2017Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Patent number: 10387241Abstract: A computer-implemented embodiment heals an information technology (IT) system. A cognitive computing hardware system receives an error history log that describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system and that have a history of experiencing one or more errors currently being detected in the IT system. The cognitive computing hardware system receives a record of real-time events, which are external to the IT system and which impact a performance of the alternative IT systems. The cognitive computing hardware system generates a prioritized set of solutions to overcome the one or more errors currently being detected in the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events.Type: GrantFiled: April 3, 2017Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 10382959Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.Type: GrantFiled: November 9, 2017Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Patent number: 10325095Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with user(s) authorized to initiate execution of command(s) to perform the task and with an authorized location. A requestor is determined to be in the authorized location by receiving verification from physical access control system(s). The requestor is determined to be logged into a first computer system at the authorized location and to have utilized the first computer system to request execution of one of the command(s). The requestor is determined to be remotely logged into a second computer system via the first computer system. The requestor is determined to be one of the authorized user(s) correlated with the task. Based in part on determining the requestor is one of the authorized user(s) subsequent to determining the requestor is remotely logged into the second computer system, the requested command is executed.Type: GrantFiled: June 28, 2018Date of Patent: June 18, 2019Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan