Patents by Inventor James W. Murray

James W. Murray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170105723
    Abstract: Devices and methods for minimally invasive suturing are disclosed. One suturing device for minimally invasive suturing includes a proximal section a distal end, and an intermediate region therebetween. The device includes a suture head assembly having a suturing needle with a pointed end and a second end. The suturing needle is capable of rotating about an axis approximately perpendicular to a longitudinal axis of the device, wherein the pointed end of the suturing needle is positioned within the suture head assembly prior to deployment of guides that are adapted and configured to guide the needle around a circular path when advanced by a drive mechanism having a needle driver for engaging and rotating the suturing needle.
    Type: Application
    Filed: December 13, 2016
    Publication date: April 20, 2017
    Inventors: Gerald I. Brecher, John C. Meade, John Aho, Roger Baske, James H. Bleck, John F. Carlson, Thomas Eagan, Michael J. Helander, James W. Murray, Ashley Perkins, Wayne A. Shakal, Jonathan Towle
  • Publication number: 20170070407
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 9, 2017
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20170070423
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: September 3, 2015
    Publication date: March 9, 2017
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9491313
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: November 8, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9392019
    Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: July 12, 2016
    Assignee: LENOVO ENTERPRISE (SINGAPORE) PTE. LTD.
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9363158
    Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: June 7, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9350754
    Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: May 24, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20160134487
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Application
    Filed: January 14, 2016
    Publication date: May 12, 2016
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9270523
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: February 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20160028765
    Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.
    Type: Application
    Filed: July 28, 2014
    Publication date: January 28, 2016
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20150222522
    Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.
    Type: Application
    Filed: February 5, 2014
    Publication date: August 6, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9100363
    Abstract: A system and computer program product for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment include obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nancy L. Burchfield, Nathaniel Hang, Rafah A. Hosn, James W. Murray, Harigovind V. Ramasamy
  • Patent number: 9094521
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Publication number: 20150195416
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Application
    Filed: March 24, 2015
    Publication date: July 9, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 8996647
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Grant
    Filed: June 9, 2010
    Date of Patent: March 31, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20150026806
    Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.
    Type: Application
    Filed: July 18, 2013
    Publication date: January 22, 2015
    Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20130279679
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Application
    Filed: June 13, 2013
    Publication date: October 24, 2013
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Publication number: 20130262250
    Abstract: A method for allocation of application licenses includes establishing a computing environment comprising a licensed application or service accessed by at least two users, each user having an associated computer system; establishing an ordered list of users for a licensed application or service, in which users have a predefined priority based on a business value or function; establishing at least one user attribute comprising whether a user's virtual machine will be archived and saved for later resumption if the user's license is at least one of suspended, removed, or reallocated; and establishing at least one disqualification threshold for at least one user.
    Type: Application
    Filed: March 29, 2012
    Publication date: October 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Lingafelt, James W. Murray, James Swantek, James S. Worley
  • Publication number: 20130227338
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Application
    Filed: February 28, 2012
    Publication date: August 29, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20120143248
    Abstract: Devices and methods for minimally invasive suturing are disclosed. One suturing device for minimally invasive suturing includes a proximal section a distal end, and an intermediate region therebetween. The device includes a suture head assembly having a suturing needle with a pointed end and a second end. The suturing needle is capable of rotating about an axis approximately perpendicular to a longitudinal axis of the device, wherein the pointed end of the suturing needle is positioned within the suture head assembly prior to deployment of guides that are adapted and configured to guide the needle around a circular path when advanced by a drive mechanism having a needle driver for engaging and rotating the suturing needle.
    Type: Application
    Filed: August 8, 2011
    Publication date: June 7, 2012
    Inventors: Gerald I. Brecher, John C. Meade, John Aho, Roger Baske, James H. Bleck, John F. Carlson, Thomas Eagan, Michael J. Helander, James W. Murray, Ashley Perkins, Wayne A. Shakal, Jonathan Towle