Patents by Inventor James W. Murray
James W. Murray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170105723Abstract: Devices and methods for minimally invasive suturing are disclosed. One suturing device for minimally invasive suturing includes a proximal section a distal end, and an intermediate region therebetween. The device includes a suture head assembly having a suturing needle with a pointed end and a second end. The suturing needle is capable of rotating about an axis approximately perpendicular to a longitudinal axis of the device, wherein the pointed end of the suturing needle is positioned within the suture head assembly prior to deployment of guides that are adapted and configured to guide the needle around a circular path when advanced by a drive mechanism having a needle driver for engaging and rotating the suturing needle.Type: ApplicationFiled: December 13, 2016Publication date: April 20, 2017Inventors: Gerald I. Brecher, John C. Meade, John Aho, Roger Baske, James H. Bleck, John F. Carlson, Thomas Eagan, Michael J. Helander, James W. Murray, Ashley Perkins, Wayne A. Shakal, Jonathan Towle
-
Publication number: 20170070407Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: November 30, 2015Publication date: March 9, 2017Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20170070423Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: September 3, 2015Publication date: March 9, 2017Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9491313Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.Type: GrantFiled: March 24, 2015Date of Patent: November 8, 2016Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9392019Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.Type: GrantFiled: July 28, 2014Date of Patent: July 12, 2016Assignee: LENOVO ENTERPRISE (SINGAPORE) PTE. LTD.Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9363158Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.Type: GrantFiled: February 5, 2014Date of Patent: June 7, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9350754Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.Type: GrantFiled: July 18, 2013Date of Patent: May 24, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20160134487Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9270523Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: GrantFiled: February 28, 2012Date of Patent: February 23, 2016Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20160028765Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.Type: ApplicationFiled: July 28, 2014Publication date: January 28, 2016Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20150222522Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.Type: ApplicationFiled: February 5, 2014Publication date: August 6, 2015Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9100363Abstract: A system and computer program product for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment include obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment.Type: GrantFiled: September 14, 2012Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Nancy L. Burchfield, Nathaniel Hang, Rafah A. Hosn, James W. Murray, Harigovind V. Ramasamy
-
Patent number: 9094521Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.Type: GrantFiled: June 13, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
-
Publication number: 20150195416Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.Type: ApplicationFiled: March 24, 2015Publication date: July 9, 2015Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 8996647Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.Type: GrantFiled: June 9, 2010Date of Patent: March 31, 2015Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20150026806Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.Type: ApplicationFiled: July 18, 2013Publication date: January 22, 2015Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20130279679Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.Type: ApplicationFiled: June 13, 2013Publication date: October 24, 2013Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
-
Publication number: 20130262250Abstract: A method for allocation of application licenses includes establishing a computing environment comprising a licensed application or service accessed by at least two users, each user having an associated computer system; establishing an ordered list of users for a licensed application or service, in which users have a predefined priority based on a business value or function; establishing at least one user attribute comprising whether a user's virtual machine will be archived and saved for later resumption if the user's license is at least one of suspended, removed, or reallocated; and establishing at least one disqualification threshold for at least one user.Type: ApplicationFiled: March 29, 2012Publication date: October 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven Lingafelt, James W. Murray, James Swantek, James S. Worley
-
Publication number: 20130227338Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: ApplicationFiled: February 28, 2012Publication date: August 29, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20120143248Abstract: Devices and methods for minimally invasive suturing are disclosed. One suturing device for minimally invasive suturing includes a proximal section a distal end, and an intermediate region therebetween. The device includes a suture head assembly having a suturing needle with a pointed end and a second end. The suturing needle is capable of rotating about an axis approximately perpendicular to a longitudinal axis of the device, wherein the pointed end of the suturing needle is positioned within the suture head assembly prior to deployment of guides that are adapted and configured to guide the needle around a circular path when advanced by a drive mechanism having a needle driver for engaging and rotating the suturing needle.Type: ApplicationFiled: August 8, 2011Publication date: June 7, 2012Inventors: Gerald I. Brecher, John C. Meade, John Aho, Roger Baske, James H. Bleck, John F. Carlson, Thomas Eagan, Michael J. Helander, James W. Murray, Ashley Perkins, Wayne A. Shakal, Jonathan Towle