Patents by Inventor Jeffrey K. Price
Jeffrey K. Price has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11918302Abstract: An interactive control unit is disclosed. The interactive control unit includes an interactive touchscreen display, an interface configured to couple the control unit to a surgical hub, a processor, and a memory coupled to the processor. The memory stores instructions executable by the processor to receive input commands from the interactive touchscreen display located inside a sterile field and transmit the input commands to the surgical hub to control devices coupled to the surgical hub located outside the sterile field.Type: GrantFiled: March 31, 2021Date of Patent: March 5, 2024Assignee: Cilag GmbH InternationalInventors: Jeffrey D. Messerly, Peter K. Shires, Monica L. Z. Rivard, Cory G. Kimball, David C. Yates, Jeffrey L. Aldridge, Daniel W. Price, William B. Weisenburgh, II, Jason L. Harris, Frederick E. Shelton, IV, Jerome R. Morgan
-
Patent number: 11164195Abstract: Embodiments of the invention include methods, systems and computer program products for predicting customer purchasing behavior. Aspects include receiving, from a sensor, first customer sensor data about a first customer in a store, wherein the first customer sensor data includes accompaniment data about one or more accompaniments of the first customer. A determination is made that the first customer is known based at least in part on the first customer sensor data. Based at least in part on determining that the first customer is known, a customer profile for the first customer is accessed, wherein the customer profile includes historical customer data. The accompaniment data and the customer profile are analyzed to determine a first sales strategy for the first customer. One or more sales techniques can be generated based on the sales strategy for the first customer.Type: GrantFiled: February 14, 2017Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 11074355Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.Type: GrantFiled: November 23, 2015Date of Patent: July 27, 2021Assignee: International Business Machines CorporationInventors: Jeffrey K. Price, Prabhat K. Sur, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 10264094Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.Type: GrantFiled: August 19, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Publication number: 20180232749Abstract: Embodiments of the invention include methods, systems and computer program products for predicting customer purchasing behavior. Aspects include receiving, from a sensor, first customer sensor data about a first customer in a store, wherein the first customer sensor data includes accompaniment data about one or more accompaniments of the first customer. A determination is made that the first customer is known based at least in part on the first customer sensor data. Based at least in part on determining that the first customer is known, a customer profile for the first customer is accessed, wherein the customer profile includes historical customer data. The accompaniment data and the customer profile are analyzed to determine a first sales strategy for the first customer. One or more sales techniques can be generated based on the sales strategy for the first customer.Type: ApplicationFiled: February 14, 2017Publication date: August 16, 2018Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9946328Abstract: In an approach to managing racks in a MAID system, a first rack of a data center is identified. The data center comprises a plurality of racks. The first rack corresponds to a request. The request is one of (i) a request to change a power status of a storage device of the first rack or (ii) a request to service the first rack. An optimal placement of the plurality of racks is calculated to satisfy a condition of the request. One or more of the racks are moved from a first location to a second location, based on the calculated optimal placement of the one or more racks.Type: GrantFiled: October 29, 2015Date of Patent: April 17, 2018Assignee: International Business Machines CorporationInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9861840Abstract: Receiving machine-readable information about an anchor point, analyzing that information to determine if connecting a load to the anchor point would be safe, and reporting the results of this analysis to a user.Type: GrantFiled: August 18, 2016Date of Patent: January 9, 2018Assignee: International Business Machines CorporationInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9750039Abstract: A configurable wireless switched network includes a wireless access point. The wireless access point includes an application that is executable thereon. The application is configured to set, by a user via an input component, a first port of a plurality of ports as a command channel. The command channel provides a first point of contact between the wireless access point and client devices. The application is also configured to receive configuration parameters from the user. The configuration parameters include port allocation instructions for the ports and identifiers of the client devices. The application is further configured to monitor bandwidth utilization on a network; receive, at the command channel, a request from one of the client devices to access the network; and assign one of the ports to the client device based on the port allocation instructions, the bandwidth utilization, and an identifier of the client device.Type: GrantFiled: March 4, 2014Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9750041Abstract: A configurable wireless switched network includes a wireless access point. The wireless access point includes an application that is executable thereon. The application is configured to set, by a user via an input component, a first port of a plurality of ports as a command channel. The command channel provides a first point of contact between the wireless access point and client devices. The application is also configured to receive configuration parameters from the user. The configuration parameters include port allocation instructions for the ports and identifiers of the client devices. The application is further configured to monitor bandwidth utilization on a network; receive, at the command channel, a request from one of the client devices to access the network; and assign one of the ports to the client device based on the port allocation instructions, the bandwidth utilization, and an identifier of the client device.Type: GrantFiled: March 21, 2016Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Publication number: 20170123480Abstract: In an approach to managing racks in a MAID system, a first rack of a data center is identified. The data center comprises a plurality of racks. The first rack corresponds to a request. The request is one of (i) a request to change a power status of a storage device of the first rack or (ii) a request to service the first rack. An optimal placement of the plurality of racks is calculated to satisfy a condition of the request. One or more of the racks are moved from a first location to a second location, based on the calculated optimal placement of the one or more racks.Type: ApplicationFiled: October 29, 2015Publication date: May 4, 2017Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Publication number: 20160381020Abstract: Embodiments of the present invention disclose a method, system, and computer program product for a combined key security program. A computer receives an access request from a resource (or a device associated with the resource) which includes a combined key detailing factors corresponding to users and resources involved in the request. The computer references an access policy of the resource to which access is requested and determines whether the access policy requires state keys necessary to indicate a time, place, or other current state information. If a state key is necessary, the computer retrieves the required state key and adds it to the combined key. The computer then determines whether the combined key satisfies the referenced access policy, and if so, grants the access request, else the access request is denied.Type: ApplicationFiled: June 23, 2015Publication date: December 29, 2016Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Publication number: 20160360003Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.Type: ApplicationFiled: August 19, 2016Publication date: December 8, 2016Inventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Publication number: 20160354621Abstract: Receiving machine-readable information about an anchor point, analyzing that information to determine if connecting a load to the anchor point would be safe, and reporting the results of this analysis to a user.Type: ApplicationFiled: August 18, 2016Publication date: December 8, 2016Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9511245Abstract: Receiving machine-readable information about an anchor point, analyzing that information to determine if connecting a load to the anchor point would be safe, and reporting the results of this analysis to a user.Type: GrantFiled: March 28, 2014Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9454506Abstract: A method and system for managing caching at a computer. A computer receives a file from a storage device on a network in response to a request by a first user. The computer may then determine if other users of the computer are likely to request the file, based upon a type of the file and a type of the network. If other users are likely to request the file, the computer may then cache the file at the computer. In one embodiment, the computer may determine if other users of the computer are likely to request the file based upon access permissions to the file at a source of the file. In another embodiment, the computer may determine if other users of the computer are likely to request the file based upon if the file has been previously cached at the computer.Type: GrantFiled: November 27, 2012Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Publication number: 20160217482Abstract: A computer system identifies a ranking, and a fee for a user of a game. A computer system determines an amount to adjust the fee for the user of the game based upon the ranking of the user. Responsive to determining the amount to adjust the fee, a computer system updates the fee for the user of the game.Type: ApplicationFiled: April 12, 2016Publication date: July 28, 2016Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Publication number: 20160192380Abstract: A configurable wireless switched network includes a wireless access point. The wireless access point includes an application that is executable thereon. The application is configured to set, by a user via an input component, a first port of a plurality of ports as a command channel. The command channel provides a first point of contact between the wireless access point and client devices. The application is also configured to receive configuration parameters from the user. The configuration parameters include port allocation instructions for the ports and identifiers of the client devices. The application is further configured to monitor bandwidth utilization on a network; receive, at the command channel, a request from one of the client devices to access the network; and assign one of the ports to the client device based on the port allocation instructions, the bandwidth utilization, and an identifier of the client device.Type: ApplicationFiled: March 21, 2016Publication date: June 30, 2016Inventors: John E. Moore, JR., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Publication number: 20160078248Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.Type: ApplicationFiled: November 23, 2015Publication date: March 17, 2016Inventors: JEFFREY K. PRICE, PRABHAT K. SUR, ROBERT R. WENTWORTH, STANLEY C. WOOD
-
Patent number: 9250870Abstract: A computing device determines a first set of functions in a first file having a first bit length. The computing device performs a first test, which includes executing a first test program capable of testing each function in the first set of functions. The computing device determines whether the first test was successful, and based on determining that the first test was successful, creates a shim program based on the first set of functions. The computing device creates a second file based on the first set of functions, the second file having a second bit length. The computing device performs a second test, which includes executing a second test program capable of testing each function in the second file. The computing device determines whether the second test was successful, and based on determining that the second test was successful, publishes one or more of the shim program and second file.Type: GrantFiled: March 14, 2014Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: John E. Moore, Jr., Jeffrey K. Price, Robert R. Wentworth, Stanley C. Wood
-
Patent number: 9230131Abstract: Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user.Type: GrantFiled: February 12, 2015Date of Patent: January 5, 2016Assignee: International Business Machines CorporationInventors: Jeffrey K. Price, Prabhat K. Sur, Robert R. Wentworth, Stanley C. Wood