Patents by Inventor Mark A. Shewell

Mark A. Shewell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11232099
    Abstract: A method for aggregating data in database tables. A computer receives a request to create an aggregation object comprising a set of related tables and aggregation rules. The computer system creates an aggregation object comprising multiple tables with related key and data columns and managed as a single entity with a single definition. Upon receiving data in the form of a new, inserted, or updated row, the computer system automatically aggregates the data to all objects in the aggregation object hierarchy by creating a summarized row for the current table using the inserted, merged or updated row and defined aggregation rules for each object.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: January 25, 2022
    Assignee: International Business Machines Corporation
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Patent number: 11023325
    Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: June 1, 2021
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10999363
    Abstract: An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: May 4, 2021
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10938943
    Abstract: Technical features are described for facilitating streaming of monitoring data from a server to multiple analytics nodes. For example, a method for streaming the monitoring data includes registering, by a data streamer, an analytics node by creating a profile corresponding to the analytics node. The method further includes adding, to the profile, a data type used by an insight engine that is executed by the analytics node. The method further includes streaming data of the data type to the analytics node for the insight engine to analyze, based on the profile.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Al Chakra, Mik Clarke, Mark Shewell
  • Patent number: 10783125
    Abstract: A computer-implemented method for managing a database space includes writing, via a processor, a purge rule to a database management system (DBMS). When the purge rule is executed by the DBMS they automatically purge data in one or more databases at regular intervals. The method includes executing, via a DBMS processor, the purge rule. The purge rule is configured to define, via the DBMS processor, a purge object having purge object attributes without user intervention, and purge, via the DBMS processor, the data based on the purge rule at intervals defined by the purge rule attributes and without user intervention.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: September 22, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Karla Bester, Mark A. Shewell, Stephen J. Yates
  • Patent number: 10783198
    Abstract: A database management system provides row based filtering of data at a database level by evaluating content of at least one record of a write data request received from an application for a particular table from among at least one table of a database, against at least one filter rule specified for the particular table. The database management system selects, for the at least one record, whether to store the at least one record of the write data request as a separate row in the particular table based on a separate action triggered for the at least one record when evaluated against the at least one filter rule specified for the particular table, each record not selected for storage being silently discarded.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: September 22, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Patent number: 10715318
    Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.
    Type: Grant
    Filed: January 23, 2018
    Date of Patent: July 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10636320
    Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
  • Patent number: 10628183
    Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
    Type: Grant
    Filed: January 18, 2017
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10613880
    Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20190278658
    Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.
    Type: Application
    Filed: May 29, 2019
    Publication date: September 12, 2019
    Inventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20190229896
    Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.
    Type: Application
    Filed: January 23, 2018
    Publication date: July 25, 2019
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20190220597
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 18, 2019
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10346249
    Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10313948
    Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: June 4, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20190156696
    Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
  • Patent number: 10289845
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10289844
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10264500
    Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10231269
    Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell