Patents by Inventor Michael TREADWAY
Michael TREADWAY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11925246Abstract: The present invention relates generally to a trimming guide to enable a person with or without particular skill, or a robot, or a computer, or a numerical device to cut a predetermined design, style or shape. More particularly, the invention relates to a trimming guide that would enable a person by him or herself, with or without training or particular skill, or through the use of a robot or a computer or a numerical device to trim his or her own hair, or another person's hair to a quality, finished state which is a predetermined design, style or shape.Type: GrantFiled: December 11, 2021Date of Patent: March 12, 2024Inventor: David Michael Treadway
-
Patent number: 11719547Abstract: A computer-implemented method for determining whether an electric vehicle (EV) requires a current charge. The method analyzes a set of EV data, wherein the set of EV data comprises a battery level, a destination, a current position, and a predicted arrival time to the destination. The method further constructs a charging regulation model for the EV, based on the analyzed set of EV data. The method further computes a risk score pertaining to charging the EV, based on the constructed charging regulation model for the EV, and determines whether the EV requires a current charge based on the computed risk score. The method further engages one or more wireless charging points on a roadway, if the computed risk score is below a threshold value.Type: GrantFiled: March 26, 2020Date of Patent: August 8, 2023Assignee: Kyndryl, Inc.Inventors: Michael Treadway, Craig M. Trim, Chen Liang, Shikhar Kwatra, Jeremy R. Fox, Joseph Blee
-
Publication number: 20230180910Abstract: The present invention relates generally to a trimming guide to enable a person with or without particular skill, or a robot, or a computer, or a numerical device to cut a predetermined design, style or shape. More particularly, the invention relates to a trimming guide that would enable a person by him or herself, with or without training or particular skill, or through the use of a robot or a computer or a numerical device to trim his or her own hair, or another person’s hair to a quality, finished state which is a predetermined design, style or shape.Type: ApplicationFiled: December 11, 2021Publication date: June 15, 2023Inventor: David Michael Treadway
-
Patent number: 11586487Abstract: A computer-implemented method includes observing, by a computer device, a plurality of uniform resource locators (URLs); parsing, by the computer device, a URL path of each of the URLs into path segments; creating, by the computer device, a tree structure, the tree structure having a plurality of nodes, each node representing a particular path segment of the path segments; determining, by the computer device, a confidence factor for a first path in the tree structure using a decay function, the first path having an end node; and compacting, by the computer device, sibling nodes of the nodes into a compacted node in response to a number of the sibling nodes exceeding a variance threshold.Type: GrantFiled: December 4, 2019Date of Patent: February 21, 2023Assignee: Kyndryl, Inc.Inventor: Michael Treadway
-
Patent number: 11537809Abstract: In an approach for optimally grouping containers, a processor passively monitors a set of parameters for a set of containers within a network. A processor records the set of parameters for each container of the set of containers. A processor deploys a k-nearest neighbor neural network (KNN) to determine a first set of groupings of the set of containers based on the set of parameters. A processor simulates the network having grouped containers based on the first set of groupings of the set of containers output by the KNN. A processor simulates an action on the set of containers. A processor updates a reward function based on the action. A processor determines whether a maximum value of the reward function is reached.Type: GrantFiled: November 21, 2019Date of Patent: December 27, 2022Assignee: Kyndryl, Inc.Inventors: Seng Chai Gan, Shikhar Kwatra, Michael Treadway
-
Patent number: 11524600Abstract: Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can be used to partition an area into zones, wherein each zone includes one or more delivery mechanisms and each delivery mechanism include one or more portions that are capable of charging an electric vehicle. Embodiments of the present invention can be used to, in response to receiving a request to charge, reserve a portion of a delivery mechanism for a fixed period of time based on available capacity of the delivery mechanism and need of the requesting electric vehicle. Embodiments of the present invention can be further used to modify the fixed period of time based on real time use of the delivery mechanism.Type: GrantFiled: July 8, 2020Date of Patent: December 13, 2022Assignee: KYNDRYL, INC.Inventors: Michael Treadway, Shikhar Kwatra, Michael Anthony Adams, Michael Millies
-
Patent number: 11427094Abstract: A computer-implemented method for prioritizing one or more electric vehicles that need a battery charge while driving. The method receives a wireless communication between one or more electric vehicles on a section of the roadway. The method further communicates a risk score between the one or more electric vehicles, based on a charging regulation model. The method further prioritizes a need for a battery charge, for the one or more electric vehicles on the section of the roadway, based on the communicated risk score. The method further engages one or more wireless charging points on the section of the roadway, with the one or more electric vehicles, based on the prioritized need for a battery charge.Type: GrantFiled: March 26, 2020Date of Patent: August 30, 2022Assignee: Kyndryl, Inc.Inventors: Michael Treadway, Craig M. Trim, Chen Liang, Shikhar Kwatra, Jeremy R. Fox, Joseph Blee
-
Patent number: 11394808Abstract: A computer-implemented method to determine which port in a container is a service port. The method includes identifying, a first container, wherein the first container comprises a plurality of ports. The method further includes, training a neural network, wherein the neural network is configured to identify at least one service port from the plurality of ports. The method further includes, monitoring, by a network monitor, a set of data sent to the first container comprising a first parameter. The method includes, identifying a first service port of the plurality of ports. The method further includes, marking the first service port.Type: GrantFiled: August 3, 2020Date of Patent: July 19, 2022Assignee: KYNDRYL, INC.Inventors: Seng Chai Gan, Shikhar Kwatra, Michael Treadway, John David Mandra
-
Patent number: 11270670Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying a first user of a plurality of users; identifying a location for the first user; transmitting input of the first user to a server computing device; and simultaneously displaying multiple personalized, dynamic displays using diffraction grating based off of input of the first user and location of the first user.Type: GrantFiled: December 1, 2019Date of Patent: March 8, 2022Assignee: Kyndryl, Inc.Inventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Patent number: 11263249Abstract: Methods, systems and computer program products are described herein that provided context to user queries to a chat bot. In one embodiment, the method may include receiving a user query at a chat bot. The chat bot is communicating with a system providing conversation interaction with the user. The chat bot accessing a user profile being initiated by the user. The user can revoke the permission to the system for creating and/or using a user profile at any time. In some embodiments, the user profile includes a query history and profile information about the user that correlates keywords to context. The chat bot weighs query keywords for comparison with the keywords of the user profile that are correlated to context. The chat bot interacts with the user using the context correlated to the user in accordance with the weight of the query keywords matched to the keywords of the user profile that are correlated to the context.Type: GrantFiled: May 31, 2019Date of Patent: March 1, 2022Assignee: KYNDRYL, INC.Inventors: Beth A. Layton, Thomas M. Reeves, Brian J. Snitzer, Michael Treadway
-
Publication number: 20220038546Abstract: A computer-implemented method to determine which port in a container is a service port. The method includes identifying, a first container, wherein the first container comprises a plurality of ports. The method further includes, training a neural network, wherein the neural network is configured to identify at least one service port from the plurality of ports. The method further includes, monitoring, by a network monitor, a set of data sent to the first container comprising a first parameter. The method includes, identifying a first service port of the plurality of ports. The method further includes, marking the first service port.Type: ApplicationFiled: August 3, 2020Publication date: February 3, 2022Inventors: Seng Chai Gan, Shikhar Kwatra, Michael Treadway, John David Mandra
-
Publication number: 20220009369Abstract: Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can be used to partition an area into zones, wherein each zone includes one or more delivery mechanisms and each delivery mechanism include one or more portions that are capable of charging an electric vehicle. Embodiments of the present invention can be used to, in response to receiving a request to charge, reserve a portion of a delivery mechanism for a fixed period of time based on available capacity of the delivery mechanism and need of the requesting electric vehicle.Type: ApplicationFiled: July 8, 2020Publication date: January 13, 2022Inventors: Michael Treadway, Shikhar Kwatra, Michael Anthony Adams, Michael Millies
-
Publication number: 20210300189Abstract: A computer-implemented method for prioritizing one or more electric vehicles that need a battery charge while driving. The method receives a wireless communication between one or more electric vehicles on a section of the roadway. The method further communicates a risk score between the one or more electric vehicles, based on a charging regulation model. The method further prioritizes a need for a battery charge, for the one or more electric vehicles on the section of the roadway, based on the communicated risk score. The method further engages one or more wireless charging points on the section of the roadway, with the one or more electric vehicles, based on the prioritized need for a battery charge.Type: ApplicationFiled: March 26, 2020Publication date: September 30, 2021Inventors: Michael Treadway, Craig M. Trim, Chen Liang, Shikhar Kwatra, Jeremy R. Fox, JOSEPH BLEE
-
Publication number: 20210302182Abstract: A computer-implemented method for determining whether an electric vehicle (EV) requires a current charge. The method analyzes a set of EV data, wherein the set of EV data comprises a battery level, a destination, a current position, and a predicted arrival time to the destination. The method further constructs a charging regulation model for the EV, based on the analyzed set of EV data. The method further computes a risk score pertaining to charging the EV, based on the constructed charging regulation model for the EV, and determines whether the EV requires a current charge based on the computed risk score. The method further engages one or more wireless charging points on a roadway, if the computed risk score is below a threshold value.Type: ApplicationFiled: March 26, 2020Publication date: September 30, 2021Inventors: Michael Treadway, Craig M. Trim, Chen Liang, Shikhar Kwatra, Jeremy R. Fox, JOSEPH BLEE
-
Patent number: 11093610Abstract: Mitigating threats to container-based workloads is provided by a process that includes detecting an attack against a container hosting environment that includes active and reserve container pools. The attack poses a potential threat of contamination to hosted containers. Based on detecting the attack, the process identifies a time-to-contamination, taken as an amount of time for an active container of the active container pool to become contaminated as a result of the attack. The process provisions new containers into the reserve container pool at a determined rate that is based on the identified time-to-contamination, and continuously removes, from the active container pool, active containers servicing the workload and concurrently deploys reserve containers from the reserve container pool to the active container pool to replace the removed active containers and takeover servicing the workload.Type: GrantFiled: September 11, 2019Date of Patent: August 17, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathaniel J. Gibbs, Michael Treadway, Matthew Mitchell Lobbes, Brian James Snitzer
-
Patent number: 11042366Abstract: Managing container applications by providing a registry of managed container base images, each managed container base image wrapped to include an injection point, determining that a managed container base image includes a vulnerability, and creating a patch script to address the vulnerability. Managing container applications further includes inserting the patch script at the injection point and issuing a pull command for an application using the managed container base image, to a container orchestration tool.Type: GrantFiled: May 14, 2019Date of Patent: June 22, 2021Assignee: International Business Machines CorporationInventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Publication number: 20210173728Abstract: A computer-implemented method includes observing, by a computer device, a plurality of uniform resource locators (URLs); parsing, by the computer device, a URL path of each of the URLs into path segments; creating, by the computer device, a tree structure, the tree structure having a plurality of nodes, each node representing a particular path segment of the path segments; determining, by the computer device, a confidence factor for a first path in the tree structure using a decay function, the first path having an end node; and compacting, by the computer device, sibling nodes of the nodes into a compacted node in response to a number of the sibling nodes exceeding a variance threshold.Type: ApplicationFiled: December 4, 2019Publication date: June 10, 2021Inventor: Michael TREADWAY
-
Publication number: 20210166657Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying a first user of a plurality of users; identifying a location for the first user; transmitting input of the first user to a server computing device; and simultaneously displaying multiple personalized, dynamic displays using diffraction grating based off of input of the first user and location of the first user.Type: ApplicationFiled: December 1, 2019Publication date: June 3, 2021Inventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Publication number: 20210158083Abstract: In an approach for optimally grouping containers, a processor passively monitors a set of parameters for a set of containers within a network. A processor records the set of parameters for each container of the set of containers. A processor deploys a k-nearest neighbor neural network (KNN) to determine a first set of groupings of the set of containers based on the set of parameters. A processor simulates the network having grouped containers based on the first set of groupings of the set of containers output by the KNN. A processor simulates an action on the set of containers. A processor updates a reward function based on the action. A processor determines whether a maximum value of the reward function is reached.Type: ApplicationFiled: November 21, 2019Publication date: May 27, 2021Inventors: Seng Chai Gan, Shikhar Kwatra, Michael Treadway
-
Publication number: 20210073379Abstract: Mitigating threats to container-based workloads is provided by a process that includes detecting an attack against a container hosting environment that includes active and reserve container pools. The attack poses a potential threat of contamination to hosted containers. Based on detecting the attack, the process identifies a time-to-contamination, taken as an amount of time for an active container of the active container pool to become contaminated as a result of the attack. The process provisions new containers into the reserve container pool at a determined rate that is based on the identified time-to-contamination, and continuously removes, from the active container pool, active containers servicing the workload and concurrently deploys reserve containers from the reserve container pool to the active container pool to replace the removed active containers and takeover servicing the workload.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: Nathaniel J. GIBBS, Michael Treadway, Matthew Mitchell LOBBES, Brian James Snitzer