Patents by Inventor Stefano Sidoti

Stefano Sidoti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9823940
    Abstract: Techniques for reconfiguring a snapshot of a virtual machine (VM) may be provided. The VM may be deployed on a hypervisor running on a computer. Techniques comprise provisioning of a VM, installing and configuring an operating system and a base program. A snapshot of the virtual machine may be taken together with the operating system and the base program together with configuration data defining the configuration of the virtual machine, the operating system and base application in a metadata descriptor. All may be stored in a persistent storage. Then the content of the metadata descriptor may be modified, and it may be reverted back to the snapshot using the modified content of the metadata descriptor such that the snapshot of the virtual machine with the operating system and the base program is reconfigured upon deployment of the snapshot including the operating system and the base program.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: November 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Mauro Arcese, Marco Mattia, Stefano Sidoti
  • Patent number: 9817685
    Abstract: Techniques for reconfiguring a snapshot of a virtual machine (VM) may be provided. The VM may be deployed on a hypervisor running on a computer. Techniques comprise provisioning of a VM, installing and configuring an operating system and a base program. A snapshot of the virtual machine may be taken together with the operating system and the base program together with configuration data defining the configuration of the virtual machine, the operating system and base application in a metadata descriptor. All may be stored in a persistent storage. Then the content of the metadata descriptor may be modified, and it may be reverted back to the snapshot using the modified content of the metadata descriptor such that the snapshot of the virtual machine with the operating system and the base program is reconfigured upon deployment of the snapshot including the operating system and the base program.
    Type: Grant
    Filed: July 15, 2014
    Date of Patent: November 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Mauro Arcese, Marco Mattia, Stefano Sidoti
  • Publication number: 20170262302
    Abstract: A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule.
    Type: Application
    Filed: May 25, 2017
    Publication date: September 14, 2017
    Inventors: Marco De Santis, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Patent number: 9749272
    Abstract: A method, executed by a computer, for context-dependent message management, includes receiving proxy recipient information from a target recipient, detecting that a message is being drafted to the target recipient while the target recipient is unavailable, and suggesting a proxy recipient in place of the target recipient. The proxy recipient information may identify multiple proxy recipients organized according to message topic. The proxy recipient information may also describe one or more topics for which a target recipient is available and/or suitable. Proxy recipient information may be determined automatically or may be provided by a user. Furthermore, the proxy recipient information may include availability information. In one embodiment, a user approves of the proxy recipient prior to transmitting the message. In another embodiment, the target recipient is able to preemptively receive the message. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Stefano Sidoti
  • Patent number: 9723100
    Abstract: An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Patent number: 9722956
    Abstract: A first computer sends an electronic message transparently to a second computer of intended recipients of an electronic mail (e-mail), in response to the e-mail addresses of the intended recipients being entered, by a first end-user on the first computer, into a ‘To’ message header field of the e-mail. The second computer sends a Boolean value to the first computer, wherein one of the intended recipients is not available to respond to the e-mail. The first computer queries a repository to return to the first end-user contact information of backup contact entities to respond the e-mail for the intended recipients that are not available to respond to the e-mail. The first computer sends the e-mail to the backup contact entities that are available to respond to the e-mail. The first computer deletes the e-mail from each inbox of the backup contact entities that received but did not read the e-mail before the intended recipients read the e-mail.
    Type: Grant
    Filed: January 25, 2013
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Stefano Sidoti
  • Patent number: 9697025
    Abstract: A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Marco De Santis, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Patent number: 9667708
    Abstract: Embodiments are directed to a computer implemented method of defining and executing tasks in a client-server architecture. The method includes receiving, at a server, a definition of a task to be performed by a client, wherein the definition of the task includes a set of client properties relevant to the task. The method further includes repeatedly receiving, at the server, reports of the client, wherein each of the reports comprises a status of each of a plurality of client properties. The method further includes determining, at the server, a characteristic of the set of client properties based at least in part on the reports, and determining, at the server, a level of service for executing the task based at least in part on the characteristic of the set of client properties.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: May 30, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicola Milanese, Stefano Sidoti
  • Publication number: 20170141946
    Abstract: A method for managing a plurality of computing machines comprises deploying an indication of a management activity having an applicability rule to selected one or more of the computing machines to cause each of the selected computing machines fulfilling the applicability rule to execute the management activity on the selected computing machine, receiving an error message for each failure computing machine of the selected computing machines wherein the execution of the management activity has failed, determining at least one relevant property of each failure computing machine among a plurality of selected properties of the computing machines according to the corresponding error message, collecting a value of at least part of the selected properties for at least part of the computing machines, the values of the selected properties comprising a failure value of each relevant property for each failure computing machine, and updating the applicability rule according to the failure values.
    Type: Application
    Filed: November 16, 2015
    Publication date: May 18, 2017
    Inventors: Luca Balestrazzi, Fabio De Angelis, Andrea Napoleoni, Stefano Sidoti
  • Publication number: 20170126691
    Abstract: In an approach for managing user profiles, a computer identifies a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device. The computer receives streaming data. The computer receives a trigger wherein the received trigger includes biometric data. The computer identifies a second user profile from the identified one or more additional user profiles that is associated with the received trigger. The computer compares biometric data from the second user profile with the biometric data in the received trigger. The computer determines whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
    Type: Application
    Filed: January 16, 2017
    Publication date: May 4, 2017
    Inventors: Mauro Arcese, Fabio De Angelis, Nicola Milanese, Andrea Napoleoni, Stefano Sidoti
  • Publication number: 20170116616
    Abstract: A method is provided to inspect an open, on-going customer ticket and guide a support team for taking the best action at the best timing. The method involves a customer product historical graph (CPHG) that is generated based on the closed tickets. The CPHG comprises a plurality of graph node chains, and each node of the graph node chains corresponds to an action that is taken when a ticket is handled, also a set of parameters associated with the action.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 27, 2017
    Inventors: Alessandro Donatelli, Luigi A. Savorana, Antonio M. Sgro, Stefano Sidoti
  • Patent number: 9608951
    Abstract: An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG.
    Type: Grant
    Filed: January 26, 2013
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Barbara Febonio, Sandro Piccinini, Stefano Sidoti
  • Patent number: 9588786
    Abstract: In an approach for managing user profiles, a computer identifies a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device. The computer receives streaming data. The computer receives a trigger wherein the received trigger includes biometric data. The computer identifies a second user profile from the identified one or more additional user profiles that is associated with the received trigger. The computer compares biometric data from the second user profile with the biometric data in the received trigger. The computer determines whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Mauro Arcese, Fabio De Angelis, Nicola Milanese, Andrea Napoleoni, Stefano Sidoti
  • Patent number: 9582296
    Abstract: In an approach for managing user profiles, a computer identifies a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device. The computer receives streaming data. The computer receives a trigger wherein the received trigger includes biometric data. The computer identifies a second user profile from the identified one or more additional user profiles that is associated with the received trigger. The computer compares biometric data from the second user profile with the biometric data in the received trigger. The computer determines whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Mauro Arcese, Fabio De Angelis, Nicola Milanese, Andrea Napoleoni, Stefano Sidoti
  • Publication number: 20170052663
    Abstract: A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.
    Type: Application
    Filed: November 8, 2016
    Publication date: February 23, 2017
    Inventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Patent number: 9519410
    Abstract: A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.
    Type: Grant
    Filed: September 16, 2015
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Publication number: 20160255028
    Abstract: A method, executed by a computer, for context-dependent message management, includes receiving proxy recipient information from a target recipient, detecting that a message is being drafted to the target recipient while the target recipient is unavailable, and suggesting a proxy recipient in place of the target recipient. The proxy recipient information may identify multiple proxy recipients organized according to message topic. The proxy recipient information may also describe one or more topics for which a target recipient is available and/or suitable. Proxy recipient information may be determined automatically or may be provided by a user. Furthermore, the proxy recipient information may include availability information. In one embodiment, a user approves of the proxy recipient prior to transmitting the message. In another embodiment, the target recipient is able to preemptively receive the message. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: September 3, 2015
    Publication date: September 1, 2016
    Inventors: Sandro Piccinini, Stefano Sidoti
  • Publication number: 20160255166
    Abstract: A method, executed by a computer, for context-dependent message management, includes receiving proxy recipient information from a target recipient, detecting that a message is being drafted to the target recipient while the target recipient is unavailable, and suggesting a proxy recipient in place of the target recipient. The proxy recipient information may identify multiple proxy recipients organized according to message topic. The proxy recipient information may also describe one or more topics for which a target recipient is available and/or suitable. Proxy recipient information may be determined automatically or may be provided by a user. Furthermore, the proxy recipient information may include availability information. In one embodiment, a user approves of the proxy recipient prior to transmitting the message. In another embodiment, the target recipient is able to preemptively receive the message. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: February 27, 2015
    Publication date: September 1, 2016
    Inventors: Sandro Piccinini, Stefano Sidoti
  • Publication number: 20160210425
    Abstract: A system and diagnosis server are provided for collaborating with electronic noses, as well as a related mobile diagnosis unit and related method. The diagnosis server includes a receiver unit for receiving a set of data from one e-nose of a plurality of e-noses. The set of data may include a sensor identifier, a sensor output value, and a relevance flag for a predefined diagnosis. In addition, a determination unit determines a probability factor for the predefined diagnosis based on the set of data, a relevance function and a distribution function.
    Type: Application
    Filed: August 20, 2014
    Publication date: July 21, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefano SIDOTI, Alessandro DONATELLI, Fabio BENEDETTI, Filomena FERRARA, Arcangelo DI BALSAMO
  • Publication number: 20160085564
    Abstract: In an approach for managing user profiles, a computer identifies a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device. The computer receives streaming data. The computer receives a trigger wherein the received trigger includes biometric data. The computer identifies a second user profile from the identified one or more additional user profiles that is associated with the received trigger. The computer compares biometric data from the second user profile with the biometric data in the received trigger. The computer determines whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
    Type: Application
    Filed: September 18, 2014
    Publication date: March 24, 2016
    Inventors: Mauro Arcese, Fabio De Angelis, Nicola Milanese, Andrea Napoleoni, Stefano Sidoti