Patents by Inventor Andrew P. Wyskida

Andrew P. Wyskida has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9659367
    Abstract: A system and method tracks touches in a healthcare environment in order to analyze paths of transmission and contamination for the purpose of eliminating and containing transmission of colonizing, drug-resistant pathogens. Touches are identified and tracked with the use of recording devices. Each touch is logged and a touch graph is generated to identify transmission paths.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: May 23, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lorraine M Herger, Neal M Keller, James R Kozloski, Matthew McCarthy, Clifford A Pickover, Andrew P Wyskida
  • Publication number: 20170109484
    Abstract: A system and method tracks touches in a healthcare environment in order to analyze paths of transmission and contamination for the purpose of eliminating and containing transmission of colonizing, drug-resistant pathogens. Touches are identified and tracked with the use of recording devices. Each touch is logged and a touch graph is generated to identify transmission paths.
    Type: Application
    Filed: December 28, 2016
    Publication date: April 20, 2017
    Inventors: Lorraine M. Herger, Neal M. Keller, James R. Kozloski, Matthew McCarthy, Clifford A. Pickover, Andrew P. Wyskida
  • Patent number: 9628456
    Abstract: An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as a shared secret between the access manager and a user. At a second time occurring after the first time, the access manager receives a shared key from the user. As received, the shared key is based on a value of the variable attribute associated with the recurring public event at a most recent recurrence of the recurring public event relative to the second time. The access manager evaluates the shared key. In response to the evaluation, the access manager grants or denies the user access to the resource.
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: April 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20170063765
    Abstract: Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect includes a system that includes an email server and an email client. The email server generates a topic map of email messages stored on the email server. The email server also generates a social map of users with accounts on the email server. The email server receives an email message from a first user, the email message directed to a second user. The email server sends the email message to a third user in response to determining that the email message is relevant to the third user. The present document further describes examples of other aspects such as methods, computer products.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Inventors: Lorraine M. Herger, Neal M. Keller, James R. Kozloski, Matthew A. McCarthy, Clifford A. Pickover, Andrew P. Wyskida
  • Publication number: 20170063736
    Abstract: Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect includes a system that includes an email server and an email client. The email server generates a topic map of email messages stored on the email server. The email server also generates a social map of users with accounts on the email server. The email server receives an email message from a first user, the email message directed to a second user. The email server sends the email message to a third user in response to determining that the email message is relevant to the third user. The present document further describes examples of other aspects such as methods, computer products.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 2, 2017
    Inventors: Lorraine M. Herger, Neal M. Keller, James R. Kozloski, Matthew A. McCarthy, Clifford A. Pickover, Andrew P. Wyskida
  • Publication number: 20170054704
    Abstract: An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as a shared secret between the access manager and a user. At a second time occurring after the first time, the access manager receives a shared key from the user. As received, the shared key is based on a value of the variable attribute associated with the recurring public event at a most recent recurrence of the recurring public event relative to the second time. The access manager evaluates the shared key. In response to the evaluation, the access manager grants or denies the user access to the resource.
    Type: Application
    Filed: November 4, 2016
    Publication date: February 23, 2017
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20170036217
    Abstract: An airborne particle collection system includes an airflow directing unit, register units, a fan unit, and a control system. The airflow directing unit includes a plurality of separately controlled air distribution segments. Each of register unit includes a motorized damper and a filter. The fan unit is connected to the airflow directing unit and to the plurality of register units through piping. The fan unit injects air into the airflow directing unit, and generates a vacuum force that causes exhaust air with airborne particles to be pulled into the register units and filtered by the filters within the register units. The control system selectively controls the air distribution segments of the airflow directing unit and the motorized dampers of the register units to generate alterable airflow patterns between the airflow directing unit and the register units in different zones within a room in which the airflow directing unit and the register units are disposed.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20170010878
    Abstract: An on device client that augments operating system functionality may monitor for an event from an operating system running on a processor of a device. Responsive to determining that the event is indicative of an installation of an application on the device, the on device client may generate a table associated with the application. The table comprises locations of file system entities associated with the application. The table is stored in a memory device. Responsive to determining that the event is indicative of a modification to the application installed on the device, the on device client may trigger one or more automatic processor actions to keep the modification consistent across the file system entities of the application.
    Type: Application
    Filed: July 6, 2015
    Publication date: January 12, 2017
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20160378631
    Abstract: A computer-implemented method, computer program product, and computer system for identifying power line segments and power line redundancies in a datacenter are provided. The computer-implemented method for identifying power line segments and power line redundancies in a datacenter include; transmitting a data packet from equipment compilers to a host program, where the data packet includes unique datacenter equipment identifiers, the datacenter equipment includes IT equipment and a power source; identifying one or more power line segments from the power source to the IT equipment; and determining an existence of a power line redundancy between the power source and the IT equipment.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 29, 2016
    Inventors: Robert J. Calio, Daniel M. Chlus, Michael J. Domitrovits, Michael J. Frissora, Sal M. Rosato, Andrew P. Wyskida
  • Publication number: 20160378162
    Abstract: A computer-implemented method for identifying power line segments and power line redundancies in a datacenter are provided. The computer-implemented method for identifying power line segments and power line redundancies in a datacenter include; transmitting a data packet from equipment compilers to a host program, where the data packet includes unique datacenter equipment identifiers, the datacenter equipment includes IT equipment and a power source; identifying one or more power line segments from the power source to the IT equipment; and determining an existence of a power line redundancy between the power source and the IT equipment.
    Type: Application
    Filed: September 23, 2015
    Publication date: December 29, 2016
    Inventors: Robert J. Calio, Daniel M. Chlus, Michael J. Domitrovits, Michael J. Frissora, Sal M. Rosato, Andrew P. Wyskida
  • Patent number: 9519632
    Abstract: Annotating web content, in one aspect, may include detecting a request to navigate to a web site for content on a web browser. A component such as a web browser plugin, extension or the like transmits a uniform resource locator (URL) associated with the web site to a computer-implemented service that stores annotations to the content separate from the web site that is providing the content, and receives from the computer-implemented service one or more annotations to the content. The web browser plugin or the like renders the one or more annotations within the content from the web site. The content rendered with the annotations may be displayed within a display window of the web browser.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Patent number: 9497200
    Abstract: A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received. The network is accessed by the device by a port. The controller determines the device to be authorized to connect to the network. The controller configures the port in response to determining the device as an authorized device to connect to the network. The controller configures the port according to a first set of parameters. The first set of parameters regulate communication of the device on the network. After configuring the port, the controller monitors a set of communications. The controller monitors the set of communications for an error. By monitoring the set of communications, the controller determines whether the port meets network specifications.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20160241563
    Abstract: A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received. The network is accessed by the device by a port. The controller determines the device to be authorized to connect to the network. The controller configures the port in response to determining the device as an authorized device to connect to the network. The controller configures the port according to a first set of parameters. The first set of parameters regulate communication of the device on the network. After configuring the port, the controller monitors a set of communications. The controller monitors the set of communications for an error. By monitoring the set of communications, the controller determines whether the port meets network specifications.
    Type: Application
    Filed: February 16, 2015
    Publication date: August 18, 2016
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20160212110
    Abstract: An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as a shared secret between the access manager and a user. At a second time occurring after the first time, the access manager receives a shared key from the user. As received, the shared key is based on a value of the variable attribute associated with the recurring public event at a most recent recurrence of the recurring public event relative to the second time. The access manager evaluates the shared key. In response to the evaluation, the access manager grants or denies the user access to the resource.
    Type: Application
    Filed: January 15, 2015
    Publication date: July 21, 2016
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Andrew P. Wyskida
  • Publication number: 20150296519
    Abstract: Various embodiments manage computing networks. In one embodiment, a set of network management data associated with one or more users is analyzed. The set of network management data includes at least electronic scheduling information associated with the one or more users. A concentration of users is predicted for a given location based on the analyzing. At least one network characteristic associated with the given location is performed based on at least the predicted concentration of users.
    Type: Application
    Filed: February 20, 2015
    Publication date: October 15, 2015
    Inventors: Lorraine M. HERGER, Neal M. KELLER, James R. KOZLOSKI, Matthew A. McCARTHY, Clifford A. PICKOVER, Andrew P. WYSKIDA
  • Publication number: 20150295768
    Abstract: Various embodiments manage computing networks. In one embodiment, a set of network management data associated with one or more users is analyzed. The set of network management data includes at least electronic scheduling information associated with the one or more users. A concentration of users is predicted for a given location based on the analyzing. At least one network characteristic associated with the given location is performed based on at least the predicted concentration of users.
    Type: Application
    Filed: June 24, 2015
    Publication date: October 15, 2015
    Inventors: Lorraine M. HERGER, Neal M. KELLER, James R. KOZLOSKI, Matthew A. McCARTHY, Clifford A. PICKOVER, Andrew P. WYSKIDA
  • Publication number: 20150287182
    Abstract: A system and method tracks touches in a healthcare environment in order to analyze paths of transmission and contamination for the purpose of eliminating and containing transmission of colonizing, drug-resistant pathogens. Touches are identified and tracked with the use of recording devices. Each touch is logged and a touch graph is generated to identify transmission paths.
    Type: Application
    Filed: April 4, 2014
    Publication date: October 8, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: LORRAINE M HERGER, NEAL M KELLER, JAMES R KOZLOSKI, MATTHEW MCCARTHY, CLIFFORD A PICKOVER, ANDREW P WYSKIDA
  • Publication number: 20150262094
    Abstract: Disclosed is a novel system and method for continual simulation of the optimal deployment of selecting one or more geographic locations for production of a good or service. Synthetic nodes and hypothetical configurations may be introduced into the mapping, or existing nodes removed, and the estimated communication, and thus performance, cost of these changes automatically and continuously calculated. The energy of the resultant composite order embedding algorithm is measured with the addition of one or more collections of instantiated or synthetic test nodes. In a case when the energy of the order embedding algorithm is sufficiently lower in one configuration than another, a decision module (DM) may be used to automatically determine whether the nodes corresponding to the test nodes should be planned.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 17, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James R. KOZLOSKI, Neal M. KELLER, Lorraine M. HERGER, Matthew A. McCARTHY, Clifford A. PICKOVER, Andrew P. WYSKIDA
  • Patent number: 9100398
    Abstract: Systems and methods are provided for authenticating and authorizing network access requests using directory services in which the directory service authentication and authorization procedures are enhanced using contextual information.
    Type: Grant
    Filed: January 16, 2013
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Colm Malone, Andrew P. Wyskida
  • Patent number: 9094398
    Abstract: Systems and methods are provided for authenticating and authorizing network access requests using directory services in which the directory service authentication and authorization procedures are enhanced using contextual information.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Eric J. Barkie, Benjamin L. Fletcher, Colm Malone, Andrew P. Wyskida