Patents by Inventor Christopher J. Dawson

Christopher J. Dawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160164747
    Abstract: One or more processors compute a number of times that a string of text is identified within an online news feed. One or more processors compute a score for the string of text, at least in part, by multiplying the number of times the string of text is identified within the online news feed by a number representing a uniqueness of the string of text. In response to a determination that the score exceeds a first configurable threshold value, one or more processors generate an electronic notification. The electronic notification alerts of an anticipated change in one or more computer hardware capacity requirements of a networked computer system.
    Type: Application
    Filed: February 12, 2016
    Publication date: June 9, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Patent number: 9361161
    Abstract: Approaches that manage energy in a data center are provided. In one embodiment, there is an energy management tool, including an analysis component configured to determine a current energy profile of each of a plurality of systems within the data center, the current energy profile comprising an overall rating expressed as an integer value, the overall rating calculated based on a current workload usage and environmental conditions surrounding each of the plurality of systems; and a priority component configured to prioritize a routing of a workload to a set of systems from the plurality of systems within the data center having the least amount of energy present based on a comparison of the overall ratings for each of the plurality of systems within the data center.
    Type: Grant
    Filed: June 9, 2014
    Date of Patent: June 7, 2016
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Publication number: 20160154541
    Abstract: A computer system displays a first window corresponding to an aspect of a first executing program in a first display area on one or more display devices. The computer system identifies an activity of a second program. The computer system determines whether the activity of the second program meets a threshold of priority. In response to determining that the activity meets the threshold, the computer system manipulates the first window such that the display area can be distributed, at least partially, between the first window and a second window corresponding to the activity of the second program. The computer system displays the second window with the first window within the display area.
    Type: Application
    Filed: February 3, 2016
    Publication date: June 2, 2016
    Inventors: Gene L. Brown, Brendan F. Coffey, Christopher J. Dawson, Clifford V. Harris
  • Publication number: 20160149830
    Abstract: Systems and methods to establish and execute market-driven variable price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method comprises establishing and executing market-driven variable price offerings among lenders and borrowers. A bandwidth-sharing ad hoc network for shared bandwidth usage is formed based on the established and executed market-driven variable price offering.
    Type: Application
    Filed: January 28, 2016
    Publication date: May 26, 2016
    Inventors: Christopher J. Dawson, Peter G. Finn, Rick A. Hamilton, II, Jenny S. Li
  • Publication number: 20160150365
    Abstract: Methods and systems for managing sensitive data stored on a wireless computing device associated with a geofence. The system or method identifies sensitive data stored on the wireless computing device, defines a geofence based at least in part on a parameter associated with a user of the wireless computing device, continuously or periodically determines the location of the wireless computing device relative to the first geofence, and modifies, if the wireless computing device is located outside the first geofence, the identified sensitive data on the wireless computing device.
    Type: Application
    Filed: November 25, 2014
    Publication date: May 26, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gene L. Brown, Brendan F. Coffey, Christopher J. Dawson, Clifford V. Harris
  • Publication number: 20160148143
    Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.
    Type: Application
    Filed: November 20, 2014
    Publication date: May 26, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
  • Publication number: 20160132372
    Abstract: A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
  • Patent number: 9336059
    Abstract: Embodiments of the present invention provide an approach for forecasting a capacity available for processing a workload in a networked computing environment (e.g., a cloud computing environment). Specifically, aspects of the present invention provide service availability for cloud subscribers by forecasting the capacity available for running or scheduled applications in a networked computing environment. In one embodiment, capacity data may be collected and analyzed in real-time from a set of cloud service providers and/or peer cloud-based systems. In order to further increase forecast accuracy, historical data and forecast output may be post-processed. Data may be post-processed in a substantially continuous manner so as to assess the accuracy of previous forecasts.
    Type: Grant
    Filed: July 2, 2014
    Date of Patent: May 10, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gene L. Brown, Brendan F. Coffey, Christopher J. Dawson, Clifford V. Harris, Lynn M. Koch
  • Patent number: 9338132
    Abstract: Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner of an offending avatar that they have been added to the black list or had a report filed against them. Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score.
    Type: Grant
    Filed: January 23, 2014
    Date of Patent: May 10, 2016
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
  • Patent number: 9336119
    Abstract: A method for monitoring information systems has been provided. The method includes analyzing at least one event data record of an information technology system to determine whether at least one target system of the information technology system has monitoring levels, trace levels, log levels, or snap shot levels which should be changed. The method further includes based on the analyzed instructing the at least one target system to change their monitoring levels, trace levels, log levels, or snap shot levels. The method further includes analyzing said monitoring levels, trace levels, log levels, or snap shot levels of the at least one target system to determine a cause of the at least one event data record.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: May 10, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
  • Publication number: 20160127986
    Abstract: A system and method of locating a wireless connection among a plurality of possible wireless connections. More particularly, a system and method of locating a user preferred wireless connection among a plurality of possible wireless connections. The method includes scanning for available networks and determining whether the available networks satisfy one or more user preferences. The method further includes establishing a secondary network connection with one of the available networks based on one or more user preferences being satisfied.
    Type: Application
    Filed: January 13, 2016
    Publication date: May 5, 2016
    Inventors: Christopher J. Dawson, Peter G. Finn, Rick A. Hamilton, II, Jenny S. Li
  • Patent number: 9331904
    Abstract: A method includes establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two lenders as a multiplexer to manage data flow over the ad-hoc network between the borrower and lenders of the at least two lenders of bandwidth. The method may include providing a computer infrastructure to perform the steps of the invention. A system is also provided which includes a server having a database containing data associated with one or more lenders and a borrower in an ad-hoc network and at least one hardware and/or software component. The system may further include computer usable medium having readable program code embodied in the medium to perform processes of the invention.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: May 3, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Dawson, Peter G. Finn, Rick A. Hamilton, II, Jenny S. Li
  • Patent number: 9330370
    Abstract: A computer-implemented method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.
    Type: Grant
    Filed: March 20, 2013
    Date of Patent: May 3, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20160117420
    Abstract: A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable medium having programming instructions operable to perform a thermal analysis of a data center and overlay the thermal analysis on a map of the data center to provide an overlaid thermal analysis. Additionally, the programming instructions are operable to receive a user selection of at least one modeled partition location based on the overlaid thermal analysis and dynamically model a modeled partition for each of the at least one modeled partition location in the data center to create a modeled data center region.
    Type: Application
    Filed: January 6, 2016
    Publication date: April 28, 2016
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Patent number: 9323934
    Abstract: A method, computer program product, and computer system for managing and tracking commands associated with a change on a managed computer system. The managed computer system receives a log-on of an administrator onto the managed computer system, determines the lockdown level of the managed computer system by querying a managing computer system, and retrieves a list of authorized commands under the lockdown level from the managing computer system. The managed computer system determines, by querying the managing computer system, whether an authorized change on the managed computer system exists. The managed computer system removes the lockdown level to receive from the managing computer system authorization of commands that have been locked down, in response to determining that the authorized change exists. The managed computer system sets the lockdown level with the authorized commands on the managed computer system, in response to determining that the authorized change does not exist.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: April 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Patent number: 9313107
    Abstract: Embodiments of the present invention provide an approach for dynamically modifying Quality of Service (QoS) levels for resources (e.g., applications, processes, services, etc.) running in a networked computing environment. Specifically, embodiments of the present invention dynamically adjust transport level networking QoS parameters based on associated service level agreements (SLA) term. In a typical embodiment, a set of service level requirements associated with a resource running in the networked computing environment will first be identified (e.g., in a computer data structure). Then, the set of service level requirements will be mapped to a set of QoS parameters associated with a transport layer of the networked computing environment. A current performance of the resource within the transport layer will then be determined. Once the current performance has been determined, it will be further determined whether the current performance meets the set of service level requirements.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: April 12, 2016
    Assignee: International Business Machines Corporation
    Inventors: Katalin K. Bartfai-Walcott, Gregory J. Boss, Christopher J. Dawson, Rick A. Hamilton, II
  • Patent number: 9310961
    Abstract: The present invention is directed to teleporting avatars between disparate virtual worlds. A system is disclosed that includes a facility for creating a persona profile for an avatar in a first virtual world when the avatar wants to be teleported out of the first virtual world; a facility for transferring persona profiles to and from a disparate virtual world; and a facility for instantiating an inbound avatar based on a received persona profile. Persona profiles may include, e.g., rendering information, trait information, and inventory information.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: April 12, 2016
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Vincenzo V. Di Luoffo, Rick A. Hamilton, II, James W. Seaman
  • Patent number: 9300605
    Abstract: The personal information manager system comprises a centralized information manager (CIM) and a personal information manager (PIM) device. The centralized information manager is encoded on a server and is accessable by the PIM device through Internet protocols over a wireless medium. The PIM, to be carried by a user, is connected to the CIM by a wireless transmitter, receives context-sensitive, customized, prioritized, filtered, and aggregated information from the CIM, and can directly receive GPS data and other sources of local information.
    Type: Grant
    Filed: April 15, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: David C. Brillhart, Christopher J. Dawson, Rick A. Hamilton, II, Michael D. Kendzierski, James W. Seaman
  • Patent number: 9299112
    Abstract: Program on a server computer generates a list having at least a string of plain text defined based on rules, wherein the rules also define a news feed of an electronic media source. The program code subscribes to the news feed. The program code computes a number of times the string of plain text is identified within the news feed, and a score for the string of plain text. Based on the score, the program code generates an electronic notification that alerts of an anticipated change in computer hardware capacity requirements for a build, support, and maintenance of a networked computer system. The program code estimates the requirements. Based on the score, the program code generates a request to adjust allocation of the computer hardware within the networked computer system to satisfy the requirements estimated. The program code sends the request generated to a client computer for viewing.
    Type: Grant
    Filed: June 4, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Patent number: 9300547
    Abstract: An approach for modifying cloud application service levels based upon analysis of documents is provided. The approach performs automated ingestion of documents to determine criticality and needs of certain applications, and develops an understanding of existing cloud environments and service level agreements. The approach may further suggest or automatically reassign applications to the cloud infrastructure to meet the needs of an application.
    Type: Grant
    Filed: November 19, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Rick A. Hamilton, II, Kerrie L. Holley, Ram Viswanathan