Patents by Inventor Clea A. Zolotow

Clea A. Zolotow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190378026
    Abstract: An approach for determining a veracity of a reported event is provided. In an embodiment, a set of predictor variables is retrieved from a selected use case. Each of these predictor values is a condition that indicates the veracity of the reported event. In addition, a set of hidden predictor variables is generated from a set of unstructured documents related to the reported event using a hidden Markov model that is based on the predictor variables using a cognitive system. These hidden predictor variables are combined with the set of predictor variables to generate a set of updated predictor variables. These updated predictor variables are used by the cognitive system to return a determination of the veracity of the reported event.
    Type: Application
    Filed: June 11, 2018
    Publication date: December 12, 2019
    Inventors: Clea Zolotow, Calvin D. Lawrence, Tedrick N. Northway, John Delaney, Mickey Iqbal
  • Publication number: 20190349205
    Abstract: In a distributed network hosting a shared pool of configurable computing resources there is provided one or more system instances of a blockchain. Each system instance comprises a virtual machine and a set of containers. The containers are members of the blockchain in that the blockchain's public ledger records encrypted copies of at least selected directories of each container. Each container that is in the set can thus verify whether any other container also belongs to the same set with reference to the public ledger, since the transactions recorded on the public ledger are encrypted copies of the set's containers. The use of a blockchain thus allows a system boundary to be defined around a set of containers by the initial specification of the blockchain. The system boundary can be defined to ensure that the set of containers comply with legal requirements, such as a geographic restriction.
    Type: Application
    Filed: July 22, 2019
    Publication date: November 14, 2019
    Inventors: Simon J. Brady, Jonas E. Bryllert, John V. Delaney, Barry Hollywood, Clea A. Zolotow
  • Publication number: 20190334988
    Abstract: Methods and systems for datacenter migrations are disclosed. A method includes: virtualizing, by a computing device, servers in a source environment; installing, by the computing device, an isolation firewall to isolate a target environment from the source environment; installing, by the computing device, shared services in the target environment; installing, by the computing device, monitoring and management tools in the virtualized servers in the source environment; replicating, by the computing device, between the source environment and the target environment; and cutting over, by the computing device, from the source environment to the target environment by switching a route advertisement from the source datacenter to the target datacenter.
    Type: Application
    Filed: April 30, 2018
    Publication date: October 31, 2019
    Inventors: John Delaney, Clea Zolotow, Anthony M. Hunt, Laxmikantha S. Nanduru, Rudolph C. Baron, Florian Graf, Dennis M. Carden, Vladimir V. Danilevich
  • Publication number: 20190332751
    Abstract: A system and method for multifactor authentication. The method includes receiving a passthought brainprint and a training 3D pattern. The method also includes calculating a variance between the training 3D pattern and a passthought 3D pattern, and generating an error tolerance for the passthought 3D pattern based on the calculated variance between the training 3D pattern and the passthought 3D pattern. Further, the method includes storing the passthought 3D pattern and the passthought brainprint in a neural profile as a passthought for a secure area.
    Type: Application
    Filed: April 27, 2018
    Publication date: October 31, 2019
    Inventors: Simon J. Brady, Barry Hollywood, Clea A. Zolotow, John V. Delaney
  • Publication number: 20190301881
    Abstract: A computer-implemented method includes accessing a user database, accessing a transport database, and generating a global recommended travel plan. The user database includes travel preferences and a metric preference for each user. The travel preferences include an origin, and a destination. The transport database includes transport data. The global recommended travel plan includes, for each user, a recommended route from the user's origin to the user's destination, a recommended mode, and a recommended start time. Generating the global recommended travel plan includes simultaneously optimizing each user's metric preference based on the transport data and the travel preferences. The computer-implemented method further includes returning each user's recommended route, recommended mode, and recommended start time. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: June 20, 2019
    Publication date: October 3, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, Philippe H.V.M. Spaas, Clea A. Zolotow
  • Publication number: 20190286332
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: June 4, 2019
    Publication date: September 19, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Patent number: 10408631
    Abstract: A computer-implemented method includes accessing a user database, accessing a transport database, and generating a global recommended travel plan. The user database includes travel preferences and a metric preference for each user. The travel preferences include an origin, and a destination. The transport database includes transport data. The global recommended travel plan includes, for each user, a recommended route from the user's origin to the user's destination, a recommended mode, and a recommended start time. Generating the global recommended travel plan includes simultaneously optimizing each user's metric preference based on the transport data and the travel preferences. The computer-implemented method further includes returning each user's recommended route, recommended mode, and recommended start time. A corresponding computer program product and computer system are also disclosed.
    Type: Grant
    Filed: July 24, 2015
    Date of Patent: September 10, 2019
    Assignee: International Business Machines Corporation
    Inventors: John V. Delaney, Anthony M. Hunt, Philippe H. V. M. Spaas, Clea A. Zolotow
  • Publication number: 20190268279
    Abstract: One or more processors determine a throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a source SAN to the target SAN. Buffers within a processor core in the source SAN contain intermediate execution outputs of components within the processor core. The processor(s) determine an estimated time duration required to retrieve the soft state from a central processing unit (CPU) queue in the source SAN processor and to migrate the soft state of the processor core from the source SAN to the target SAN, in order to determine an estimated size and time of the SAN migration from the source SAN to the target SAN. The processor(s) then configure transmission resources available to the source SAN to comport with the estimated size and time of the SAN migration from the source SAN to the target SAN.
    Type: Application
    Filed: May 10, 2019
    Publication date: August 29, 2019
    Inventors: Russell G. Conner, Anthony M. Hunt, Daniel P. Toulan, Johan van Kessel, Clea A. Zolotow
  • Publication number: 20190266507
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Application
    Filed: May 15, 2019
    Publication date: August 29, 2019
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
  • Patent number: 10396997
    Abstract: In a distributed network hosting a shared pool of configurable computing resources there is provided one or more system instances of a blockchain. Each system instance comprises a virtual machine and a set of containers. The containers are members of the blockchain in that the blockchain's public ledger records encrypted copies of at least selected directories of each container. Each container that is in the set can thus verify whether any other container also belongs to the same set with reference to the public ledger, since the transactions recorded on the public ledger are encrypted copies of the set's containers. The use of a blockchain thus allows a system boundary to be defined around a set of containers by the initial specification of the blockchain. The system boundary can be defined to ensure that the set of containers comply with legal requirements, such as a geographic restriction.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Simon J. Brady, Jonas E. Bryllert, John V. Delaney, Barry Hollywood, Clea A. Zolotow
  • Publication number: 20190245797
    Abstract: Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding TCP/IP data stream goes through a plurality of optimized differential switches and the originating IP in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the IP to label the migrated data. The labeled data are able to be traced and identified through multiple managed hubs and/or switches.
    Type: Application
    Filed: April 17, 2019
    Publication date: August 8, 2019
    Inventors: Andrew P. Barnes, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Clea A. Zolotow
  • Publication number: 20190243555
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: April 19, 2019
    Publication date: August 8, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Patent number: 10332018
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Grant
    Filed: March 1, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
  • Patent number: 10331383
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20190183399
    Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.
    Type: Application
    Filed: February 25, 2019
    Publication date: June 20, 2019
    Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Publication number: 20190179677
    Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.
    Type: Application
    Filed: February 19, 2019
    Publication date: June 13, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
  • Publication number: 20190182157
    Abstract: An approach is provided that selects a geographic location to which transmission of a data packet is disallowed. The approach identifies disallowed network devices that reside in the selected geographic location and builds a routing path through a public computer network through an allowed set of network devices with the allowed set of network devices does including any of the disallowed network devices. The approach then transmits the data packet from a transmitting network device to a receiving network device using the routing path.
    Type: Application
    Filed: December 8, 2017
    Publication date: June 13, 2019
    Inventors: Andrew Barnes, John Delaney, Alexander J. Harvilchuck, Kenneth Weber, Clea Zolotow
  • Patent number: 10320689
    Abstract: Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding TCP/IP data stream goes through a plurality of optimized differential switches and the originating IP in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the IP to label the migrated data. The labeled data are able to be traced and identified through multiple managed hubs and/or switches.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: June 11, 2019
    Assignee: International Business Machines Corporation
    Inventors: Andrew P. Barnes, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Clea A. Zolotow
  • Patent number: 10305814
    Abstract: A computer-implemented method sizes a Storage Area Network (SAN) storage migration. One or more processors determine Input/output Operations Per Second (IOPS) and throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a source SAN to the target SAN. One or more processors determine an estimated time and size of the SAN migration based on the IOPS and the throughput of the hardware devices. One or more processors then configure transmission resources available to the source SAN to comport with the estimated time and size of the SAN migration.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: May 28, 2019
    Assignee: International Business Machines Corporation
    Inventors: Russell G. Conner, Anthony M. Hunt, Daniel P. Toulan, Johan van Kessel, Clea A. Zolotow
  • Publication number: 20190146214
    Abstract: A method, computer program product, and system includes a processor(s) utilizing the image capture device to track eye movements of a user interacting with a display communicatively coupled to the one or more processors, the image capture device continuously collecting image data. The processor(s) determines, based on analyzing the collected image data, a probability of whether a user may be experiencing a vision-related issue. Based on the probability being within a given pre-determined range, the processor(s) identifies the vision-related issue experienced by the user. The processor(s) generates, based on the vision-related issue, a two dimensional visual exercise to address the vision-related issue for performance by the user. The processor(s) deploys a graphical user interface to the display, where the graphical user interface comprises the visual exercise. The processor(s) provides the visual exercise to the user via the graphical user interface.
    Type: Application
    Filed: November 16, 2017
    Publication date: May 16, 2019
    Inventors: Valerie Lampkin, Alice-Maria Marascu, Maeve O'Reilly, Clea Zolotow