Patents by Inventor Clea Zolotow

Clea Zolotow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180121248
    Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.
    Type: Application
    Filed: November 2, 2016
    Publication date: May 3, 2018
    Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
  • Publication number: 20180039330
    Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.
    Type: Application
    Filed: August 8, 2016
    Publication date: February 8, 2018
    Inventors: JOHN V. DELANEY, SEAN T. FORNASH, ANTHONY M. HUNT, CLAUS SCHROEDER-HANSEN, CLEA A. ZOLOTOW
  • Publication number: 20180039325
    Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere. A sphere controller then modifies a physical configuration of the pliable inner hollow sphere based on a detected biomechanical abnormality of a user within the tactile device.
    Type: Application
    Filed: January 12, 2017
    Publication date: February 8, 2018
    Inventors: JOHN V. DELANEY, MAEVE M. O'REILLY, NIAMH PHELAN, CLAUS SCHROEDER-HANSEN, NIAMBH SCULLION, CLEA A. ZOLOTOW
  • Publication number: 20180039487
    Abstract: An approach is provided in which an information handling system receives a set of discovery results that correspond to source applications executing in source environments. The information handling system then maps the set of discovery results to a target pattern that includes descriptions of components corresponding to the discovery results. In turn, the information handling system creates a target application based, at least in part, on the target pattern.
    Type: Application
    Filed: August 4, 2016
    Publication date: February 8, 2018
    Inventors: John V. Delaney, Florian D. Graf, Maeve M. O'Reilly, Ruediger Schulze, Thomas Spatzier, Clea A. Zolotow
  • Publication number: 20180018107
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: October 9, 2017
    Publication date: January 18, 2018
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20170371562
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: June 24, 2016
    Publication date: December 28, 2017
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20170366574
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Application
    Filed: September 8, 2017
    Publication date: December 21, 2017
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
  • Publication number: 20170352113
    Abstract: An approach to generating a disruption indicator for an employee. The approach parses communication feeds into a collection of verbs and subjects. The approach then uses a lookup to determine if the verbs match actions associated with stressful situations. Further, the approach determines the location of the employee based on GPS coordinates to aid in measuring a stressful situation. The approach then stores the data for further analysis and generates a disruption indicator for the employee. The approach can also tune the disruption indicator by weighting the assessment of the stressful situation with the employee's biometric data from the time of the stressful situation.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 7, 2017
    Inventors: John V. Delaney, Mickey Iqbal, Nadeem Malik, Niambh Scullion, Clea A. Zolotow
  • Publication number: 20170344915
    Abstract: Computing systems, methods and collaboration tracking tools for predicting, tracking, and reporting the occurrence of unscheduled collaborations between two or more contributors to a project using computer systems equipped capabilities to transmit and/or receive location information of each individual contributor. An analytics module receiving the location information may use the location data to identify when two or more contributors to a project are in the same location together, and further predict whether the proximity of location and timing of the contributors crossing paths will predictably lead to an undocumented project-related collaboration determined as a function of location information, historical data and input collected. The collaboration tracking tools predict, report and/or record collaborations of project-related topics.
    Type: Application
    Filed: May 27, 2016
    Publication date: November 30, 2017
    Inventors: John V. Delaney, Dmitri Lerko, Francesco Mariani, David H. O'Grady, Maeve M. O'Reilly, Clea A. Zolotow
  • Publication number: 20170346751
    Abstract: Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding TCP/IP data stream goes through a plurality of optimized differential switches and the originating IP in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the IP to label the migrated data. The labeled data are able to be traced and identified through multiple managed hubs and/or switches.
    Type: Application
    Filed: May 24, 2016
    Publication date: November 30, 2017
    Inventors: Andrew P. Barnes, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Clea A. Zolotow
  • Publication number: 20170257389
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Application
    Filed: March 1, 2016
    Publication date: September 7, 2017
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
  • Patent number: 9703848
    Abstract: A method and associated systems for caching linked queries for optimized compliance management. A user requests that a local application perform an operation upon a local dataset. The processor, in response, determines that the operation requires access to remote auxiliary data that is managed by a remote application. The processor reads from a local cache a set of provisional links that identify past sources of the auxiliary information, and displays information associated with those links to the user, clearly identifying the links and associated information as being provisional. If the user requires direct access to the auxiliary information, the system obtains from the remote application updated, verified versions of the links, replaces the provisional links in the cache with the verified links, and displays to the user the verified links and updated versions of the associated information, clearly identifying the links and information as being verified.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: July 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Publication number: 20170169529
    Abstract: Workload distribution is automatically optimized. Cost penalty amounts imposed on executing a database operation transaction by current and alternative processing pathway options are determined as a function of execution response times that exceed a service level agreement time limit. Respective computer processing hardware costs are determined for executing the database operation transaction via each of the current and alternative processing pathway options. Respective licensing costs are determined for migrating execution of the database operation transaction to each of the alternative processing pathway options. Accordingly, the current or alternative middleware option that has a lowest total combined cost of licensing costs, computer processing hardware costs and service level agreement penalty costs is chosen as the path for execution of the database operation transaction.
    Type: Application
    Filed: December 10, 2015
    Publication date: June 15, 2017
    Inventors: JOHN V. DELANEY, ALAN P. MURPHY, CLAUS SCHROEDER-HANSEN, CLEA A. ZOLOTOW
  • Publication number: 20170140009
    Abstract: A method and associated systems for caching linked queries for optimized compliance management. A user requests that a local application perform an operation upon a local dataset. The processor, in response, determines that the operation requires access to remote auxiliary data that is managed by a remote application. The processor reads from a local cache a set of provisional links that identify past sources of the auxiliary information, and displays information associated with those links to the user, clearly identifying the links and associated information as being provisional. If the user requires direct access to the auxiliary information, the system obtains from the remote application updated, verified versions of the links, replaces the provisional links in the cache with the verified links, and displays to the user the verified links and updated versions of the associated information, clearly identifying the links and information as being verified.
    Type: Application
    Filed: November 13, 2015
    Publication date: May 18, 2017
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Publication number: 20170100066
    Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 13, 2017
    Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Publication number: 20170041244
    Abstract: A computer-implemented method sizes a Storage Area Network (SAN) storage migration. One or more processors determine Input/output Operations Per Second (IOPS) and throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a source SAN to the target SAN. One or more processors determine an estimated time and size of the SAN migration based on the IOPS and the throughput of the hardware devices. One or more processors then configure transmission resources available to the source SAN to comport with the estimated time and size of the SAN migration.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Inventors: Russell G. Conner, Anthony M. Hunt, Daniel P. Toulan, Johan van Kessel, Clea A. Zolotow
  • Publication number: 20170033994
    Abstract: A method and associated systems for identifying hardcoded network addresses. A network-migration tool requests from a network certain types of data that may identify IP addresses used by the network and receives a subset of the requested data. The system infers from the manner in which received data characterizes IP addresses which of those addresses are likely to be hardcoded. If the system receives a list of server affinities, it infers that an IP address used for communication between servers in a same affinity group is hardcoded if that address is not listed by an associated DNS server. If a received ARP cache lists an IP address as having been resolved to a MAC address, the system infers that the IP address cannot be hardcoded. If a received TCP trace log lists an address without a corresponding hostname the system infers that the address is hardcoded.
    Type: Application
    Filed: July 27, 2015
    Publication date: February 2, 2017
    Inventors: Anthony M. Hunt, Dennis A. Perpetua, JR., Srinivasa Raghavan, Clea A. Zolotow
  • Publication number: 20170023370
    Abstract: A computer-implemented method includes accessing a user database, accessing a transport database, and generating a global recommended travel plan. The user database includes travel preferences and a metric preference for each user. The travel preferences include an origin, and a destination. The transport database includes transport data. The global recommended travel plan includes, for each user, a recommended route from the user's origin to the user's destination, a recommended mode, and a recommended start time. Generating the global recommended travel plan includes simultaneously optimizing each user's metric preference based on the transport data and the travel preferences. The computer-implemented method further includes returning each user's recommended route, recommended mode, and recommended start time. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: July 24, 2015
    Publication date: January 26, 2017
    Inventors: John V. Delaney, Anthony M. Hunt, Philippe H.V.M. Spaas, Clea A. Zolotow
  • Publication number: 20160350696
    Abstract: To determine resource utilization in an organization, a portion describing an interaction between a first participant and a second participant is identified in a human-readable content of a message. Using NLP, the portion is analyzed to extract a verb and a subject corresponding to the interaction. Using the verb, the first participant is characterized as a requestor of a participation related to the subject and the second participant is characterized as a requestee. A confidence value is assigned to a requestor-requestee relationship between the first participant and the second participant. A visual representation of an organization hierarchy is modified by adding a link between the identifiers of the requestor and the requestee, forming an integrated organization hierarchy. Using a set of visual links associated with the requestee in the integrated organization hierarchy, a utilization of the requestee is computed.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 1, 2016
    Applicant: International Business Machines Corporation
    Inventors: John V. Delaney, Randy S. Johnson, Tedrick N. Northway, Clea A. Zolotow
  • Publication number: 20160247099
    Abstract: Embodiments of the present invention provide systems and methods for optimizing travel expenses. The method includes mining data types for a set of planned travel parameters and transposing the mined data types into a set of variables. The method includes performing a constraint-based optimization and a genetic algorithm on the set of variables and generating a list of travel options.
    Type: Application
    Filed: February 19, 2015
    Publication date: August 25, 2016
    Inventors: John V. Delaney, Mickey Iqbal, Nadeem Malik, Clea A. Zolotow