Patents by Inventor Daniel C. Krook
Daniel C. Krook has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11388232Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.Type: GrantFiled: November 25, 2019Date of Patent: July 12, 2022Assignee: KYNDRYL, INC.Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 11119986Abstract: Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource.Type: GrantFiled: July 9, 2019Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan G. Dejana, Lisa Seacat Deluca, Brian D. Goodman, Daniel C. Krook
-
Patent number: 10616132Abstract: Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided.Type: GrantFiled: February 16, 2017Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20200092367Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 10572915Abstract: A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations.Type: GrantFiled: June 22, 2012Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 10554744Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.Type: GrantFiled: January 7, 2016Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 10547676Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.Type: GrantFiled: May 2, 2013Date of Patent: January 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20190332585Abstract: Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource.Type: ApplicationFiled: July 9, 2019Publication date: October 31, 2019Inventors: Ryan G. DEJANA, Lisa Seacat DELUCA, Brian D. GOODMAN, Daniel C. KROOK
-
Patent number: 10394766Abstract: Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource.Type: GrantFiled: November 3, 2016Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan G. Dejana, Lisa Seacat Deluca, Brian D. Goodman, Daniel C. Krook
-
Patent number: 10277521Abstract: An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted.Type: GrantFiled: June 4, 2013Date of Patent: April 30, 2019Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 10275796Abstract: A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine a current location of a user, predict a change of direction of the user, and provide at least one advertisement to the user based on the predicted change of direction of the user.Type: GrantFiled: June 11, 2014Date of Patent: April 30, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Lisa Seacat Deluca, Soobaek Jang, Daniel C. Krook
-
Patent number: 10044661Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.Type: GrantFiled: March 27, 2014Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9998490Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.Type: GrantFiled: June 26, 2017Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9973539Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.Type: GrantFiled: August 19, 2016Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9935849Abstract: An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.Type: GrantFiled: April 13, 2017Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9928623Abstract: According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.Type: GrantFiled: September 12, 2014Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Soobaek Jang, Daniel C. Krook, Craig M. Trim
-
Publication number: 20170329665Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.Type: ApplicationFiled: August 4, 2017Publication date: November 16, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20170322940Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9811370Abstract: Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance.Type: GrantFiled: November 4, 2015Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9813423Abstract: A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).Type: GrantFiled: February 26, 2013Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook