Patents by Inventor Derek W. Botti

Derek W. Botti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10979859
    Abstract: An approach for allocating information technology (IT) resources in a networked computing environment (e.g., a cloud computing environment) based on physical location mapping is provided. Specifically, an IT allocation system assigns resources to a specific cloud pool based on the physical location of the resources. By mapping a given physical location (e.g., a defined region of a grid defining a datacenter) to a specific pool, and by enabling the tracking of a resource to a location within the datacenter, the approach can automatically assign a resource to a cloud pool based upon its physical location. Thus, the IT allocation system provides additional pool elasticity while easing the management burden.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: April 13, 2021
    Assignee: International Business Machines Corporation
    Inventors: Derek W. Botti, Leon H. Cash, Jr., Robert E. Garza, Richard A. Locke
  • Patent number: 10635794
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: April 28, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20200084585
    Abstract: An approach for allocating information technology (IT) resources in a networked computing environment (e.g., a cloud computing environment) based on physical location mapping is provided. Specifically, an IT allocation system assigns resources to a specific cloud pool based on the physical location of the resources. By mapping a given physical location (e.g., a defined region of a grid defining a datacenter) to a specific pool, and by enabling the tracking of a resource to a location within the datacenter, the approach can automatically assign a resource to a cloud pool based upon its physical location. Thus, the IT allocation system provides additional pool elasticity while easing the management burden.
    Type: Application
    Filed: November 13, 2019
    Publication date: March 12, 2020
    Inventors: Derek W. Botti, Leon H. Cash, JR., Robert E. Garza, Richard A. Locke
  • Patent number: 10582340
    Abstract: An approach for allocating information technology (IT) resources in a networked computing environment (e.g., a cloud computing environment) based on physical location mapping is provided. Specifically, an IT allocation system assigns resources to a specific cloud pool based on the physical location of the resources. By mapping a given physical location (e.g., a defined region of a grid defining a datacenter) to a specific pool, and by enabling the tracking of a resource to a location within the datacenter, the approach can automatically assign a resource to a cloud pool based upon its physical location. Thus, the IT allocation system provides additional pool elasticity while easing the management burden.
    Type: Grant
    Filed: July 8, 2013
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Derek W. Botti, Leon H. Cash, Jr., Robert E. Garza, Richard A. Locke
  • Publication number: 20180068099
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Application
    Filed: November 13, 2017
    Publication date: March 8, 2018
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Patent number: 9870454
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: January 16, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20170177845
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Application
    Filed: December 16, 2015
    Publication date: June 22, 2017
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Patent number: 9645806
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: May 9, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20160092185
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9105071
    Abstract: An approach for scheduling clinical procedures based on defined environmental thresholds of medical units in healthcare facilities. In one embodiment, a computer system monitors environmental conditions of the medical unit in which clinical procedures will be performed utilizing a measurement system that includes an environmental device for monitoring the environmental conditions. The computer system further receives a schedule of the clinical procedures of the medical unit. The computer system further identifies environmental thresholds for the medical unit to be used for comparison against the environmental conditions of the medical unit. The computer system further compares environmental conditions to the environmental threshold to determine if the environmental thresholds are violated. In another embodiment, the computer system modifies the schedule of clinical procedures of the medical unit responsive to the determination.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: August 11, 2015
    Assignee: International Business Machines Corporation
    Inventors: James C. Fletcher, Derek W. Botti
  • Publication number: 20150012657
    Abstract: An approach for allocating information technology (IT) resources in a networked computing environment (e.g., a cloud computing environment) based on physical location mapping is provided. Specifically, an IT allocation system assigns resources to a specific cloud pool based on the physical location of the resources. By mapping a given physical location (e.g., a defined region of a grid defining a datacenter) to a specific pool, and by enabling the tracking of a resource to a location within the datacenter, the approach can automatically assign a resource to a cloud pool based upon its physical location. Thus, the IT allocation system provides additional pool elasticity while easing the management burden.
    Type: Application
    Filed: July 8, 2013
    Publication date: January 8, 2015
    Inventors: Derek W. Botti, Leon H. Cash, JR., Robert E. Garza, Richard A. Locke
  • Publication number: 20140095182
    Abstract: An approach for scheduling clinical procedures based on defined environmental thresholds of medical units in healthcare facilities. In one embodiment, a computer system monitors environmental conditions of the medical unit in which clinical procedures will be performed utilizing a measurement system that includes an environmental device for monitoring the environmental conditions. The computer system further receives a schedule of the clinical procedures of the medical unit. The computer system further identifies environmental thresholds for the medical unit to be used for comparison against the environmental conditions of the medical unit. The computer system further compares environmental conditions to the environmental threshold to determine if the environmental thresholds are violated. In another embodiment, the computer system modifies the schedule of clinical procedures of the medical unit responsive to the determination.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: James C. Fletcher, Derek W. Botti
  • Publication number: 20080162518
    Abstract: The aggregation of data from multiple database sites, and the grooming of database after extraction are conducted in a bidirectional process. Using one-way replication, data is aggregated from multiple geo-locations into subscription sets. The aggregate is then mined and the mined data is extracted for analysis, further use, or storage. The aggregated data is then cleaned or groomed to delete the extracted data, and the cleaned data is returned to the geo-locations using a second one-way replication subscription set that replicates the data deletion to the target geo-location. The invention is particularly applicable to transient data that does not require continued storage after extraction.
    Type: Application
    Filed: January 3, 2007
    Publication date: July 3, 2008
    Applicant: International Business Machines Corporation
    Inventors: Gregg J. Bollinger, Derek W. Botti