Patents by Inventor Eric M. Anderson

Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10257047
    Abstract: A processor receives service availability data for at least one service, where the service availability data indicates an amount time the at least one service was available and an amount of time one or more resources utilized in the service was available. A processor receives service configuration data for the service, where the service configuration data indicates one or more resource requirements of the at least one service. A processor determines one or more resource unavailability scores for the one or more resources utilized in providing the service. A processor determines one or more resource replacement scores for the one or more resources utilized in the service. A processor determines availability risk scores for the at least one service based on the one or more resource unavailability scores and the one or more resource replacement scores. A processor generates an indication of at-risk services of the at least one service.
    Type: Grant
    Filed: July 21, 2016
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Terry L. Keebaugh, Eric K. Watson
  • Publication number: 20190089603
    Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.
    Type: Application
    Filed: September 18, 2017
    Publication date: March 21, 2019
    Inventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
  • Publication number: 20180322289
    Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with user(s) authorized to initiate execution of command(s) to perform the task and with an authorized location. A requestor is determined to be in the authorized location by receiving verification from physical access control system(s). The requestor is determined to be logged into a first computer system at the authorized location and to have utilized the first computer system to request execution of one of the command(s). The requestor is determined to be remotely logged into a second computer system via the first computer system. The requestor is determined to be one of the authorized user(s) correlated with the task. Based in part on determining the requestor is one of the authorized user(s) subsequent to determining the requestor is remotely logged into the second computer system, the requested command is executed.
    Type: Application
    Filed: June 28, 2018
    Publication date: November 8, 2018
    Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
  • Patent number: 10116522
    Abstract: One or more processors compute a number of times that a string of text is identified within an online news feed. One or more processors compute a score for the string of text, at least in part, by multiplying the number of times the string of text is identified within the online news feed by a number representing a uniqueness of the string of text. In response to a determination that the score exceeds a first configurable threshold value, one or more processors generate an electronic notification. The electronic notification alerts of an anticipated change in one or more computer hardware capacity requirements of a networked computer system.
    Type: Grant
    Filed: February 12, 2016
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20180309669
    Abstract: A packet is analyzed at an outbound end of a tunnel from a first data network to determine whether the packet is directed to a first remote target in a first remote data network over a first tunnel or to a second remote target in a second remote data network over a second tunnel. A target address of the packet is present in both the first remote data network and the second remote data network. When the packet is to be directed to the first remote target in the first remote data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
  • Publication number: 20180309670
    Abstract: At an outbound end of a tunnel from a first data network, a packet is analyzed to determine whether the packet is to be directed to a local target in the first data network or to be sent over the tunnel to a remote target in a second data network. A target address of the packet is present in both the first data network and the second data network. When the packet is to be directed to the remote target in the second data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
  • Patent number: 10019578
    Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with command(s) to perform the task, and first and second computer system(s). Authorized user(s) utilize the first computer system(s) to remotely log into respective second computer system(s). A requestor utilizes a first computer system to make a request to execute one of the command(s). A second computer system is determined to be remotely logged into by the first computer system to receive the request. It is determined whether (a) the first computer system is one of the first computer system(s) correlated with the task and (b) the second computer system is one of the second computer system(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
  • Patent number: 10020993
    Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
  • Patent number: 9996576
    Abstract: A method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20180095730
    Abstract: An approach is provided in which an information handling system collects first service data records, from a first service provider, that correspond to first microservice runtime environments (MREs). Next, the information handling system collects second service data records corresponding to second microservice runtime environments (MREs) from a second service provider that is different from the first service provider. The information handling system then identifies an application that includes a first microservice and a second microservice. The first microservice executes on a selected one of the first MREs and the second microservice executes on a selected one of the second MREs.
    Type: Application
    Filed: December 6, 2017
    Publication date: April 5, 2018
    Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski, Artur Szczotka
  • Publication number: 20180077575
    Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
    Type: Application
    Filed: November 9, 2017
    Publication date: March 15, 2018
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Patent number: 9888378
    Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
    Type: Grant
    Filed: June 27, 2013
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20180034650
    Abstract: A method, and associated computer system and computer program product, for notifying users of events. A notification server that includes a computer receives a notification rule. The notification server generates, for the received notification rule, a unique identifier for communication using a predefined social networking service. The notification server receives an indication of an event that occurred in an event source. The notification server determines whether the received indication satisfies the notification rule. In response to determining that the received indication satisfies the notification rule, the notification server marks the received event, using the unique identifier and broadcasting the marked event using the social networking service for receipt by those users who have access to said unique identifier.
    Type: Application
    Filed: July 29, 2016
    Publication date: February 1, 2018
    Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski
  • Publication number: 20180026852
    Abstract: A processor receives service availability data for at least one service, where the service availability data indicates an amount time the at least one service was available and an amount of time one or more resources utilized in the service was available. A processor receives service configuration data for the service, where the service configuration data indicates one or more resource requirements of the at least one service. A processor determines one or more resource unavailability scores for the one or more resources utilized in providing the service. A processor determines one or more resource replacement scores for the one or more resources utilized in the service. A processor determines availability risk scores for the at least one service based on the one or more resource unavailability scores and the one or more resource replacement scores. A processor generates an indication of at-risk services of the at least one service.
    Type: Application
    Filed: July 21, 2016
    Publication date: January 25, 2018
    Inventors: Eric M. Anderson, Robert A. Davis, Terry L. Keebaugh, Eric K. Watson
  • Patent number: 9875086
    Abstract: An approach is provided in which an information handling system deploys a first microservice included in an application to a first microservice runtime environment (MRE). The information handling system receives a first set of performance metrics corresponding to a performance level of the first microservice in the first MRE, and receives a second set of performance metrics corresponding to a second MRE. Then, the information handling system determines that the first microservice will have a higher performance level in the second MRE than in the first MRE based on comparing the first set of performance metrics against the second set of performance metrics. As a result, the information handling system redeploys the first microservice from the first MRE to the second MRE.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: January 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski, Artur Szczotka
  • Patent number: 9858162
    Abstract: A method for dynamically assembling a mobile application includes the steps of: (i) receiving a first probability of a potential failure occurring within a first computing environment; (ii) comparing the first probability to a first threshold; (iii) automatically provisioning a first portion of a second computing environment in response to the first probability exceeding the first threshold; (iv) receiving a second probability of the potential failure occurring within the first computing environment; (v) comparing the second probability to a second threshold; and (vi) automatically provisioning a second portion of the second computing environment in response to the second probability exceeding the second threshold.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Robert A. Davis, Patti Foley
  • Patent number: 9852232
    Abstract: A method is disclosed for generating event trees. The method includes receiving one or more events occurring within a networked computing environment. The method includes generating an event tree including the received one or more events. The method includes comparing the generated event tree with a plurality of event trees stored in a database. The method then includes assigning, based, at least in part, on the comparing, a probability to the generated event tree.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
  • Patent number: 9767134
    Abstract: A method and/or computer program product locally manages configuration item (CI) information on CI systems. A request is received for authorized CI information that describes an authorized change to be made to a particular CI system. In response to receiving the request for the authorized CI information, a ticketing system searches a Configuration Management Database (CMDB) stub database for a location of a CI to be changed according to the authorized change to the particular CI system, where the CMDB stub database contains no CIs, and where the CMDB stub database contains a location of CI systems in which CIs are locally stored. One or more processors initiates the authorized change to the particular CI system requested by the request, and updates, by the particular CI system, the CI in the particular CI system to reflect the authorized change to the particular CI system.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: September 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Rajesh Radhakrishnan
  • Patent number: 9760362
    Abstract: In a method for determining a time to deploy and install patches one or more processors receive a request to deploy a patch by a target deployment time and install the patch by a target installation time, for at least one computing device of a plurality of computing devices on a network. The one or more processors determine a time frame to deploy the patch based on the target deployment time and availability of bandwidth on the network. The one or more processors determine a time to install the patch based on the target installation time and usage of the at least one computing device. The one or more processors cause the patch to be deployed within the determined time frame to deploy the patch. The one or more processors send an instruction to install the patch at the determined time to install the patch.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: September 12, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan, Guy I. T. Sidford
  • Publication number: 20170213033
    Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with command(s) to perform the task, and first and second computer system(s). Authorized user(s) utilize the first computer system(s) to remotely log into respective second computer system(s). A requestor utilizes a first computer system to make a request to execute one of the command(s). A second computer system is determined to be remotely logged into by the first computer system to receive the request. It is determined whether (a) the first computer system is one of the first computer system(s) correlated with the task and (b) the second computer system is one of the second computer system(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.
    Type: Application
    Filed: April 10, 2017
    Publication date: July 27, 2017
    Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan