Patents by Inventor Eric M. Anderson
Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10257047Abstract: A processor receives service availability data for at least one service, where the service availability data indicates an amount time the at least one service was available and an amount of time one or more resources utilized in the service was available. A processor receives service configuration data for the service, where the service configuration data indicates one or more resource requirements of the at least one service. A processor determines one or more resource unavailability scores for the one or more resources utilized in providing the service. A processor determines one or more resource replacement scores for the one or more resources utilized in the service. A processor determines availability risk scores for the at least one service based on the one or more resource unavailability scores and the one or more resource replacement scores. A processor generates an indication of at-risk services of the at least one service.Type: GrantFiled: July 21, 2016Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Terry L. Keebaugh, Eric K. Watson
-
Publication number: 20190089603Abstract: Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.Type: ApplicationFiled: September 18, 2017Publication date: March 21, 2019Inventors: Szymon Harat, Michal Malczewski, Artur Szczotka, Eric M. Anderson
-
Publication number: 20180322289Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with user(s) authorized to initiate execution of command(s) to perform the task and with an authorized location. A requestor is determined to be in the authorized location by receiving verification from physical access control system(s). The requestor is determined to be logged into a first computer system at the authorized location and to have utilized the first computer system to request execution of one of the command(s). The requestor is determined to be remotely logged into a second computer system via the first computer system. The requestor is determined to be one of the authorized user(s) correlated with the task. Based in part on determining the requestor is one of the authorized user(s) subsequent to determining the requestor is remotely logged into the second computer system, the requested command is executed.Type: ApplicationFiled: June 28, 2018Publication date: November 8, 2018Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
-
Patent number: 10116522Abstract: One or more processors compute a number of times that a string of text is identified within an online news feed. One or more processors compute a score for the string of text, at least in part, by multiplying the number of times the string of text is identified within the online news feed by a number representing a uniqueness of the string of text. In response to a determination that the score exceeds a first configurable threshold value, one or more processors generate an electronic notification. The electronic notification alerts of an anticipated change in one or more computer hardware capacity requirements of a networked computer system.Type: GrantFiled: February 12, 2016Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Publication number: 20180309669Abstract: A packet is analyzed at an outbound end of a tunnel from a first data network to determine whether the packet is directed to a first remote target in a first remote data network over a first tunnel or to a second remote target in a second remote data network over a second tunnel. A target address of the packet is present in both the first remote data network and the second remote data network. When the packet is to be directed to the first remote target in the first remote data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Publication number: 20180309670Abstract: At an outbound end of a tunnel from a first data network, a packet is analyzed to determine whether the packet is to be directed to a local target in the first data network or to be sent over the tunnel to a remote target in a second data network. A target address of the packet is present in both the first data network and the second data network. When the packet is to be directed to the remote target in the second data network, an octet in the target address of the packet is changed from a first value to a second value, the changing forming a modified packet. When the second value is stored in the octet, the modified packet is caused to be sent to the tunnel for delivery to the second data network.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Susan A. Hearn, Linwood E. Loving, Martin G. Mclaughlin, Daniel R. Miller, John B. Simmons
-
Patent number: 10019578Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with command(s) to perform the task, and first and second computer system(s). Authorized user(s) utilize the first computer system(s) to remotely log into respective second computer system(s). A requestor utilizes a first computer system to make a request to execute one of the command(s). A second computer system is determined to be remotely logged into by the first computer system to receive the request. It is determined whether (a) the first computer system is one of the first computer system(s) correlated with the task and (b) the second computer system is one of the second computer system(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.Type: GrantFiled: April 10, 2017Date of Patent: July 10, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
-
Patent number: 10020993Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.Type: GrantFiled: March 8, 2016Date of Patent: July 10, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
-
Patent number: 9996576Abstract: A method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.Type: GrantFiled: March 10, 2016Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
-
Publication number: 20180095730Abstract: An approach is provided in which an information handling system collects first service data records, from a first service provider, that correspond to first microservice runtime environments (MREs). Next, the information handling system collects second service data records corresponding to second microservice runtime environments (MREs) from a second service provider that is different from the first service provider. The information handling system then identifies an application that includes a first microservice and a second microservice. The first microservice executes on a selected one of the first MREs and the second microservice executes on a selected one of the second MREs.Type: ApplicationFiled: December 6, 2017Publication date: April 5, 2018Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski, Artur Szczotka
-
Publication number: 20180077575Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.Type: ApplicationFiled: November 9, 2017Publication date: March 15, 2018Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Patent number: 9888378Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.Type: GrantFiled: June 27, 2013Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Publication number: 20180034650Abstract: A method, and associated computer system and computer program product, for notifying users of events. A notification server that includes a computer receives a notification rule. The notification server generates, for the received notification rule, a unique identifier for communication using a predefined social networking service. The notification server receives an indication of an event that occurred in an event source. The notification server determines whether the received indication satisfies the notification rule. In response to determining that the received indication satisfies the notification rule, the notification server marks the received event, using the unique identifier and broadcasting the marked event using the social networking service for receipt by those users who have access to said unique identifier.Type: ApplicationFiled: July 29, 2016Publication date: February 1, 2018Inventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski
-
Publication number: 20180026852Abstract: A processor receives service availability data for at least one service, where the service availability data indicates an amount time the at least one service was available and an amount of time one or more resources utilized in the service was available. A processor receives service configuration data for the service, where the service configuration data indicates one or more resource requirements of the at least one service. A processor determines one or more resource unavailability scores for the one or more resources utilized in providing the service. A processor determines one or more resource replacement scores for the one or more resources utilized in the service. A processor determines availability risk scores for the at least one service based on the one or more resource unavailability scores and the one or more resource replacement scores. A processor generates an indication of at-risk services of the at least one service.Type: ApplicationFiled: July 21, 2016Publication date: January 25, 2018Inventors: Eric M. Anderson, Robert A. Davis, Terry L. Keebaugh, Eric K. Watson
-
Patent number: 9875086Abstract: An approach is provided in which an information handling system deploys a first microservice included in an application to a first microservice runtime environment (MRE). The information handling system receives a first set of performance metrics corresponding to a performance level of the first microservice in the first MRE, and receives a second set of performance metrics corresponding to a second MRE. Then, the information handling system determines that the first microservice will have a higher performance level in the second MRE than in the first MRE based on comparing the first set of performance metrics against the second set of performance metrics. As a result, the information handling system redeploys the first microservice from the first MRE to the second MRE.Type: GrantFiled: September 29, 2016Date of Patent: January 23, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Szymon W. Harat, Michal P. Malczewski, Artur Szczotka
-
Patent number: 9858162Abstract: A method for dynamically assembling a mobile application includes the steps of: (i) receiving a first probability of a potential failure occurring within a first computing environment; (ii) comparing the first probability to a first threshold; (iii) automatically provisioning a first portion of a second computing environment in response to the first probability exceeding the first threshold; (iv) receiving a second probability of the potential failure occurring within the first computing environment; (v) comparing the second probability to a second threshold; and (vi) automatically provisioning a second portion of the second computing environment in response to the second probability exceeding the second threshold.Type: GrantFiled: October 23, 2015Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Robert A. Davis, Patti Foley
-
Patent number: 9852232Abstract: A method is disclosed for generating event trees. The method includes receiving one or more events occurring within a networked computing environment. The method includes generating an event tree including the received one or more events. The method includes comparing the generated event tree with a plurality of event trees stored in a database. The method then includes assigning, based, at least in part, on the comparing, a probability to the generated event tree.Type: GrantFiled: November 8, 2013Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
-
Patent number: 9767134Abstract: A method and/or computer program product locally manages configuration item (CI) information on CI systems. A request is received for authorized CI information that describes an authorized change to be made to a particular CI system. In response to receiving the request for the authorized CI information, a ticketing system searches a Configuration Management Database (CMDB) stub database for a location of a CI to be changed according to the authorized change to the particular CI system, where the CMDB stub database contains no CIs, and where the CMDB stub database contains a location of CI systems in which CIs are locally stored. One or more processors initiates the authorized change to the particular CI system requested by the request, and updates, by the particular CI system, the CI in the particular CI system to reflect the authorized change to the particular CI system.Type: GrantFiled: April 1, 2014Date of Patent: September 19, 2017Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Rajesh Radhakrishnan
-
Patent number: 9760362Abstract: In a method for determining a time to deploy and install patches one or more processors receive a request to deploy a patch by a target deployment time and install the patch by a target installation time, for at least one computing device of a plurality of computing devices on a network. The one or more processors determine a time frame to deploy the patch based on the target deployment time and availability of bandwidth on the network. The one or more processors determine a time to install the patch based on the target installation time and usage of the at least one computing device. The one or more processors cause the patch to be deployed within the determined time frame to deploy the patch. The one or more processors send an instruction to install the patch at the determined time to install the patch.Type: GrantFiled: September 26, 2013Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan, Guy I. T. Sidford
-
Publication number: 20170213033Abstract: An approach is provided for controlling a task to perform a change ticket. The task is correlated with command(s) to perform the task, and first and second computer system(s). Authorized user(s) utilize the first computer system(s) to remotely log into respective second computer system(s). A requestor utilizes a first computer system to make a request to execute one of the command(s). A second computer system is determined to be remotely logged into by the first computer system to receive the request. It is determined whether (a) the first computer system is one of the first computer system(s) correlated with the task and (b) the second computer system is one of the second computer system(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.Type: ApplicationFiled: April 10, 2017Publication date: July 27, 2017Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan