Patents by Inventor Eric M. Anderson

Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170206128
    Abstract: A computer-implemented embodiment heals an information technology (IT) system. A cognitive computing hardware system receives an error history log that describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system and that have a history of experiencing one or more errors currently being detected in the IT system. The cognitive computing hardware system receives a record of real-time events, which are external to the IT system and which impact a performance of the alternative IT systems. The cognitive computing hardware system generates a prioritized set of solutions to overcome the one or more errors currently being detected in the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events.
    Type: Application
    Filed: April 3, 2017
    Publication date: July 20, 2017
    Inventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, PATRICIA FOLEY
  • Patent number: 9690644
    Abstract: A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system.
    Type: Grant
    Filed: November 6, 2014
    Date of Patent: June 27, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
  • Patent number: 9665718
    Abstract: An approach is provided for controlling a task. A change ticket is received. A task to perform the change ticket is correlated with command(s) to perform the task, user(s) who are authorized to initiate execution of the command(s), and an authorized location to initiate the execution of the command(s). A request is made by a requestor to execute one of the command(s). It is determined whether (a) the requestor is currently located at the authorized location correlated with the task and (b) the requestor is one of the user(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: May 30, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
  • Publication number: 20170116091
    Abstract: A method for dynamically assembling a mobile application includes the steps of: (i) receiving a first probability of a potential failure occurring within a first computing environment; (ii) comparing the first probability to a first threshold; (iii) automatically provisioning a first portion of a second computing environment in response to the first probability exceeding the first threshold; (iv) receiving a second probability of the potential failure occurring within the first computing environment; (v) comparing the second probability to a second threshold; and (vi) automatically provisioning a second portion of the second computing environment in response to the second probability exceeding the second threshold.
    Type: Application
    Filed: October 23, 2015
    Publication date: April 27, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric M. Anderson, Christopher J. Dawson, Robert A. Davis, Patti Foley
  • Patent number: 9471804
    Abstract: A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer system and intercepts the direct access. The interceptor application receives a request for the direct access to the computer system and determines whether the administrator requests for a new ticket. The interceptor application redirects the administrator to log onto the service management system for generating the new ticket by the service management system, in response to determining that the administrator requests for the new ticket or open tickets are not found. The interceptor application receives from the service management system the new ticket and grants the administrator the direct access to the computer system.
    Type: Grant
    Filed: April 8, 2015
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20160188653
    Abstract: A method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.
    Type: Application
    Filed: March 10, 2016
    Publication date: June 30, 2016
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20160191319
    Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.
    Type: Application
    Filed: March 8, 2016
    Publication date: June 30, 2016
    Inventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
  • Publication number: 20160164747
    Abstract: One or more processors compute a number of times that a string of text is identified within an online news feed. One or more processors compute a score for the string of text, at least in part, by multiplying the number of times the string of text is identified within the online news feed by a number representing a uniqueness of the string of text. In response to a determination that the score exceeds a first configurable threshold value, one or more processors generate an electronic notification. The electronic notification alerts of an anticipated change in one or more computer hardware capacity requirements of a networked computer system.
    Type: Application
    Filed: February 12, 2016
    Publication date: June 9, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20160148143
    Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.
    Type: Application
    Filed: November 20, 2014
    Publication date: May 26, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
  • Patent number: 9344508
    Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 17, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
  • Publication number: 20160132372
    Abstract: A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
  • Patent number: 9336119
    Abstract: A method for monitoring information systems has been provided. The method includes analyzing at least one event data record of an information technology system to determine whether at least one target system of the information technology system has monitoring levels, trace levels, log levels, or snap shot levels which should be changed. The method further includes based on the analyzed instructing the at least one target system to change their monitoring levels, trace levels, log levels, or snap shot levels. The method further includes analyzing said monitoring levels, trace levels, log levels, or snap shot levels of the at least one target system to determine a cause of the at least one event data record.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: May 10, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
  • Patent number: 9330370
    Abstract: A computer-implemented method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.
    Type: Grant
    Filed: March 20, 2013
    Date of Patent: May 3, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Patent number: 9299112
    Abstract: Program on a server computer generates a list having at least a string of plain text defined based on rules, wherein the rules also define a news feed of an electronic media source. The program code subscribes to the news feed. The program code computes a number of times the string of plain text is identified within the news feed, and a score for the string of plain text. Based on the score, the program code generates an electronic notification that alerts of an anticipated change in computer hardware capacity requirements for a build, support, and maintenance of a networked computer system. The program code estimates the requirements. Based on the score, the program code generates a request to adjust allocation of the computer hardware within the networked computer system to satisfy the requirements estimated. The program code sends the request generated to a client computer for viewing.
    Type: Grant
    Filed: June 4, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Patent number: 9276943
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Publication number: 20150278748
    Abstract: A method, system, and/or computer program product handles trouble tickets in a service unit. Friend members of a social network group to which a proxy Subject Matter Expert (SME) belongs are identified. Areas of expertise, which include expertise in a particular subject, that are held by the friend members of the social network group are identified, and then associated with the proxy SME. A trouble ticket related to the particular subject is received, and a primary SME that personally has a level of expertise to handle the trouble ticket is identified. In response to the primary SME being unavailable, the trouble ticket is transmitted to the proxy SME for handling by one or more of the friend members from the social network group to which the proxy SME belongs.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, RAJESH RADHAKRISHNAN
  • Publication number: 20150278279
    Abstract: A method and/or computer program product locally manages configuration item (CI) information on CI systems. A request is received for authorized CI information that describes an authorized change to be made to a particular CI system. In response to receiving the request for the authorized CI information, a ticketing system searches a Configuration Management Database (CMDB) stub database for a location of a CI to be changed according to the authorized change to the particular CI system, where the CMDB stub database contains no CIs, and where the CMDB stub database contains a location of CI systems in which CIs are locally stored. One or more processors initiates the authorized change to the particular CI system requested by the request, and updates, by the particular CI system, the CI in the particular CI system to reflect the authorized change to the particular CI system.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, RAJESH RADHAKRISHNAN
  • Publication number: 20150261956
    Abstract: An approach is provided for controlling a task. A change ticket is received. A task to perform the change ticket is correlated with command(s) to perform the task, user(s) who are authorized to initiate execution of the command(s), and an authorized location to initiate the execution of the command(s). A request is made by a requestor to execute one of the command(s). It is determined whether (a) the requestor is currently located at the authorized location correlated with the task and (b) the requestor is one of the user(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
  • Publication number: 20150213287
    Abstract: A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer system and intercepts the direct access. The interceptor application receives a request for the direct access to the computer system and determines whether the administrator requests for a new ticket. The interceptor application redirects the administrator to log onto the service management system for generating the new ticket by the service management system, in response to determining that the administrator requests for the new ticket or open tickets are not found. The interceptor application receives from the service management system the new ticket and grants the administrator the direct access to the computer system.
    Type: Application
    Filed: April 8, 2015
    Publication date: July 30, 2015
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20150149826
    Abstract: A method for monitoring information systems has been provided. The method includes analyzing at least one event data record of an information technology system to determine whether at least one target system of the information technology system has monitoring levels, trace levels, log levels, or snap shot levels which should be changed. The method further includes based on the analyzed instructing the at least one target system to change their monitoring levels, trace levels, log levels, or snap shot levels. The method further includes analyzing said monitoring levels, trace levels, log levels, or snap shot levels of the at least one target system to determine a cause of the at least one event data record.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan