Patents by Inventor Eric M. Anderson
Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170206128Abstract: A computer-implemented embodiment heals an information technology (IT) system. A cognitive computing hardware system receives an error history log that describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system and that have a history of experiencing one or more errors currently being detected in the IT system. The cognitive computing hardware system receives a record of real-time events, which are external to the IT system and which impact a performance of the alternative IT systems. The cognitive computing hardware system generates a prioritized set of solutions to overcome the one or more errors currently being detected in the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events.Type: ApplicationFiled: April 3, 2017Publication date: July 20, 2017Inventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, PATRICIA FOLEY
-
Patent number: 9690644Abstract: A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system.Type: GrantFiled: November 6, 2014Date of Patent: June 27, 2017Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 9665718Abstract: An approach is provided for controlling a task. A change ticket is received. A task to perform the change ticket is correlated with command(s) to perform the task, user(s) who are authorized to initiate execution of the command(s), and an authorized location to initiate the execution of the command(s). A request is made by a requestor to execute one of the command(s). It is determined whether (a) the requestor is currently located at the authorized location correlated with the task and (b) the requestor is one of the user(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.Type: GrantFiled: March 14, 2014Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
-
Publication number: 20170116091Abstract: A method for dynamically assembling a mobile application includes the steps of: (i) receiving a first probability of a potential failure occurring within a first computing environment; (ii) comparing the first probability to a first threshold; (iii) automatically provisioning a first portion of a second computing environment in response to the first probability exceeding the first threshold; (iv) receiving a second probability of the potential failure occurring within the first computing environment; (v) comparing the second probability to a second threshold; and (vi) automatically provisioning a second portion of the second computing environment in response to the second probability exceeding the second threshold.Type: ApplicationFiled: October 23, 2015Publication date: April 27, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric M. Anderson, Christopher J. Dawson, Robert A. Davis, Patti Foley
-
Patent number: 9471804Abstract: A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer system and intercepts the direct access. The interceptor application receives a request for the direct access to the computer system and determines whether the administrator requests for a new ticket. The interceptor application redirects the administrator to log onto the service management system for generating the new ticket by the service management system, in response to determining that the administrator requests for the new ticket or open tickets are not found. The interceptor application receives from the service management system the new ticket and grants the administrator the direct access to the computer system.Type: GrantFiled: April 8, 2015Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
-
Publication number: 20160188653Abstract: A method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.Type: ApplicationFiled: March 10, 2016Publication date: June 30, 2016Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
-
Publication number: 20160191319Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.Type: ApplicationFiled: March 8, 2016Publication date: June 30, 2016Inventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
-
Publication number: 20160164747Abstract: One or more processors compute a number of times that a string of text is identified within an online news feed. One or more processors compute a score for the string of text, at least in part, by multiplying the number of times the string of text is identified within the online news feed by a number representing a uniqueness of the string of text. In response to a determination that the score exceeds a first configurable threshold value, one or more processors generate an electronic notification. The electronic notification alerts of an anticipated change in one or more computer hardware capacity requirements of a networked computer system.Type: ApplicationFiled: February 12, 2016Publication date: June 9, 2016Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Publication number: 20160148143Abstract: A method and system for determining work ticket priority is provided. The method includes enabling a work ticket for a work assignment associated with an entity. The work ticket is assigned an initial priority value. Relevant data from multiple sources is associated with the work ticket and an updated priority value is requested. In response, multiple priority scores for the work ticket with respect to additional work tickets are published to an enterprise service bus (ESB) and an aggregate score for work ticket is calculated from the multiple priority scores.Type: ApplicationFiled: November 20, 2014Publication date: May 26, 2016Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 9344508Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.Type: GrantFiled: March 13, 2013Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
-
Publication number: 20160132372Abstract: A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system.Type: ApplicationFiled: November 6, 2014Publication date: May 12, 2016Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Patricia Foley
-
Patent number: 9336119Abstract: A method for monitoring information systems has been provided. The method includes analyzing at least one event data record of an information technology system to determine whether at least one target system of the information technology system has monitoring levels, trace levels, log levels, or snap shot levels which should be changed. The method further includes based on the analyzed instructing the at least one target system to change their monitoring levels, trace levels, log levels, or snap shot levels. The method further includes analyzing said monitoring levels, trace levels, log levels, or snap shot levels of the at least one target system to determine a cause of the at least one event data record.Type: GrantFiled: November 25, 2013Date of Patent: May 10, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
-
Patent number: 9330370Abstract: A computer-implemented method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.Type: GrantFiled: March 20, 2013Date of Patent: May 3, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
-
Patent number: 9299112Abstract: Program on a server computer generates a list having at least a string of plain text defined based on rules, wherein the rules also define a news feed of an electronic media source. The program code subscribes to the news feed. The program code computes a number of times the string of plain text is identified within the news feed, and a score for the string of plain text. Based on the score, the program code generates an electronic notification that alerts of an anticipated change in computer hardware capacity requirements for a build, support, and maintenance of a networked computer system. The program code estimates the requirements. Based on the score, the program code generates a request to adjust allocation of the computer hardware within the networked computer system to satisfy the requirements estimated. The program code sends the request generated to a client computer for viewing.Type: GrantFiled: June 4, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
-
Patent number: 9276943Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.Type: GrantFiled: October 25, 2013Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
-
Publication number: 20150278748Abstract: A method, system, and/or computer program product handles trouble tickets in a service unit. Friend members of a social network group to which a proxy Subject Matter Expert (SME) belongs are identified. Areas of expertise, which include expertise in a particular subject, that are held by the friend members of the social network group are identified, and then associated with the proxy SME. A trouble ticket related to the particular subject is received, and a primary SME that personally has a level of expertise to handle the trouble ticket is identified. In response to the primary SME being unavailable, the trouble ticket is transmitted to the proxy SME for handling by one or more of the friend members from the social network group to which the proxy SME belongs.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, RAJESH RADHAKRISHNAN
-
Publication number: 20150278279Abstract: A method and/or computer program product locally manages configuration item (CI) information on CI systems. A request is received for authorized CI information that describes an authorized change to be made to a particular CI system. In response to receiving the request for the authorized CI information, a ticketing system searches a Configuration Management Database (CMDB) stub database for a location of a CI to be changed according to the authorized change to the particular CI system, where the CMDB stub database contains no CIs, and where the CMDB stub database contains a location of CI systems in which CIs are locally stored. One or more processors initiates the authorized change to the particular CI system requested by the request, and updates, by the particular CI system, the CI in the particular CI system to reflect the authorized change to the particular CI system.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ERIC M. ANDERSON, ROBERT A. DAVIS, CHRISTOPHER J. DAWSON, RAJESH RADHAKRISHNAN
-
Publication number: 20150261956Abstract: An approach is provided for controlling a task. A change ticket is received. A task to perform the change ticket is correlated with command(s) to perform the task, user(s) who are authorized to initiate execution of the command(s), and an authorized location to initiate the execution of the command(s). A request is made by a requestor to execute one of the command(s). It is determined whether (a) the requestor is currently located at the authorized location correlated with the task and (b) the requestor is one of the user(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric M. Anderson, Heather M. Hinton, Rajesh Radhakrishnan
-
Publication number: 20150213287Abstract: A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer system and intercepts the direct access. The interceptor application receives a request for the direct access to the computer system and determines whether the administrator requests for a new ticket. The interceptor application redirects the administrator to log onto the service management system for generating the new ticket by the service management system, in response to determining that the administrator requests for the new ticket or open tickets are not found. The interceptor application receives from the service management system the new ticket and grants the administrator the direct access to the computer system.Type: ApplicationFiled: April 8, 2015Publication date: July 30, 2015Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
-
Publication number: 20150149826Abstract: A method for monitoring information systems has been provided. The method includes analyzing at least one event data record of an information technology system to determine whether at least one target system of the information technology system has monitoring levels, trace levels, log levels, or snap shot levels which should be changed. The method further includes based on the analyzed instructing the at least one target system to change their monitoring levels, trace levels, log levels, or snap shot levels. The method further includes analyzing said monitoring levels, trace levels, log levels, or snap shot levels of the at least one target system to determine a cause of the at least one event data record.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan