Patents by Inventor Eric M. Anderson

Eric M. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9038169
    Abstract: A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the administrator a request for the direct access to the managed computer system directly from the system console and requests a service management system to search open tickets. In response to that the open tickets are found, the at least one computer program requests the administrator to choose at least one ticket from the open tickets and grants the administrator the direct access to the computer system in response to determining that the at least one ticket is valid.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: May 19, 2015
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20150134601
    Abstract: A method is disclosed for generating event trees. The method includes receiving one or more events occurring within a networked computing environment. The method includes generating an event tree including the received one or more events. The method includes comparing the generated event tree with a plurality of event trees stored in a database. The method then includes assigning, based, at least in part, on the comparing, a probability to the generated event tree.
    Type: Application
    Filed: November 8, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan
  • Publication number: 20150121463
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Application
    Filed: October 25, 2013
    Publication date: April 30, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Publication number: 20150120908
    Abstract: In a data center, real-time, distributed administration of information describing dependency relationships among configuration items may be carried out. In such a data center, each configuration item is associated with an independent agent that is coupled to other agents and maintains a record of dependencies amongst the configuration item associated with the agent and other configuration items.
    Type: Application
    Filed: October 29, 2013
    Publication date: April 30, 2015
    Applicant: International Business Machines Corporation
    Inventors: ERIC M. ANDERSON, CHRISTOPHER J. DAWSON, RAJESH RADHAKRISHNAN, CAROL S. WALTON
  • Publication number: 20150089488
    Abstract: In a method for determining a time to deploy and install patches one or more processors receive a request to deploy a patch by a target deployment time and install the patch by a target installation time, for at least one computing device of a plurality of computing devices on a network. The one or more processors determine a time frame to deploy the patch based on the target deployment time and availability of bandwidth on the network. The one or more processors determine a time to install the patch based on the target installation time and usage of the at least one computing device. The one or more processors cause the patch to be deployed within the determined time frame to deploy the patch. The one or more processors send an instruction to install the patch at the determined time to install the patch.
    Type: Application
    Filed: September 26, 2013
    Publication date: March 26, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Rajesh Radhakrishnan, Guy I.T. Sidford
  • Publication number: 20150003320
    Abstract: Embodiments described herein provide approaches for associating a user identity to a wireless signal based on information received at an access point. Specifically, when a first user presents a set of user credentials to a physical access point, his/her profile is accessed to authenticate the first user. A set of wireless signals emanating from one or more wireless devices operated by the first user is also received at the physical access point and associated with the first user. Information about the first user may then be broadcast and accessed by a second user (e.g., via his/her mobile device) in proximity to the first user and in receipt of the set of wireless signals associated with the first user.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 1, 2015
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20140359010
    Abstract: Program on a server computer generates a list having at least a string of plain text defined based on rules, wherein the rules also define a news feed of an electronic media source. The program code subscribes to the news feed. The program code computes a number of times the string of plain text is identified within the news feed, and a score for the string of plain text. Based on the score, the program code generates an electronic notification that alerts of an anticipated change in computer hardware capacity requirements for a build, support, and maintenance of a networked computer system. The program code estimates the requirements. Based on the score, the program code generates a request to adjust allocation of the computer hardware within the networked computer system to satisfy the requirements estimated. The program code sends the request generated to a client computer for viewing.
    Type: Application
    Filed: June 4, 2013
    Publication date: December 4, 2014
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20140351408
    Abstract: Program code on a client computer receives an image of computer hardware and a unique identifier of the computer hardware. The program code generates a request that includes the unique identifier, a location of a client computer, and profile information of an end-user logged into the client computer. The program code sends the request to a server computer, and forwards a version of the request to an incident management system that in response to receiving the request extracts information associated to the computer hardware. The program code receives the information extracted, and forwards the information to the client computer. The program code overlays at least some of the information forwarded, onto the image of the computer hardware. The program code generates a map that displays on the screen of the client computer the image of the computer hardware overlaid with at least some of the information forwarded.
    Type: Application
    Filed: May 21, 2013
    Publication date: November 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric M. Anderson, Robert A. Davis, Christopher J. Dawson, Salvatore T. Lococo
  • Publication number: 20140289737
    Abstract: A computer-implemented method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks.
    Type: Application
    Filed: March 20, 2013
    Publication date: September 25, 2014
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Publication number: 20140280861
    Abstract: A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric M. Anderson, Nancy L. Bourne, Rajesh Radhakrishnan, Hemant J. Sharma
  • Publication number: 20140237588
    Abstract: A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the administrator a request for the direct access to the managed computer system directly from the system console and requests a service management system to search open tickets. In response to that the open tickets are found, the at least one computer program requests the administrator to choose at least one ticket from the open tickets and grants the administrator the direct access to the computer system in response to determining that the at least one ticket is valid.
    Type: Application
    Filed: February 19, 2013
    Publication date: August 21, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Patent number: 5427063
    Abstract: An internal combustion engine having at least one volume adjustable cylinder which automatically adjusts its compression ratio during operation. The volume adjustable cylinder includes a movable head insert placed inside the insert space formed on the engine head directly over the piston. An adjustable lock nut is used to attach the head insert to the engine head and to initially set the position of the head insert in the insert space to establish the initial volume of the combustion chamber of the cylinder. An O-ring made of elastomeric material is disposed between the head insert and the inside surface of the engine head which resists movment of the head insert in the insert space. When the engine operates at higher RPMs, the compression pressure increases inside the cylinder which forces the head insert into the insert space to expand the volume of the combustion chamber which, in turn, reduces the combustion pressure of the cylinder.
    Type: Grant
    Filed: August 30, 1994
    Date of Patent: June 27, 1995
    Inventor: Eric M. Anderson