Patents by Inventor Gary D. Cudak

Gary D. Cudak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10831349
    Abstract: A method and apparatus are provided for implementing automated personalized, contextual alert displays. A display alert generator correlates user account information to web page advertisement images and text, and posts personalized reminders related to those images and text.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary D. Cudak, Christopher J. Hardee, Sarbajit K. Rakshit, Adam Roberts
  • Patent number: 10819607
    Abstract: A method includes obtaining component utilization data for multiple components of a compute node during at least one previous execution of a workload. The method further includes using the component utilization data to identify a first component having a utilization level that is less than a threshold utilization level during the at least one previous execution of the workload, wherein the first component is one of the multiple components of the compute node. The method still further includes, during a subsequent execution of the workload on the compute node, throttling the first component to prevent the first component from exceeding the threshold utilization level.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: October 27, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Srihari V. Angaluri, Gary D. Cudak, Ajay Dholakia, Chulho Kim
  • Patent number: 10810212
    Abstract: For validating information provided in a conversation, apparatus, methods, and program products are disclosed. The apparatus includes an association module that associates a plurality of items of caller identification data with a caller, an information module that identifies, using a speech recognition application, caller information from speech of the caller during a telephonic conversation with a call recipient, a comparison module that compares the plurality of items of caller identification data with the caller information, and a validation module that calculates a confidence score based on the comparison of the plurality of items of caller identification data with the caller information and presents, to the call recipient, the confidence score.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: October 20, 2020
    Inventors: Gary D. Cudak, Nathan J. Peterson, Amy L. Rose, Bryan L. Young, Jennifer J. Lee-Baron, John S. Crowe
  • Patent number: 10765041
    Abstract: Automatically cooling computer system components for safe servicing includes: determining that a target component of a plurality of components is to be serviced; and reducing temperature of one or more components of said plurality of components if such one or more components exceeds a threshold temperature and such one or more components are within a predefined area of the target component.
    Type: Grant
    Filed: May 7, 2019
    Date of Patent: September 1, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Jeffrey S. Holland, Bejoy J. Kochuparambil, Aparna Vallury
  • Patent number: 10701202
    Abstract: One method includes identifying driving conditions associated with a current location of a mobile communication device, receiving a notification to be output on the device, preventing the device from outputting the notification in response to identifying a first driving condition, and outputting the notification on the device in response to identifying a second driving condition. A second method includes identifying one or more driving conditions associated with a current location of a mobile communication device and calculating a driving hazard score as a function of the identified one or more driving conditions. The second method further includes receiving a notification to be output on the device, preventing the device from outputting the notification in response to the driving hazard score exceeding a first threshold value, and outputting the notification on the device in response to the driving hazard score being less than a second threshold value.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: June 30, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: John S. Crowe, Gary D. Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Amy L. Rose, Bryan L. Young
  • Patent number: 10694043
    Abstract: A method is provided for controlling access to a target device. The method comprises receiving, by the target device, primary input from a user or user device, wherein the primary input matches a predetermined input stored by the target device and authorizes the user or user device to access the target device. The method further comprises storing, by the target device, one or more wireless secondary signals that are detected by the target device during a time period in which the primary input is received. Still further, the method comprises allowing access to the target device in response to receiving the primary input, and then allowing access to the target device in response to subsequently receiving at least one of the one or more wireless secondary signals matching one or more of the stored wireless secondary signals in the absence of receiving the primary input.
    Type: Grant
    Filed: August 11, 2016
    Date of Patent: June 23, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Joseph F. Herman, J. Mark Weber
  • Patent number: 10678853
    Abstract: Embodiments include method, systems and computer program products for aligning visual content to search term queries. In some embodiments, one or more search terms may be received. A plurality of results may be obtained using the one or more search terms on metadata associated with preprocessed visual media. A subset of frames may be selected for each of the plurality of results. A search results set may be generated by optimizing the subset of frames for each of the plurality of results. The search results set may be transmitted.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: June 9, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
  • Patent number: 10673641
    Abstract: Apparatuses, methods, systems, and program products are disclosed for connecting to a conference device. A device module detects a client device within a short-range wireless communication distance of a conference device. The conference device is reservable for a conference and configured to present content received from the client device. A notification module that sends a notification to the client device in response to determining that the conference device is available. The notification invites the client device to connect to the conference device. A connection module connects the conference device to the client device in response to receiving a connection confirmation from the client device.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: June 2, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Amy L. Rose, John S. Crowe, Gary D. Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Bryan L. Young
  • Patent number: 10666065
    Abstract: An approach is provided that determines that power from at least one battery cell in a multi-battery cell configuration is not required to power the device based on a power requirement of the device. The approach then regulates voltages from the battery cells so that first set of the battery cells is shunted (0 v) and a second set of the battery cells is regulated with the voltage being set to one or more voltage levels to satisfy the power requirement.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: May 26, 2020
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: John S. Crowe, Gary D. Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Amy L. Rose, Bryan L. Young
  • Publication number: 20200160489
    Abstract: Methods and systems may provide for detecting a manual addition of first content to an interactive display and defining a content boundary around the first content. Additionally, a first automatic rescaling of the first content within the content boundary may be conducted in response to one or more of a manual modification of the first content or a trigger related to a characteristic of the first content. In one example, a manual reposition request is detected with respect to the first content, the first content is moved to a new position on the interactive display based on the reposition request, and a second automatic rescaling of the first content is conducted based on a state of second content that is adjacent to the new position.
    Type: Application
    Filed: January 27, 2020
    Publication date: May 21, 2020
    Inventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
  • Patent number: 10594862
    Abstract: Embodiments of the present invention provide a method, system and computer program product for context sensitive contact substitution for mobile communications. In an embodiment of the invention, a method for context sensitive contact substitution for mobile communications includes selecting a contact disposed within a list of contacts in memory of a mobile computing device for use in establishing a telephone call with the selected contact through the mobile computing device. The method also includes determining a context of the telephone call and identifying in the list of contacts an alternate contact to the selected contact based upon the determined context. In this regard, the context may be a location of the mobile computing device, or a time of day of establishing the telephone call, to name two examples. Finally, the method includes establishing the telephone call through the mobile computing device with the alternate contact instead of the selected contact.
    Type: Grant
    Filed: February 26, 2019
    Date of Patent: March 17, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, Christopher J. Hardee, Sarbajit K. Rakshit, Adam Roberts
  • Patent number: 10595086
    Abstract: A method, system, and or computer program product selects and displays keyframes for multiple video files on a graphical user interface (GUI). A first set of keyframes for a first video file and a second set of keyframes for a second video file are received and compared to one another. In response to determining that a keyframe from the first set of keyframes and a keyframe from the second set of keyframes are a duplicate keyframe, a new keyframe for the second video file is selected and displayed on the GUI to represent the second video file.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
  • Patent number: 10580115
    Abstract: Methods and systems may provide for detecting a manual addition of first content to an interactive display and defining a content boundary around the first content. Additionally, a first automatic rescaling of the first content within the content boundary may be conducted in response to one or more of a manual modification of the first content or a trigger related to a characteristic of the first content. In one example, a manual reposition request is detected with respect to the first content, the first content is moved to a new position on the interactive display based on the reposition request, and a second automatic rescaling of the first content is conducted based on a state of second content that is adjacent to the new position.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary D. Cudak, Lydia M. Do, Christopher J. Hardee, Adam Roberts
  • Patent number: 10552229
    Abstract: Systems and methods for determining placement of computing workloads within a network are disclosed. According to an aspect, a method includes determining one or more attributes of a computing workload to be placed within a network. The method also includes predicting interaction of the computing workload with one or more other computing workloads within the network based on the one or more attributes. Further, the method includes determining placement of the computing workload within the network based on the predicted interaction and a topology of the network.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 4, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Ajay Dholakia, John M. Petersen
  • Patent number: 10496845
    Abstract: Methods, apparatus, and computer program products for securing personally identifiable information include: identifying, present on a computer system, personally identifiable information (‘PII’); ranking the PII for a user identifiable by the PII; setting a time limit for the PII based on the rank; and responsive to the time limit elapsing, performing one or more actions to secure the PII.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: December 3, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: John S. Crowe, Gary D. Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Amy L. Rose, Bryan L. Young
  • Publication number: 20190361953
    Abstract: Embodiments of the present invention provide a method, system and computer program product for frequent content retrieval in a content browser. In an embodiment of the invention, a method for frequent content retrieval in a content browser is provided. The method includes retrieving requested content from a content server from over a computer communications network and comparing the retrieved requested content to a cached version of the requested content. The retrieved requested content thereafter can be annotated to visually emphasize a frequently accessed portion of the retrieved requested content in response to a threshold difference between the retrieved requested content and the cached version. Finally, the annotated retrieved requested content can be returned to a content browser for display therein.
    Type: Application
    Filed: August 6, 2019
    Publication date: November 28, 2019
    Inventors: Gary D. Cudak, Christopher J. Hardee, Randall C. Humes, Ruthie D. Lyle, Adam Roberts
  • Patent number: 10489163
    Abstract: An apparatus, method, and program product are disclosed for loading a program during boot of a device. A monitor module collects usage data for each of one or more programs executing on a device. The usage data for each program comprising an amount of time that the program was used and a schedule of when the program was used. A priority module assigns a boot priority to each of the one or more programs based on the amount of time that each program was used. A boot module selects one or more programs to load during a boot period for the device based on each program's usage schedule. The one or more selected programs are loaded according to each selected program's boot priority.
    Type: Grant
    Filed: June 6, 2016
    Date of Patent: November 26, 2019
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Jeffrey S. Holland, Shareef F. Alshinnawi, Gary D. Cudak
  • Patent number: 10449449
    Abstract: A computer identifies a group of players that are participating in a gaming session that is hosted by the computer. The computer identifies the location of an avatar of a first player included in the group of players. The computer identifies the location of a second avatar of a second player included in the group of players and determining the proximity between the first avatar and the second avatar. The computer determines if the proximity exceeds a threshold. Responsive to the determination that the proximity does not exceed the threshold, the computer sends data for the gaming session to the first player and the first player passes that data to the second player.
    Type: Grant
    Filed: June 18, 2013
    Date of Patent: October 22, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, Christopher J. Hardee, Randall C. Humes, Adam Roberts
  • Publication number: 20190303547
    Abstract: An apparatus for authorizing file access events includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to record hardware usage patterns prior to a file access event of a file, and correlate the hardware usage patterns with file access events targeting the file. The code is also executable to receive a file access event targeting the file, compare a hardware usage pattern preceding the received file access event targeting the file to the hardware usage patterns correlated with file access events targeting the file, and authorize the received file access event in response to the hardware usage pattern preceding the received file access event targeting the file matching a hardware usage pattern correlated to a file access event targeting the file.
    Type: Application
    Filed: April 3, 2018
    Publication date: October 3, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA
  • Publication number: 20190294782
    Abstract: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterizatio
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA