Patents by Inventor Gary David Cudak

Gary David Cudak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180275752
    Abstract: Apparatuses, methods, systems, and program products are disclosed for resizing interfaces based on eye gaze. A method includes tracking a user's eye gaze using an eye tracking sensor, determining, by a processor, that the user is looking at a pane of a multipane interface based on the user's eye gaze, and dynamically resizing the pane that the user is looking at in response to determining that the user is looking at the pane.
    Type: Application
    Filed: March 24, 2017
    Publication date: September 27, 2018
    Inventors: Nathan J. Peterson, Jennifer Lee-Baron, John Scott Crowe, Gary David Cudak, Amy Leigh Rose, Bryan Loyd Young
  • Patent number: 10063589
    Abstract: A method includes: deploying at least one shadow system in association with each of one or more components of a network environment; periodically recording a state map of each active component of the network environment and a corresponding state map of the shadow system(s) associated therewith; periodically comparing the recorded state map of each active component with the corresponding recorded state map of the shadow system(s) associated therewith; determining whether a deviation exists with respect to the recorded state map of each active component and the corresponding recorded state map of the shadow system(s) associated therewith; determining whether the deviation is greater than a predetermined deviation threshold; and declaring a security breach regarding the active component(s) for which the deviation was determined to be greater than the predetermined deviation threshold. Corresponding systems and computer program products are also disclosed.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: August 28, 2018
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Gary David Cudak, Ajay Dholakia, Scott Kelso, Fred Allison Bower, III
  • Publication number: 20180205812
    Abstract: Apparatuses, methods, systems, and program products are disclosed for delaying notification delivery based on user activity. A method includes detecting, by a processor, an external sound using a microphone, determining that the external sound comprises a message that is of interest to the user, and notifying the user of the message in response to determining that the message is of interest to the user.
    Type: Application
    Filed: January 16, 2017
    Publication date: July 19, 2018
    Inventors: Nathan J. Peterson, John Scott Crowe, Gary David Cudak, Jennifer Lee-Baron, Amy Leigh Rose, Bryan Loyd Young
  • Publication number: 20180121645
    Abstract: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.
    Type: Application
    Filed: November 2, 2016
    Publication date: May 3, 2018
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Publication number: 20180113638
    Abstract: According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to determine a write rate for the media storage device or a portion thereof based on one or more factors, the write rate ranging from zero to a maximum possible write rate for the media storage device or the portion thereof. The logic is also configured to cause the processor to receive a write request to write data to the media storage device or the portion thereof and write the data to the media storage device using the determined write rate. Other systems, methods, and computer program products for defending against ransomware attacks are presented according to more embodiments.
    Type: Application
    Filed: October 26, 2016
    Publication date: April 26, 2018
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Patent number: 9940156
    Abstract: An amount of a hardware resource is assigned to a virtual machine (VM) to be run on a computing device including the hardware resource. The VM is caused to run on the computing device, and usage of the hardware resource by the VM is monitor. In response to determining that the usage of the hardware resource by the VM is less than a threshold, the amount of the hardware resource assigned to the VM is decreased.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: April 10, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: John Scott Crowe, Gary David Cudak, Jennifer J. Lee-Baron, Nathan Peterson, Amy Leigh Rose, Bryan L. Young
  • Patent number: 9935931
    Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: April 3, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina
  • Publication number: 20180080263
    Abstract: For controlling vehicle egress, an apparatus is disclosed. A system, method, and program product also perform the functions of the apparatus. The apparatus includes a vehicle, a processor, a memory that stores code executable by the processor. The processor determines whether a supervised passenger is in the vehicle, locks a vehicle door in response to a supervised passenger being in the vehicle, and unlocks the vehicle door in response to the vehicle satisfying one or more predetermined destination criteria. The one or more predetermined destination criteria may include reaching a predetermined location and/or detecting a guardian of the supervised passenger in proximity to the vehicle.
    Type: Application
    Filed: September 22, 2016
    Publication date: March 22, 2018
    Inventors: Amy Leigh Rose, John Scott Crowe, Gary David Cudak, Jennifer Lee-Baron, Nathan J. Peterson, Bryan Lloyd Young
  • Patent number: 9917764
    Abstract: Network devices, like switches, selectively store network addresses of data packets received at their interfaces within forwarding tables. A management device determines workload devices related to a workload. The management device determines the network devices through which network traffic related to the workload among the workload devices traverses, and the network devices through which network traffic related to the workload among the workload devices does not traverse. The management device causes each network device to store or not store the network addresses of the workload devices depending on whether network traffic among the workload device traverses therethrough.
    Type: Grant
    Filed: January 22, 2016
    Date of Patent: March 13, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE., LTD.
    Inventors: Shareef Fathi Alshinnawi, Gary David Cudak, Joseph Francis Herman, John Mark Weber
  • Publication number: 20180067785
    Abstract: A computing device detects performance of a cut/copy action of data within a user interface of the computing device. In response to detecting the performance of the cut/copy action, the computing device determines a likely destination at which pasting of the data will occur, based on an attribute of the data, and an action related to pasting of the data at the likely destination, based on the attribute of the data. The computing device performs the action.
    Type: Application
    Filed: September 7, 2016
    Publication date: March 8, 2018
    Inventors: John Scott Crowe, Gary David Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young
  • Publication number: 20180061399
    Abstract: Speech recognition of a stream of spoken utterances is initiated. Thereafter, a spoken utterance stop event to stop the speech recognition is detected, such as in in relation to the stream. The spoken utterance stop event is other than a pause or cessation in the stream of spoken utterances. In response to the spoken utterance stop event being detected, the speech recognition of the stream of spoken utterances is stopped, while the stream of spoken utterances continues. After stopping the speech recognition of the stream of spoken utterances has been stopped, an action is caused to be performed that corresponds to the spoken utterances from a beginning of the stream through and until the spoken utterance stop event.
    Type: Application
    Filed: August 30, 2016
    Publication date: March 1, 2018
    Inventors: Amy Leigh Rose, John Scott Crowe, Gary David Cudak, Jennifer J. Lee-Baron, Nathan J. Peterson, Bryan L. Young
  • Publication number: 20180046243
    Abstract: A system includes storage devices storing data units. Each data unit is stored on one of the storage devices. The system includes a processor, and a non-transitory computer-readable data storage medium storing computer-executable code. The processor executes the code to correlate workloads to the data units with respect to which of the workloads access which of the data units, and when the workloads access the data units. The processor executes the code to when the workloads access the data units and/or and on which of the storage devices the data units are stored, so that at given times the data units stored on a subset of the storage devices are not being accessed by any workload. The processor executes the code to, during each given time, power off the subset of the storage devices storing the data units that are not being accessed by any workload to conserve power.
    Type: Application
    Filed: August 9, 2016
    Publication date: February 15, 2018
    Inventors: Gary David Cudak, John Scott Crowe, Jennifer J. Lee-Baron, Jason A. Matteson, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young
  • Publication number: 20170366490
    Abstract: In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to identify content in a message that is to altered, alter the content in the message, and provide at least a portion of the message to a recipient.
    Type: Application
    Filed: June 20, 2016
    Publication date: December 21, 2017
    Inventors: Amy Leigh Rose, Gary David Cudak, Bryan Loyd Young, Nathan J. Peterson, John Scott Crowe, Jennifer Lee-Baron
  • Publication number: 20170310700
    Abstract: A method includes: detecting a potential security breach associated with at least one component of a network environment; in response to detecting the potential security breach, determining a restorable state of the at least one component, wherein the restorable state is a state prior to the potential security breach; restoring the at least one component to the restorable state; and resuming operation of the at least one component of the network. Corresponding systems and computer program products are also disclosed.
    Type: Application
    Filed: April 20, 2016
    Publication date: October 26, 2017
    Inventors: Gary David Cudak, Ajay Dholakia, Scott Kelso, Fred Allison Bower, III
  • Publication number: 20170308154
    Abstract: One embodiment provides a method, including: receiving a command to modify a setting of a computer system, wherein the modification requires a power cycle to a processor; modifying, using a processor, the setting of the computer system based on the command; thereafter, placing the computer system in a sleeping state, wherein the sleep state removes power from the processor; and automatically waking up the computer system based on a wake up timer. Other aspects are described and claimed.
    Type: Application
    Filed: April 25, 2016
    Publication date: October 26, 2017
    Inventors: Bryan Loyd Young, Marc Richard Pamley, William Fred Keown, JR., John Scott Crowe, Amy Leigh Rose, Jennifer Lee-Baron, Nathan J. Peterson, Gary David Cudak
  • Publication number: 20170310701
    Abstract: A method includes: deploying at least one shadow system in association with each of one or more components of a network environment; periodically recording a state map of each active component of the network environment and a corresponding state map of the shadow system(S) associated therewith; periodically comparing the recorded state map of each active component with the corresponding recorded state map of the shadow system(s) associated therewith; determining whether a deviation exists with respect to the recorded state map of each active component and the corresponding recorded state map of the shadow system(s) associated therewith; determining whether the deviation is greater than a predetermined deviation threshold; and declaring a security breach regarding the active component(s) for which the deviation was determined to be greater than the predetermined deviation threshold. Corresponding systems and computer program products are also disclosed.
    Type: Application
    Filed: April 20, 2016
    Publication date: October 26, 2017
    Inventors: Gary David Cudak, Ajay Dholakia, Scott Kelso, Fred Allison Bower, III
  • Publication number: 20170289061
    Abstract: A computer program product includes a computer readable medium having computer readable program instructions configured to cause a processor to: track resource requirements for a workload deployed to a virtual environment; monitor one or more health characteristics of one or more systems of the virtual environment; determine whether one or more soft reservations corresponding to the workload should be created on one or more of the systems of the virtual environment; and in response to determining the one or more soft reservations corresponding to the workload should be created, creating the one or more soft reservations on the one or more of the systems of the virtual environment. The one or more of the systems of the virtual environment on which the one or more soft reservations are created are preferably different systems than the system to which the workload was originally deployed. Corresponding systems and methods are also disclosed.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Gary David Cudak, Nagananda Chumbalkar, Srihari Venkata Angaluri, Ajay Dholakia
  • Publication number: 20170289079
    Abstract: Systems, methods, and devices for adjusting content of communication between devices for concealing the content from others are disclosed. According to an aspect, a method may be implemented at a communications device including a user interface, a processor, and memory. The method includes receiving a communication for presentation on the communications device. Further, the method includes identifying at least one person located in proximity to the communications device. The method also includes determining a profile of a current user of the communications device. Further, the method includes adjusting content of the communication based on a comparison of a profile of the identified at least one person and the determined profile. The method also includes using the user interface to present the adjusted content to the current user.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Gary David Cudak, Shareef Fathi Alshinnawi, Jeffrey Scott Holland, Pradeep Ramineni
  • Publication number: 20170279844
    Abstract: Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining respective infrastructure topologies of a computing environment that changes over time, wherein the determining is performed by a computer system communicating with the computing environment. The method also includes: identifying, by the computer system, an intrusion event in the computing environment; determining, by the computer system, at-risk resources in the computing environment based on the determined intrusion event and a corresponding one of the infrastructure topologies; and performing, by the computer system, remediation action for the at-risk resources.
    Type: Application
    Filed: March 24, 2016
    Publication date: September 28, 2017
    Inventors: Fred Allison BOWER, III, Gary David CUDAK, Ajay DHOLAKIA, William Gavin HOLLAND, Scott KELSO
  • Publication number: 20170279825
    Abstract: A computer-implemented method includes receiving, by a computing device within a networking environment, a workload for execution within the networking environment; initiating, by the computing device, transfers of the workload to a plurality of network elements within the cloud networking environment; providing, by the computing device, tracking information of the workload as the workload traverses through the plurality of network elements; and storing or outputting, by the computing device, the tracking information regarding of the workload.
    Type: Application
    Filed: March 23, 2016
    Publication date: September 28, 2017
    Inventors: Fred Allison BOWER, III, Gary David CUDAK, Ajay DHOLAKIA, William Gavin HOLLAND, Scott KELSO