Patents by Inventor Gary David Cudak

Gary David Cudak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170279825
    Abstract: A computer-implemented method includes receiving, by a computing device within a networking environment, a workload for execution within the networking environment; initiating, by the computing device, transfers of the workload to a plurality of network elements within the cloud networking environment; providing, by the computing device, tracking information of the workload as the workload traverses through the plurality of network elements; and storing or outputting, by the computing device, the tracking information regarding of the workload.
    Type: Application
    Filed: March 23, 2016
    Publication date: September 28, 2017
    Inventors: Fred Allison BOWER, III, Gary David CUDAK, Ajay DHOLAKIA, William Gavin HOLLAND, Scott KELSO
  • Publication number: 20170279844
    Abstract: Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining respective infrastructure topologies of a computing environment that changes over time, wherein the determining is performed by a computer system communicating with the computing environment. The method also includes: identifying, by the computer system, an intrusion event in the computing environment; determining, by the computer system, at-risk resources in the computing environment based on the determined intrusion event and a corresponding one of the infrastructure topologies; and performing, by the computer system, remediation action for the at-risk resources.
    Type: Application
    Filed: March 24, 2016
    Publication date: September 28, 2017
    Inventors: Fred Allison BOWER, III, Gary David CUDAK, Ajay DHOLAKIA, William Gavin HOLLAND, Scott KELSO
  • Publication number: 20170249560
    Abstract: After first installation of an application program on a computing device, the computing devices monitors a behavior of the application program for a period of time and then builds a behavior profile of the application program from the behavior. After the period of time has elapsed, such as specified period of time, the computing device may prevent the application program from deviating from the behavior profile. After the period of time has elapsed, such as when an update or patch to the application program has been applied or installed, the computing device may continue to monitor the behavior of the application program, and in response to determining that the behavior of the application program after the period of time deviates from the behavior profile, perform an action with respect to the application program.
    Type: Application
    Filed: February 26, 2016
    Publication date: August 31, 2017
    Inventors: Gary David Cudak, John Scott Crowe, Jennifer J. Lee-Baron, Nathan J. Peterson, Amy Leigh Rose, Bryan L. Young
  • Publication number: 20170250864
    Abstract: A method includes: determining a configuration of one or more networked hardware components; determining a usage level associated with one or more of the networked hardware components; determining a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of: outputting a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and configuring of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. Corresponding systems and computer program products are also disclosed.
    Type: Application
    Filed: February 25, 2016
    Publication date: August 31, 2017
    Inventors: Shareef Fathi Alshinnawi, Gary David Cudak, John Mark Weber, Joseph Francis Herman
  • Publication number: 20170220366
    Abstract: An amount of a hardware resource is assigned to a virtual machine (VM) to be run on a computing device including the hardware resource. The VM is caused to run on the computing device, and usage of the hardware resource by the VM is monitor. In response to determining that the usage of the hardware resource by the VM is less than a threshold, the amount of the hardware resource assigned to the VM is decreased.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: John Scott Crowe, Gary David Cudak, Jennifer J. Lee-Baron, Nathan Peterson, Amy Leigh Rose, Bryan L. Young
  • Publication number: 20170214602
    Abstract: Network devices, like switches, selectively store network addresses of data packets received at their interfaces within forwarding tables. A management device determines workload devices related to a workload. The management device determines the network devices through which network traffic related to the workload among the workload devices traverses, and the network devices through which network traffic related to the workload among the workload devices does not traverse. The management device causes each network device to store or not store the network addresses of the workload devices depending on whether network traffic among the workload device traverses therethrough.
    Type: Application
    Filed: January 22, 2016
    Publication date: July 27, 2017
    Inventors: Shareef Fathi Alshinnawi, Gary David Cudak, Joseph Francis Herman, John Mark Weber
  • Publication number: 20170171176
    Abstract: A set of maintenance-related actions for a computing device is determined. The actions are performed to diagnose, repair, and/or maintain the computing device. The actions can be determined by automatically determining the actions based on diagnostic and/or predictive data regarding the computing device, and/or by permitting an administrator to specify the actions. A maintenance credential for the computing device, such as a digital key, is created, and the set of actions is associated with the maintenance credential. Access to the computing device via the maintenance credential results in just the set of actions being performable at the computing device. The maintenance action can be securely provided to maintenance personnel when the computing device requires repair and/or maintenance, so that the device can be diagnosed, repaired and/or maintained without compromising security of the computing device.
    Type: Application
    Filed: December 11, 2015
    Publication date: June 15, 2017
    Inventors: Srihari Venkata Angaluri, Gary David Cudak, Ajay Dholakia, Chulho Kim, James Steven Worley
  • Publication number: 20170171263
    Abstract: A computing device determines a collaboration event in which users are participating. For instance, the users' computing devices may be located within a same location, the users' communication devices may be currently engaging in a common communication session, or calendar entries of the users' calendars may indicate that they are currently participating in a common session. The computing device determines data related to the collaboration event, and may filter this data to yield the data most related to the collaboration event. The computing device provides the data related to the collaboration event to at least one of the users participating in the collaboration event.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Gary David Cudak, Joseph Francis Herman, William James Sommerville, Laura Ann Weaver
  • Publication number: 20170163813
    Abstract: In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to receive at least one audio signal, identify one or more of a user associated with at least one received audio signal and a location of the user, and modify at least one received audio signal based at least in part on identification of one or more of the user and the location.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 8, 2017
    Inventors: Bryan Loyd Young, Gary David Cudak, John Scott Crowe, Jennifer Lee-Baron, Amy Leigh Rose, Nathan J. Peterson
  • Publication number: 20170139553
    Abstract: Apparatuses, systems, methods, and program products are disclosed for context-based program selection. A resource module receives a resource selection. A characteristic module determines at least one characteristic of the resource. The at least one characteristic includes either content within the resource and/or metadata associated with the resource. A program module selects a program to open the resource based on the at least one characteristic of the resource.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 18, 2017
    Inventors: Amy Leigh Rose, John Scott Crowe, Gary David Cudak, Jennifer Lee-Baron, Nathan J. Peterson, Bryan Loyd Young
  • Patent number: 9635638
    Abstract: A computing device determines responsiveness of a user to notification sounds output by the computing device, by determining whether for each notification sound the user acknowledged a notification corresponding to the notification sound on the computing device. The computing device can determine characteristics of the notification sounds output by the computing device. The computing device recommends suggested notification sounds that promote user acknowledgment to notifications, for use in relation to future notifications. The computing device may determine other notification sounds that share the characteristics of the notification sounds for which the user acknowledged the notifications corresponding to the notification sounds on the computing device. The suggested notification sounds can include the other notification sounds, and/or the notification sounds output by the computing device for which the user acknowledged the notifications corresponding to the notification sounds on the computing device.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: April 25, 2017
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Jennifer Lynn Burlingham, Gary David Cudak, Joseph Francis Herman, James Ray Lee, John M. Weber
  • Publication number: 20170093831
    Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.
    Type: Application
    Filed: September 28, 2015
    Publication date: March 30, 2017
    Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
  • Publication number: 20170093356
    Abstract: One embodiment provides a method, including: detecting, using a processor, a presence of a known device within a predetermined range; and adjusting, using the processor, an audio output volume based on the presence of the known device. Other aspects are described and claimed.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Gary David Cudak, Nathan J. Peterson, Amy Leigh Rose, Jennifer Lee-Baron, John Scott Crowe, Bryan Loyd Young