Patents by Inventor James A. Snitzer
James A. Snitzer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11539924Abstract: Multiple projector-enabled content targeting using diffraction grating is provided. A projector of a plurality of projectors in a display device is selected to project a particular color of a plurality of different colors at a predefined intensity to a content slot in a set of content slots via a corresponding diffraction grating to provide different content in full color images to respective viewers of a set of viewers at different viewing angles relative to the display device simultaneously. The different content is projected in the full color images to the respective viewers at the different viewing angles simultaneously using each particular projector of the plurality of projectors to project its particular color of the plurality of different colors at the predefined intensity to each particular content slot of the set of content slots via each corresponding diffraction grating.Type: GrantFiled: November 24, 2020Date of Patent: December 27, 2022Assignee: Kyndryl, Inc.Inventors: Matthew Mitchell Lobbes, Nathaniel J. Gibbs, Brian James Snitzer, Mike Treadway
-
Publication number: 20220166960Abstract: Multiple projector-enabled content targeting using diffraction grating is provided. A projector of a plurality of projectors in a display device is selected to project a particular color of a plurality of different colors at a predefined intensity to a content slot in a set of content slots via a corresponding diffraction grating to provide different content in full color images to respective viewers of a set of viewers at different viewing angles relative to the display device simultaneously. The different content is projected in the full color images to the respective viewers at the different viewing angles simultaneously using each particular projector of the plurality of projectors to project its particular color of the plurality of different colors at the predefined intensity to each particular content slot of the set of content slots via each corresponding diffraction grating.Type: ApplicationFiled: November 24, 2020Publication date: May 26, 2022Inventors: Matthew Mitchell Lobbes, Nathaniel J. Gibbs, Brian James Snitzer, Mike Treadway
-
Patent number: 11270670Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying a first user of a plurality of users; identifying a location for the first user; transmitting input of the first user to a server computing device; and simultaneously displaying multiple personalized, dynamic displays using diffraction grating based off of input of the first user and location of the first user.Type: GrantFiled: December 1, 2019Date of Patent: March 8, 2022Assignee: Kyndryl, Inc.Inventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Patent number: 11120040Abstract: Embodiments of the present invention describe an approve for ledger synchronization. Embodiments monitor conversations for keywords, and responsive to detecting the keywords, recording at least a portion of the conversations that includes the keywords. Additionally, embodiments store recorded conversation, based on the at least portion of the conversations that include the keywords, in a database, detect changes to ledgers, and determine authorization records is absent on the ledgers for the changes. Furthermore, embodiments, determine at least one of the stored conversations includes authorization records associated with the detected changes, retrieve the determined at least one of stored conversations, and synchronize the ledgers by creating a new block to the ledgers indicating authorization for the new block based on the determined at least one of stored conversations.Type: GrantFiled: March 26, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Brian James Snitzer, David Dwayne Weck, Brian M. O'Connell, Ann Corrao
-
Patent number: 11093610Abstract: Mitigating threats to container-based workloads is provided by a process that includes detecting an attack against a container hosting environment that includes active and reserve container pools. The attack poses a potential threat of contamination to hosted containers. Based on detecting the attack, the process identifies a time-to-contamination, taken as an amount of time for an active container of the active container pool to become contaminated as a result of the attack. The process provisions new containers into the reserve container pool at a determined rate that is based on the identified time-to-contamination, and continuously removes, from the active container pool, active containers servicing the workload and concurrently deploys reserve containers from the reserve container pool to the active container pool to replace the removed active containers and takeover servicing the workload.Type: GrantFiled: September 11, 2019Date of Patent: August 17, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathaniel J. Gibbs, Michael Treadway, Matthew Mitchell Lobbes, Brian James Snitzer
-
Patent number: 11042366Abstract: Managing container applications by providing a registry of managed container base images, each managed container base image wrapped to include an injection point, determining that a managed container base image includes a vulnerability, and creating a patch script to address the vulnerability. Managing container applications further includes inserting the patch script at the injection point and issuing a pull command for an application using the managed container base image, to a container orchestration tool.Type: GrantFiled: May 14, 2019Date of Patent: June 22, 2021Assignee: International Business Machines CorporationInventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Publication number: 20210166657Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying a first user of a plurality of users; identifying a location for the first user; transmitting input of the first user to a server computing device; and simultaneously displaying multiple personalized, dynamic displays using diffraction grating based off of input of the first user and location of the first user.Type: ApplicationFiled: December 1, 2019Publication date: June 3, 2021Inventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Publication number: 20210073379Abstract: Mitigating threats to container-based workloads is provided by a process that includes detecting an attack against a container hosting environment that includes active and reserve container pools. The attack poses a potential threat of contamination to hosted containers. Based on detecting the attack, the process identifies a time-to-contamination, taken as an amount of time for an active container of the active container pool to become contaminated as a result of the attack. The process provisions new containers into the reserve container pool at a determined rate that is based on the identified time-to-contamination, and continuously removes, from the active container pool, active containers servicing the workload and concurrently deploys reserve containers from the reserve container pool to the active container pool to replace the removed active containers and takeover servicing the workload.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: Nathaniel J. GIBBS, Michael Treadway, Matthew Mitchell LOBBES, Brian James Snitzer
-
Publication number: 20200364039Abstract: Managing container applications by providing a registry of managed container base images, each managed container base image wrapped to include an injection point, determining that a managed container base image includes a vulnerability, and creating a patch script to address the vulnerability. Managing container applications further includes inserting the patch script at the injection point and issuing a pull command for an application using the managed container base image, to a container orchestration tool.Type: ApplicationFiled: May 14, 2019Publication date: November 19, 2020Inventors: Nathaniel J. Gibbs, Matthew Mitchell Lobbes, Brian James Snitzer, Michael Treadway
-
Publication number: 20200311101Abstract: Embodiments of the present invention describe an approve for ledger synchronization. Embodiments monitor conversations for keywords, and responsive to detecting the keywords, recording at least a portion of the conversations that includes the keywords. Additionally, embodiments store recorded conversation, based on the at least portion of the conversations that include the keywords, in a database, detect changes to ledgers, and determine authorization records is absent on the ledgers for the changes. Furthermore, embodiments, determine at least one of the stored conversations includes authorization records associated with the detected changes, retrieve the determined at least one of stored conversations, and synchronize the ledgers by creating a new block to the ledgers indicating authorization for the new block based on the determined at least one of stored conversations.Type: ApplicationFiled: March 26, 2019Publication date: October 1, 2020Inventors: Brian James Snitzer, David Dwayne Weck, Brian M. O'Connell, Ann Corrao
-
Publication number: 20150032959Abstract: An approached is provided for monitoring data from a host machine running at least one virtual machine (VM); analyzing the monitored data from the host machine; conducting inferences from the analysis to determine a preferred size of a cache; and managing the cache size based upon the inferences for adapting the cache size on the host running the at least one VM.Type: ApplicationFiled: July 29, 2013Publication date: January 29, 2015Applicant: International Business Machines CorporationInventors: Manish Gupta, Brian James Snitzer
-
Patent number: 8161526Abstract: The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system.Type: GrantFiled: October 22, 2007Date of Patent: April 17, 2012Assignee: International Business Machines CorporationInventors: Ann Mead Corrao, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Patent number: 8126988Abstract: The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system.Type: GrantFiled: October 22, 2007Date of Patent: February 28, 2012Assignee: International Business Machines CorporationInventors: Ann Mead Corrao, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Patent number: 8121073Abstract: A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles.Type: GrantFiled: June 13, 2008Date of Patent: February 21, 2012Assignee: International Business Machines CorporationInventors: Ann Corrao, Gregg William Machovec, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Publication number: 20090310510Abstract: A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles.Type: ApplicationFiled: June 13, 2008Publication date: December 17, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ann Corrao, Gregg William Machovec, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Publication number: 20090113353Abstract: Illustrative embodiments provide a computer implemented method, data processing system and a computer program product for indicating the location of a cursor within an application to a user. In one illustrative embodiment the computer implemented method comprises initiating a monitoring service to generate collected information regarding the location of the cursor within the application and comparing the collected information with a set of respective predetermined values to create a set of compared values. Responsive to a determination based on the set of compared values, presenting a visual cue indicating the location of the cursor to the user.Type: ApplicationFiled: October 31, 2007Publication date: April 30, 2009Inventors: Ravi Prakash Bansal, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Publication number: 20090106664Abstract: The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system.Type: ApplicationFiled: October 22, 2007Publication date: April 23, 2009Inventors: Ann Mead Corrao, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Publication number: 20090106835Abstract: The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system.Type: ApplicationFiled: October 22, 2007Publication date: April 23, 2009Inventors: Ann Mead Corrao, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Publication number: 20090094277Abstract: A computer implemented method, a computer program product, and a mobile device are disclosed for presenting a list of invokable actions to a user of the mobile device. Responsive to identifying the commencing of the invokable action, specific attributes of the invokable action are identified and stored in a corresponding data structure. From the specific attributes stored within the corresponding data structure, a most probable invokable action is identified. When the commencing of a subsequent invokable action is identified, the most probable invokable action is presented to the user.Type: ApplicationFiled: October 3, 2007Publication date: April 9, 2009Inventors: Ann Mead Corrao, Brian Marshall O'Connell, Brian James Snitzer, Keith Raymond Walker
-
Patent number: RE41440Abstract: A method and system for gathering enriched web server activity data in a global communications network in which requested information files are cached at a plurality of network devices. With the prevalence of web caching on the Internet, the origin web servers do not serve the majority of requests for web site content. A single pixel clear Graphics Image Format (GIF) request is added to the HyperText Markup Language (HTML) source file for a web page. Appended to the GIF request is a Common Gateway Interface (CGI) string of data that contains enhanced web activity data information, including the number of images (“hits”) that have to be retrieved by a client browser to build the web page, and the referring identifier that resulted in access to the web page. The single pixel clear GIF request is not cacheable and results in the request being transmitted to the origin web server when the client browser interprets the HTML file.Type: GrantFiled: May 8, 2009Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: Paul Roger Briscoe, Cameron Donald Ferstat, Matthew Robert Ganis, Stephen Carl Hammer, Gary Bob Kip Hansen, Sean Alan Harp, Michael Shannon Nichols, Herbert Daniel Pearthree, Paul Reed, Brian James Snitzer