Patents by Inventor James E. Carey

James E. Carey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180246799
    Abstract: Embodiments of the present invention provide a system, method, and program product for an abnormal timing breakpoints. A computer determines a code section, wherein the code section is part of computer code edited by a user. The computer determines an expected timeframe and an expected count for the code section, wherein the expected timeframe represents a predicted time to execute the code section, and wherein the expected execution count represent a predicted number of executions of the code section. The computer determines that an execution of the code section is abnormal based on one or more of: determining a current execution time is greater than the expected timeframe, and determining a current execution count is greater than the expected count. The computer halting the execution of the code section based on determining that the execution of the code section is abnormal and displays the abnormal code section.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: James E. Carey, Jim C. Chen, John M. Santosuosso
  • Publication number: 20180246800
    Abstract: Embodiments of the present invention provide a system, method, and program product for an abnormal timing breakpoints. A computer determines a code section, wherein the code section is part of computer code edited by a user. The computer determines an expected timeframe and an expected count for the code section, wherein the expected timeframe represents a predicted time to execute the code section, and wherein the expected execution count represent a predicted number of executions of the code section. The computer determines that an execution of the code section is abnormal based on one or more of: determining a current execution time is greater than the expected timeframe, and determining a current execution count is greater than the expected count. The computer halting the execution of the code section based on determining that the execution of the code section is abnormal and displays the abnormal code section.
    Type: Application
    Filed: September 21, 2017
    Publication date: August 30, 2018
    Inventors: James E. Carey, Jim C. Chen, John M. Santosuosso
  • Publication number: 20180232283
    Abstract: An approach is provided in which an information handling system retrieves a snapshot of a first service in response to determining that the first service has failed. The snapshot was captured at a point in time prior to the failure of the first service. The information handling system retrieves a log corresponding to the first service that includes a log entry of a message sent between the first service and a second service that was sent subsequent to the capturing of the snapshot. In turn, the information handling system restores the first service using the snapshot and the message.
    Type: Application
    Filed: February 13, 2017
    Publication date: August 16, 2018
    Inventors: Jay S. Bryant, James E. Carey, Zachary Hill, Kendall J. Nelson, Lucas A. Palm
  • Publication number: 20180225690
    Abstract: Embodiments of the present invention provide a method, system and computer program product for targeted discounting of products based upon cost of operation. In an embodiment of the invention, a method of providing a notification includes predicting i) a first cost of usage for a first product and ii) a second cost of usage for a second product. The method also includes determining a range of discount for the first product based, at least in part, on a comparison of the first usage cost and the second usage cost, and determining a discount for the first product that is included in the range of discount for the first product. Finally, the method includes sending, to a user, a notification that includes the discount for the first product based on a prediction that the discount for the first product is likely to result in the user purchasing the first product.
    Type: Application
    Filed: February 6, 2017
    Publication date: August 9, 2018
    Inventors: James E. Carey, Bryan M. Jones, Aditi Rajagopal, Ryan L. Rossiter
  • Publication number: 20180225457
    Abstract: A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device. In addition, the device may modify its functionality based on the mobile device being in an untrusted location or in physical proximity to an untrusted device.
    Type: Application
    Filed: February 4, 2017
    Publication date: August 9, 2018
    Inventors: Eric L. Barsness, Jay S. Bryant, James E. Carey, Joseph W. Cropper, John M. Santosuosso
  • Publication number: 20180225334
    Abstract: Disclosed aspects relate to window management in a stream computing environment to process a stream of tuples using a window of the stream computing environment. A set of tuples which corresponds to the window of the stream computing environment may be detected. The set of tuples may have a set of data. A confidence factor related to a set of expected result data for the set of tuples may be determined based on the set of data of the set of tuples. The set of tuples may correspond to the window of the stream computing environment. The window may be configured in the stream computing environment based on the confidence factor. The window may be configured in the stream computing environment to process the stream of tuples.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 9, 2018
    Inventors: James E. Carey, John M. Santosuosso
  • Publication number: 20180225191
    Abstract: In an approach to identifying program bugs, one or more computer processor detect a first crash in a try block. The one or more computer processors determine a catch block executed in response to the crash. The one or more computer processors collect a first set of environment information based on the catch block. The one or more computer processors create a first breakpoint where the first crash occurs. The one or more computer processors detect a second crash in the try block using a first pattern associated with the first crash based on the first set of environment information. The one or more computer processors collect a second set of environment information based on the catch block. The one or more computer processors create a second breakpoint where the second crash occurs.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 9, 2018
    Inventors: James E. Carey, Jim C. Chen, John M. Santosuosso
  • Publication number: 20180225335
    Abstract: Disclosed aspects relate to window management in a stream computing environment to process a stream of tuples using a window of the stream computing environment. A set of tuples which corresponds to the window of the stream computing environment may be detected. The set of tuples may have a set of data. A confidence factor related to a set of expected result data for the set of tuples may be determined based on the set of data of the set of tuples. The set of tuples may correspond to the window of the stream computing environment. The window may be configured in the stream computing environment based on the confidence factor. The window may be configured in the stream computing environment to process the stream of tuples.
    Type: Application
    Filed: April 13, 2018
    Publication date: August 9, 2018
    Inventors: James E. Carey, John M. Santosuosso
  • Publication number: 20180225336
    Abstract: Disclosed aspects relate to window management in a stream computing environment to process a stream of tuples using a window of the stream computing environment. A set of tuples which corresponds to the window of the stream computing environment may be detected. The set of tuples may have a set of data. A confidence factor related to a set of expected result data for the set of tuples may be determined based on the set of data of the set of tuples. The set of tuples may correspond to the window of the stream computing environment. The window may be configured in the stream computing environment based on the confidence factor. The window may be configured in the stream computing environment to process the stream of tuples.
    Type: Application
    Filed: April 13, 2018
    Publication date: August 9, 2018
    Inventors: James E. Carey, John M. Santosuosso
  • Publication number: 20180225456
    Abstract: A mobile device detects its location and other devices in proximity to the mobile device. When the device is in an untrusted location, or is in physical proximity to an untrusted device, the mobile device ensures existing security and authentication mechanisms are in place, and may additionally require enhanced security measures on the device. In addition, the device may modify its functionality based on the mobile device being in an untrusted location or in physical proximity to an untrusted device.
    Type: Application
    Filed: February 4, 2017
    Publication date: August 9, 2018
    Inventors: Eric L. Barsness, Jay S. Bryant, James E. Carey, Joseph W. Cropper, John M. Santosuosso
  • Patent number: 10042663
    Abstract: A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. The cloud manager provisions one or more virtual machines in a cloud with the specified streams infrastructure and streams application components. The streams manager then modifies the flow graph so one or more portions of the streaming application are hosted by the virtual machines in the cloud. When performance of the streaming application indicates a virtual machine is no longer needed, the virtual machine is maintained and placed in a ready state so it can be quickly used as needed in the future without the overhead of deploying a new virtual machine.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Lance Bragstad, Michael J. Branson, Bin Cao, James E. Carey, Mathew R. Odden
  • Patent number: 10042891
    Abstract: A stream computing application may be configured to manage the flow of tuples through a section of an operator graph. A window may be generated over one or more stream operators. The window may include breakpoint thresholds that set the maximum flow of tuples within the window. The stream operators within the window may be monitored to determine the flow of tuples occurring within the window using tuple flow counts. The tuple flow counts may be compared to the breakpoint thresholds to determine whether a breakpoint condition has occurred. If a breakpoint condition has occurred, a tuple flow change may be implemented to reduce the flow of tuples within the window.
    Type: Grant
    Filed: May 8, 2015
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael J. Branson, Jay S. Bryant, James E. Carey, John M. Santosuosso
  • Publication number: 20180210813
    Abstract: A method for debugging an executable is disclosed herein. The method begins by receiving one or more breakpoints related to a call stack in the executable. The processor receives an executable in a debug environment. The processor executes an executable until one or more breakpoints are hit. Upon detecting a breakpoint, the processor temporarily halts executing by transferring control to an analysis tool to gather information related to execution of the executable up to the breakpoint. The analysis tool gathers one or more predefined outliers. The processor receives control back from the analysis tool to continue execution in response to the analysis tool collecting relevant information in the executable.
    Type: Application
    Filed: January 24, 2017
    Publication date: July 26, 2018
    Inventors: Eric L. BARSNESS, Jay S. BRYANT, James E. CAREY, Joseph W. CROPPER, John M. SANTOSUOSSO
  • Publication number: 20180210812
    Abstract: A method for debugging and executable is disclosed herein. The method begins by receiving one or more breakpoints defining one or more attributes of a call stack in the executable. The processor receives the executable in a debug environment. The processor executes the executable in the debug environment. The processor halts execution of the executable upon detection of a breakpoint contained in the executable.
    Type: Application
    Filed: January 23, 2017
    Publication date: July 26, 2018
    Inventors: Eric L. BARSNESS, Jay S. BRYANT, James E. CAREY, Joseph W. CROPPER, John M. SANTOSUOSSO
  • Publication number: 20180203787
    Abstract: A method, executed by a computer, includes repeatedly collecting execution information for a code unit to produce collected execution information for the code unit, generating an execution profile for the code unit based on the collected execution information, comparing current execution information for the code unit with the execution profile, and informing a user if the current execution information does not conform to the execution profile. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: January 17, 2017
    Publication date: July 19, 2018
    Inventors: James E. Carey, Jim C. Chen, John M. Santosuosso
  • Publication number: 20180203789
    Abstract: A method for processing distributed breakpoints when debugging a distributed application includes establishing a breakpoint in source code of a distributed computer program and executing the distributed computer program. Thereafter, an encountering of the breakpoint is detected in one of the processes, and execution of the one of the processes halted. However, halting execution of any other of the processes is delayed for a delay period during which a list both is generated of others of the processes in which the breakpoint is encountered and also is sorted in accordance with prioritization criteria. Finally, the sorted list is presented after the lapse of the delay period, individual ones of the processes selected in the list, and execution of the selected individual ones of the processes in the sorted list halted while halting of execution of non-selected ones of the processes in the sorted list is bypassed.
    Type: Application
    Filed: January 17, 2017
    Publication date: July 19, 2018
    Inventors: Eric L. Barsness, Jay S. Bryant, James E. Carey, Joseph W. Cropper, John M. Santosuosso
  • Publication number: 20180203790
    Abstract: A method, executed by a computer, includes repeatedly collecting execution information for a code unit to produce collected execution information for the code unit, generating an execution profile for the code unit based on the collected execution information, comparing current execution information for the code unit with the execution profile, and informing a user if the current execution information does not conform to the execution profile. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: September 29, 2017
    Publication date: July 19, 2018
    Inventors: James E. Carey, Jim C. Chen, John M. Santosuosso
  • Patent number: 10025671
    Abstract: Determining a time for on-demand snapshotting of a virtual machine in a node prior to a failure point in a system comprising a plurality of nodes. Failure data is collected from a set of failed nodes of the plurality of nodes in a system. A failure pattern of the node is identified based on the failure data and monitoring the plurality of nodes for the failure pattern to determine that a first node of the plurality of nodes is exhibiting the failure pattern. Responsive to the determination that the first node is exhibiting the failure pattern, capturing a snapshot of a virtual machine corresponding to the first node.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jay S. Bryant, James E. Carey, Zachary A. Hill, Kendall J. Nelson, Lucas A. Palm
  • Patent number: 10019673
    Abstract: Text is received from a first client. The text is associated with an electronic communication tool for communication to a second client. Candidate answers are generated based on the text using a question answering system. The question answering system generates the candidate answers based on a plurality of data sources, including at least one personalized data source and at least one informational data source. At least one of the candidate answers is provided to the second client. Each of the candidate answers provided to the second client is selectable.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Corville O. Allen, James E. Carey, Jenny S. Li, John S. Mysak
  • Patent number: 10019672
    Abstract: Text is received from a first client. The text is associated with an electronic communication tool for communication to a second client. Candidate answers are generated based on the text using a question answering system. The question answering system generates the candidate answers based on a plurality of data sources, including at least one personalized data source and at least one informational data source. At least one of the candidate answers is provided to the second client. Each of the candidate answers provided to the second client is selectable.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Corville O. Allen, James E. Carey, Jenny S. Li, John S. Mysak