Patents by Inventor James S. Watt, JR.
James S. Watt, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11848907Abstract: In some examples, a computing device may receive, from an email server, an email rule comprising conditions and actions and determine a subset of archived emails stored on the computing device that satisfy the conditions. The computing device may perform the actions to the subset of archived emails, such as placing a legal hold on the subset of archived emails, creating and sending copies of the subset of archived emails to the email server, or deleting, from the computing device, the subset of archived emails. After determining that a user is attempting to perform a prohibited action on (e.g., delete, edit, forward) an email of the subset of archived emails, the computing device may perform a protective action, such as logging the user out of an email account, preventing the user from logging in to the email account, automatically sending an email to an administrator or the like.Type: GrantFiled: September 23, 2022Date of Patent: December 19, 2023Assignee: Dell Products L.P.Inventors: Sathish Kumar Bikumala, Bijan Kumar Mohanty, James S. Watt, Jr.
-
Publication number: 20230013262Abstract: In some examples, a computing device may receive, from an email server, an email rule comprising conditions and actions and determine a subset of archived emails stored on the computing device that satisfy the conditions. The computing device may perform the actions to the subset of archived emails, such as placing a legal hold on the subset of archived emails, creating and sending copies of the subset of archived emails to the email server, or deleting, from the computing device, the subset of archived emails. After determining that a user is attempting to perform a prohibited action on (e.g., delete, edit, forward) an email of the subset of archived emails, the computing device may perform a protective action, such as logging the user out of an email account, preventing the user from logging in to the email account, automatically sending an email to an administrator or the like.Type: ApplicationFiled: September 23, 2022Publication date: January 19, 2023Applicant: Dell Products L.P.Inventors: Sathish Kumar Bikumala, Bijan Kumar Mohanty, James S. Watt, JR.
-
Patent number: 11489805Abstract: In some examples, a computing device may receive, from an email server, an email rule comprising conditions and actions and determine a subset of archived emails stored on the computing device that satisfy the conditions. The computing device may perform the actions to the subset of archived emails, such as placing a legal hold on the subset of archived emails, creating and sending copies of the subset of archived emails to the email server, or deleting, from the computing device, the subset of archived emails. After determining that a user is attempting to perform a prohibited action on (e.g., delete, edit, forward) an email of the subset of archived emails, the computing device may perform a protective action, such as logging the user out of an email account, preventing the user from logging in to the email account, automatically sending an email to an administrator or the like.Type: GrantFiled: October 1, 2019Date of Patent: November 1, 2022Assignee: Dell Products L.P.Inventors: Sathish Kumar Bikumala, Bijan Kumar Mohanty, James S. Watt, Jr.
-
Patent number: 11429793Abstract: A system, method, and computer-readable medium are disclosed for improved audio collection of website ambient data. In various embodiments, when a user visits a website, audio data is collected during a website browsing session. The audio data is converted to text by Natural Language Processing (NLP) enabled device used for browsing. From the text, certain key words are identified that are relevant to a business. The identified key words can be analyzed per requirements of the business.Type: GrantFiled: May 28, 2019Date of Patent: August 30, 2022Assignee: Dell Products L.P.Inventors: James S. Watt, Jr., Someshwar Mukherjee
-
Publication number: 20210334729Abstract: In some examples, a computing device may gather data associated with activities performed by individuals from multiple locations (e.g., code repositories). The computing device may determine data gathered by a data monitor application at individual locations of the multiple locations over a predetermined amount of time. The computing device may filter, based on criteria, the gathered data and perform an analysis of the filtered data using a machine learning algorithm (e.g., an artificial neural network and a logistic sigmoid). The criteria may be selected based at least in part on a job function associated with the particular individual. The machine learning algorithm may create a human resource evaluation of a particular individual of the plurality of individuals recommending an increase in salary, a bonus, or a promotion. The human resources evaluation may include a probability that the particular individual will leave a current job in the organization.Type: ApplicationFiled: April 22, 2020Publication date: October 28, 2021Inventors: James S. Watt, Jr., Parminder Singh Sethi, Hung The Dinh, Ramu Kannappan
-
Patent number: 11157304Abstract: A system of one or more computers is configured to peer container clusters running on different container orchestration systems. One general aspect includes moving an endpoint service container between an original cluster and a target cluster of a cluster mesh. In at least one embodiment, a remote service endpoint container is instantiated at the original cluster using service registry information accessed by a mesh operator. In at least one embodiment, the service registry information includes the hostname/path information for the endpoint service container operating at the target cluster. The remote service endpoint container is configured to allow the dependent container at the original cluster to consume services available at the endpoint service container at the target cluster as though the endpoint service container is local to the dependent container.Type: GrantFiled: November 1, 2019Date of Patent: October 26, 2021Assignee: Dell Products L.P.Inventors: James S. Watt, Jr., Frank DiRosa, IV
-
Patent number: 11093297Abstract: A workload optimization system includes a workload manager subsystem that provides a plurality of workloads that each generates a jobs, an agent infrastructure subsystem that includes a first container host hosting a first container having a first agent and that processes jobs generated by at least one of the plurality of workloads, and a workload resource optimization subsystem that monitors a job queue of jobs that were generated by the plurality of workloads and that are to be processed by the first container. The workload resource optimization subsystem then determines whether the job queue satisfies a container generation condition. If so, the workload resource optimization subsystem provides instructions to the first container host to generate a second container that includes a second agent. The workload resource optimization subsystem monitors container host utilization to provide instructions to activate a second container host to provide a third container having a third agent.Type: GrantFiled: February 8, 2017Date of Patent: August 17, 2021Assignee: Dell Products L.P.Inventors: James S. Watt, Jr., Kareemullah Khan Fazal, Mark Owens, Douglas Braga de Alencar, Rene Herrero
-
Publication number: 20210132974Abstract: A system of one or more computers is configured to peer container clusters running on different container orchestration systems. One general aspect includes moving an endpoint service container between an original cluster and a target cluster of a cluster mesh. In at least one embodiment, a remote service endpoint container is instantiated at the original cluster using service registry information accessed by a mesh operator. In at least one embodiment, the service registry information includes the hostname/path information for the endpoint service container operating at the target cluster. The remote service endpoint container is configured to allow the dependent container at the original cluster to consume services available at the endpoint service container at the target cluster as though the endpoint service container is local to the dependent container.Type: ApplicationFiled: November 1, 2019Publication date: May 6, 2021Inventors: James S. Watt, JR., Frank DiRosa, IV
-
Publication number: 20210099412Abstract: In some examples, a computing device may receive, from an email server, an email rule comprising conditions and actions and determine a subset of archived emails stored on the computing device that satisfy the conditions. The computing device may perform the actions to the subset of archived emails, such as placing a legal hold on the subset of archived emails, creating and sending copies of the subset of archived emails to the email server, or deleting, from the computing device, the subset of archived emails. After determining that a user is attempting to perform a prohibited action on (e.g., delete, edit, forward) an email of the subset of archived emails, the computing device may perform a protective action, such as logging the user out of an email account, preventing the user from logging in to the email account, automatically sending an email to an administrator or the like.Type: ApplicationFiled: October 1, 2019Publication date: April 1, 2021Inventors: Sathish Kumar Bikumala, Bijan Kumar Mohanty, James S. Watt, JR.
-
Publication number: 20210012371Abstract: In some examples, while a user is navigating a site using a browser, a computing device may receive one or more images from a camera and may monitor input data from input devices (e.g., mouse, keyboard). After a particular event occurs (e.g., a navigation event such as selecting a link, selecting a tab, scrolling up or down, or the like), the computing device may analyze the images captured after the event using a machine learning algorithm to determine a micro-expression of the user. The micro-expression may be classified as a particular sentiment of a plurality of sentiments, associated with the event, and sent to a server. The server or the computing device may instruct the browser to modify, based on the sentiment, a portion of the site. The modification may include displaying a user interface to enable the user to communicate with a representative associated with the site.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Inventors: Sathish Kumar Bikumala, James S. Watt, JR., John Peter Raphael Hughan
-
Publication number: 20200410539Abstract: A method, system and computer-usable medium are disclosed for providing personalized marketing at a mobile device when in proximity to a retail location. One general aspect includes a computer-implemented method for personalized proximity marketing including: detecting whether a mobile device is proximate a retail location of a product retailer; if the mobile device is proximate a retail location of the product retailer, querying a user profile associated with a user of the mobile device to determine whether the retail location has one or more items of interest available to the user of the mobile device, where the one or more items of interest are identified based on product preferences associated with the user profile; and in response to the query, alerting a user at the mobile device one or more of the items of interest are available at the retail location.Type: ApplicationFiled: June 28, 2019Publication date: December 31, 2020Applicant: Dell Products L.P.Inventors: James S. Watt, Jr., Frank DiRosa
-
Publication number: 20200380078Abstract: A system, method, and computer-readable medium are disclosed for improved audio collection of website ambient data. In various embodiments, when a user visits a website, audio data is collected during a website browsing session. The audio data is converted to text by Natural Language Processing (NLP) enabled device used for browsing. From the text, certain key words are identified that are relevant to a business. The identified key words can be analyzed per requirements of the business.Type: ApplicationFiled: May 28, 2019Publication date: December 3, 2020Applicant: Dell Products L.P.Inventors: James S. Watt, JR., Someshwar Mukherjee
-
Publication number: 20200110840Abstract: In some examples, a search module executing on a computing device may determine that text input has been entered into a search entry field of a search engine. The module may retrieve audio data stored in a buffer. The audio data may be retrieved using an application programming interface of an operating system. The audio data may include audio captured by a microphone prior to the text input being entered. The module may send a search request that includes the text input and context data derived from the audio data to a search engine. The context data may comprise the audio data or additional text derived from the audio data. The context data may be included in metadata of the search request. The search engine may perform a search based on the text input and the context data and provide search results that are displayed in the browser.Type: ApplicationFiled: October 4, 2018Publication date: April 9, 2020Inventors: Someshwar Mukherjee, James S. Watt, JR.
-
Patent number: 10146518Abstract: A software package retention system that uses pre-defined rules to retain software packages based on how the packages are used, and not merely based on a package's date/time of creation (age) or type. A retention policy server in the system integrates with the build, deployments, and artifact storage systems of a software supplier/vendor to ensure appropriate retentions are met for audit and regulatory compliance and unneeded artifacts or packages are purged to save storage space and lower operational costs. The server has the capability to monitor software deployments to the customer and to developer test environments, and to make rule-based decisions on when and how to run retention policy clean-up jobs and on what packages. With increasing reliance on frequent build and release of software packages across the software industry, package management post-release using the rule-based retention policy provides an efficient and cost-effective solution for legal compliance with retention requirements.Type: GrantFiled: May 25, 2017Date of Patent: December 4, 2018Assignee: Dell Products L.P.Inventors: James S. Watt, Jr., Rene Herrero, Kareemullah Khan Fazal, Mark D. Owens, Douglas Alencar
-
Publication number: 20180341473Abstract: A software package retention system that uses pre-defined rules to retain software packages based on how the packages are used, and not merely based on a package's date/time of creation (age) or type. A retention policy server in the system integrates with the build, deployments, and artifact storage systems of a software supplier/vendor to ensure appropriate retentions are met for audit and regulatory compliance and unneeded artifacts or packages are purged to save storage space and lower operational costs. The server has the capability to monitor software deployments to the customer and to developer test environments, and to make rule-based decisions on when and how to run retention policy clean-up jobs and on what packages. With increasing reliance on frequent build and release of software packages across the software industry, package management post-release using the rule-based retention policy provides an efficient and cost-effective solution for legal compliance with retention requirements.Type: ApplicationFiled: May 25, 2017Publication date: November 29, 2018Inventors: James S. Watt, JR., Rene Herrero, Kareemullah Khan Fazal, Mark D. Owens, Douglas Alencar
-
Publication number: 20180225155Abstract: A workload optimization system includes a workload manager subsystem that provides a plurality of workloads that each generates a jobs, an agent infrastructure subsystem that includes a first container host hosting a first container having a first agent and that processes jobs generated by at least one of the plurality of workloads, and a workload resource optimization subsystem that monitors a job queue of jobs that were generated by the plurality of workloads and that are to be processed by the first container. The workload resource optimization subsystem then determines whether the job queue satisfies a container generation condition. If so, the workload resource optimization subsystem provides instructions to the first container host to generate a second container that includes a second agent. The workload resource optimization subsystem monitors container host utilization to provide instructions to activate a second container host to provide a third container having a third agent.Type: ApplicationFiled: February 8, 2017Publication date: August 9, 2018Inventors: James S. Watt, JR., Kareemullah Khan Fazal, Mark Owens, Douglas Braga de Alencar, Rene Herrero