Patents by Inventor James T. Swantek
James T. Swantek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10666556Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: GrantFiled: July 11, 2018Date of Patent: May 26, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 10541910Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: GrantFiled: April 19, 2018Date of Patent: January 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20180324086Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: July 11, 2018Publication date: November 8, 2018Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 10069722Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: GrantFiled: September 3, 2015Date of Patent: September 4, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20180241665Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: April 19, 2018Publication date: August 23, 2018Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9979636Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: GrantFiled: November 30, 2015Date of Patent: May 22, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9781609Abstract: Embodiments for testing a wireless network location by a processor. A collection of candidate wireless network test locations is selected for testing wireless network communication according to defined constraints, conditions, testing parameters, or a combination thereof. A self-directed, mobile wireless access point (WAP) is dispatched to at least one stationary location from the collection. A self-directed, testing receiver may be commanded to progressively move to each candidate test location along a testing route of the collection. The testing attributes relating to wireless network communication performance are measured for each of the candidate test locations along the testing route of the collection. Qualified WAP locations are identified from the candidate test locations based on the measured testing attributes.Type: GrantFiled: August 8, 2016Date of Patent: October 3, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rachele S. Kurtz, Charles S. Lingafelt, James W. Murray, James T. Swantek
-
Patent number: 9686146Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: GrantFiled: January 14, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20170070407Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: November 30, 2015Publication date: March 9, 2017Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20170070423Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.Type: ApplicationFiled: September 3, 2015Publication date: March 9, 2017Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9491313Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.Type: GrantFiled: March 24, 2015Date of Patent: November 8, 2016Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9392019Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.Type: GrantFiled: July 28, 2014Date of Patent: July 12, 2016Assignee: LENOVO ENTERPRISE (SINGAPORE) PTE. LTD.Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9363158Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.Type: GrantFiled: February 5, 2014Date of Patent: June 7, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9350754Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.Type: GrantFiled: July 18, 2013Date of Patent: May 24, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20160134487Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9270523Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.Type: GrantFiled: February 28, 2012Date of Patent: February 23, 2016Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20160028765Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.Type: ApplicationFiled: July 28, 2014Publication date: January 28, 2016Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Publication number: 20150222522Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.Type: ApplicationFiled: February 5, 2014Publication date: August 6, 2015Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9094521Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.Type: GrantFiled: June 13, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
-
Publication number: 20150195416Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.Type: ApplicationFiled: March 24, 2015Publication date: July 9, 2015Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley