Patents by Inventor James T. Swantek

James T. Swantek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10666556
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 10541910
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Grant
    Filed: April 19, 2018
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20180324086
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: July 11, 2018
    Publication date: November 8, 2018
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 10069722
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: September 4, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20180241665
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: April 19, 2018
    Publication date: August 23, 2018
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9979636
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: May 22, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9781609
    Abstract: Embodiments for testing a wireless network location by a processor. A collection of candidate wireless network test locations is selected for testing wireless network communication according to defined constraints, conditions, testing parameters, or a combination thereof. A self-directed, mobile wireless access point (WAP) is dispatched to at least one stationary location from the collection. A self-directed, testing receiver may be commanded to progressively move to each candidate test location along a testing route of the collection. The testing attributes relating to wireless network communication performance are measured for each of the candidate test locations along the testing route of the collection. Qualified WAP locations are identified from the candidate test locations based on the measured testing attributes.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: October 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rachele S. Kurtz, Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Patent number: 9686146
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20170070407
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 9, 2017
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20170070423
    Abstract: Technical solutions for optimization of network resources are described. One general aspect includes a method, including measuring, by a controller, an attribute of network route being used to communicate a network flow between a first apparatus and a second apparatus. The method also includes comparing, by the controller, a predetermined threshold and the attribute. The method also includes in response to the attribute being non-compliant with the predetermined threshold, selecting, by the controller, an alternative network route to communicate the network flow between the first apparatus and the second apparatus. The method also includes routing, by the controller, the network flow to be communicated via the alternative route between the first apparatus and the second apparatus.
    Type: Application
    Filed: September 3, 2015
    Publication date: March 9, 2017
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9491313
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: November 8, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9392019
    Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: July 12, 2016
    Assignee: LENOVO ENTERPRISE (SINGAPORE) PTE. LTD.
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9363158
    Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: June 7, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9350754
    Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: May 24, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20160134487
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Application
    Filed: January 14, 2016
    Publication date: May 12, 2016
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9270523
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: February 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20160028765
    Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.
    Type: Application
    Filed: July 28, 2014
    Publication date: January 28, 2016
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20150222522
    Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.
    Type: Application
    Filed: February 5, 2014
    Publication date: August 6, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9094521
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Publication number: 20150195416
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Application
    Filed: March 24, 2015
    Publication date: July 9, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley