Patents by Inventor Jeffrey B. Sloyer

Jeffrey B. Sloyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8892652
    Abstract: A method, computer program product, and system for determining a custom summary of a web conference is described. A first input associated with a first portion of a web conference is received. A first content associated with the web conference is selected based upon, at least in part, the first input. A custom summary of the web conference is determined based upon, at least in part, the selected first content and a relation associated with a socially-connected group.
    Type: Grant
    Filed: April 11, 2013
    Date of Patent: November 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chelsea Christine Beerse, Patrick Joseph O'Sullivan, Jeffrey B. Sloyer, Carol Sue Zimmet
  • Patent number: 8874648
    Abstract: A method, computer program product, and system for determining a custom summary of a web conference is described. A first input associated with a first portion of a web conference is received. A first content associated with the web conference is selected based upon, at least in part, the first input. A custom summary of the web conference is determined based upon, at least in part, the selected first content and a relation associated with a socially-connected group.
    Type: Grant
    Filed: January 23, 2012
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chelsea Christine Beerse, Patrick Joseph O'Sullivan, Jeffrey B. Sloyer, Carol Sue Zimmet
  • Publication number: 20140282822
    Abstract: Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan Dunne, Jason Flood, Jeffrey B. Sloyer, Ian D. Stewart
  • Publication number: 20140282845
    Abstract: Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level.
    Type: Application
    Filed: November 8, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Jonathan Dunne, Jason Flood, Jeffrey B. Sloyer, Ian D. Stewart
  • Publication number: 20140280536
    Abstract: A method and system for collaborative content filtering on a communications network includes monitoring social networking communications of a plurality of users on a communications network using a program. The method and system further include selecting a filter parameter by a user. The content of the social networking communications is filtered based on the filter parameter including parsing input from the users, using the program. The filtered content is identified to at least one user.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chelsea C. Beerse, Patrick J. O'Sullivan, Jeffrey B. Sloyer, Carol S. Zimmet
  • Publication number: 20140244743
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for managing group members. A computer identifies a collaboration activity that corresponds to a defined group, wherein the defined group includes one or more individuals, and the collaboration activity is comprised of the defined group and one or more additional individuals. The computer determines participation and contribution information that correspond to the one or more individuals of the defined group and the one or more additional individuals included in the identified collaboration activity. The computer determines relevant individuals from the identified collaboration activity by utilizing determined participation and contribution information. In response to determining the relevant individuals, the computer determines an updated group wherein the updated group includes determined relevant individuals.
    Type: Application
    Filed: February 26, 2013
    Publication date: August 28, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chelsea C. Beerse, Patrick J. O'Sullivan, Jeffrey B. Sloyer, Carol S. Zimmet
  • Publication number: 20140189122
    Abstract: A data processing system and computer program product for managing resources of clusters is disclosed. A computer retrieves data about an event and other data about past events. The computer selects a set of past events that are similar to the event, based on the data about the event and the other data about the past events. The computer then analyzes the data about the event and the other data about the past events associated with the set of past events to identify a portion of the resources of one or more of the clusters required for use by the event.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chelsea C. Beerse, Christopher M. Bosko, Brian D. Osenbach, Jeffrey B. Sloyer
  • Publication number: 20140189126
    Abstract: A method for managing resources of clusters is disclosed. A computer retrieves data about an event and other data about past events. The computer selects a set of past events that are similar to the event, based on the data about the event and the other data about the past events. The computer then analyzes the data about the event and the other data about the past events associated with the set of past events to identify a portion of the resources of one or more of the clusters required for use by the event.
    Type: Application
    Filed: February 25, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chelsea C. Beerse, Christopher M. Bosko, Brian D. Osenbach, Jeffrey B. Sloyer
  • Publication number: 20140181139
    Abstract: Risk assessment for a computing system being developed can include receiving a user input specifying a proposed topology for a computing system. The proposed topology is defined by a first software product to be used and an architecture having a first non-functional component. A problem knowledge repository is searched using a processor for records of problems correlated with the proposed topology. A level of risk in implementing the computing system using the proposed topology is calculated according to the searching using the processor.
    Type: Application
    Filed: September 12, 2013
    Publication date: June 26, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan Dunne, Morten Kristiansen, Jeffrey B. Sloyer, Ian D. Stewart
  • Publication number: 20140181138
    Abstract: Risk assessment for a computing system being developed can include receiving a user input specifying a proposed topology for a computing system. The proposed topology is defined by a first software product to be used and an architecture having a first non-functional component. A problem knowledge repository is searched using a processor for records of problems correlated with the proposed topology. A level of risk in implementing the computing system using the proposed topology is calculated according to the searching using the processor.
    Type: Application
    Filed: December 24, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: JONATHAN DUNNE, MORTEN KRISTIANSEN, JEFFREY B. SLOYER, IAN D. STEWART
  • Patent number: 8739046
    Abstract: A method, computer program product, and system for dynamic e-meeting summarization is described. A method may comprise monitoring behavior of an e-meeting participant and determining one or more portions of an e-meeting to summarize for the e-meeting participant based upon, at least in part, the behavior of the e-meeting participant. The method may further comprise determining a summary-content time-frame for the e-meeting participant based upon, at least in part, the one or more portions of the e-meeting to summarize for the e-meeting participant, the summary-content time-frame corresponding to an amount of time for the e-meeting participant to consume a summary of the e-meeting. The method may additionally comprise generating, during the e-meeting, the summary of the e-meeting in accordance with the summary-content time-frame for the e-meeting participant, the summary of the e-meeting based upon, at least in part, the one or more portions of the e-meeting.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: May 27, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey B. Sloyer, Chelsea Christine Beerse, Patrick Joseph O'Sullivan
  • Patent number: 8713537
    Abstract: A system and computer program product for monitoring a heap in real-time to assess the performance of a virtual machine. A mobile agent is created to be preloaded with boundary settings for each heap metric. Boundary settings are thresholds that are used to diagnose the effectiveness of operation of the heap. The mobile agent is deployed onto an application server to monitor the effectiveness of operation of the heap of a virtual machine within the application server. If a boundary setting for one of the heap metrics is exceeded, then the mobile agent determines whether a non-critical, a critical or a fatal error has occurred. An appropriate response is then performed. By monitoring the heap in real-time, undesirable behavior characteristics of the heap can be detected early thereby allowing remedial actions to be enacted to address such problems before those problems escalate into more serious problems.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Dunne, Jeffrey B. Sloyer
  • Patent number: 8713538
    Abstract: A method for monitoring a heap in real-time to assess the performance of a virtual machine. A mobile agent is created to be preloaded with boundary settings for each heap metric. Boundary settings are thresholds that are used to diagnose the effectiveness of operation of the heap. The mobile agent is deployed onto an application server to monitor the effectiveness of operation of the heap of a virtual machine within the application server. If a boundary setting for one of the heap metrics is exceeded, then the mobile agent determines whether a non-critical, a critical or a fatal error has occurred. An appropriate response is then performed. By monitoring the heap in real-time, undesirable behavior characteristics of the heap can be detected early thereby allowing remedial actions to be enacted to address such problems before those problems escalate into more serious problems.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Dunne, Jeffrey B. Sloyer
  • Patent number: 8666049
    Abstract: Implementing a location and historical trend based quality of session in unified telephony can begin with establishing a conference call. The location of each end-user device can be determined and a query of a previously established data store with historical trend data for quality of session for each end-user device based on the location of an identifier for the end user device can be performed. If the results of the querying indicate that an end-user device has a relatively low quality of session below a baseline established for the conference call, a corrective action designed to ensure the conference call is conducted with a quality of session at or above the baseline can be performed. Alternatively, the location and historical trend data and analysis for the collaboration session can be presented to a human moderator, who can be prompted to select a desired corrective action.
    Type: Grant
    Filed: May 30, 2012
    Date of Patent: March 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chelsea C. Beerse, Patrick J. O'Sullivan, Jeffrey B. Sloyer, Carol S. Zimmet
  • Patent number: 8666048
    Abstract: Implementing a location and historical trend based quality of session in unified telephony can begin with establishing a conference call. The location of each end-user device can be determined and a query of a previously established data store with historical trend data for quality of session for each end-user device based on the location of an identifier for the end user device can be performed. If the results of the querying indicate that an end-user device has a relatively low quality of session below a baseline established for the conference call, a corrective action designed to ensure the conference call is conducted with a quality of session at or above the baseline can be performed. Alternatively, the location and historical trend data and analysis for the collaboration session can be presented to a human moderator, who can be prompted to select a desired corrective action.
    Type: Grant
    Filed: April 18, 2012
    Date of Patent: March 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chelsea C. Beerse, Patrick J. O'Sullivan, Jeffrey B. Sloyer, Carol S. Zimmet
  • Publication number: 20140003595
    Abstract: Systems and methods for managing voice collision in multi-party communications are generally provided. Embodiments herein may include identifying a voice collision between a first speaker and a second speaker in a multi-party call. One or more voice collision rules may be received. One of the first speaker and the second speaker to be determined to be a priority speaker based upon, at least in part, the one or more voice collision rules. Call bandwidth may be allocated to the priority speaker.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Chelsea Christine Beerse, Patrick Joseph O'Sullivan, Jeffrey B. Sloyer, Carol Sue Zimmet
  • Publication number: 20130311835
    Abstract: Reliability testing can include determining a transaction time for each of a plurality of transactions to a system under test during the reliability test, wherein the plurality of transactions are of a same type. Forecasts of transaction times can be calculated for the transaction type. The forecasts can be compared with a threshold time using a processor. A remedial action can be implemented responsive to at least one of the forecasts exceeding the threshold time.
    Type: Application
    Filed: May 15, 2012
    Publication date: November 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JONATHAN DUNNE, JEFFREY B. SLOYER
  • Publication number: 20130311820
    Abstract: Reliability testing can include determining a transaction time for each of a plurality of transactions to a system under test during the reliability test, wherein the plurality of transactions are of a same type. Forecasts of transaction times can be calculated for the transaction type. The forecasts can be compared with a threshold time using a processor. A remedial action can be implemented responsive to at least one of the forecasts exceeding the threshold time.
    Type: Application
    Filed: May 14, 2013
    Publication date: November 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan Dunne, Jeffrey B. Sloyer
  • Publication number: 20130297708
    Abstract: A method, computer program product, and computer system for enabling and supporting a presence server cache are described herein. A presence server cache may receive a plurality of requests to poll a status of a contact from a plurality of clients. The presence server cache may determine the status of the contact. If the status of the contact is unavailable at the presence server cache, the presence server cache may transmit a request for the status of the contact to a presence server. The presence server cache may transmit the status of the contact of the user to the plurality of clients.
    Type: Application
    Filed: April 11, 2013
    Publication date: November 7, 2013
    Applicant: International Business Machines Corporation
    Inventors: Chelsea Christine Beerse, Patrick Joseph O'Sullivan, Jeffrey B. Sloyer, Carol Sue Zimmet
  • Publication number: 20130297707
    Abstract: A method, computer program product, and computer system for enabling and supporting a presence server cache are described herein. A presence server cache may receive a plurality of requests to poll a status of a contact from a plurality of clients. The presence server cache may determine the status of the contact. If the status of the contact is unavailable at the presence server cache, the presence server cache may transmit a request for the status of the contact to a presence server. The presence server cache may transmit the status of the contact of the user to the plurality of clients.
    Type: Application
    Filed: May 7, 2012
    Publication date: November 7, 2013
    Applicant: International Business Machines Corporation
    Inventors: CHELSEA CHRISTINE BEERSE, Patrick Joseph O'Sullivan, Jeffrey B. Sloyer, Carol Sue Zimmet