Patents by Inventor Jeffrey R. Hoy

Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10225141
    Abstract: A preferred communication application hierarchy that specifies user priorities for application selection for communication sessions and functional communication capabilities of each prioritized application is configured for at least one user of a group of users. A real-time communication request, initiated by a user with a configured preferred communication application hierarchy, is detected that specifies a particular type of communication functionality and that includes an indication of another one of the group of users as a requested communication recipient. Responsive to detecting the real-time communication request that specifies the particular type of communication functionality, a highest-priority application usable to perform the specified particular type of communication functionality with a communication device of the requested communication recipient is selected from the configured preferred communication application hierarchy of the requesting user.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: March 5, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10216735
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Patent number: 10216736
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Publication number: 20190052601
    Abstract: A method, apparatus and computer program product manage a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. A first virtual private network (VPN) agent manages a first VPN tunnel in a plurality of VPN tunnels. The first VPN tunnel provides communication for traffic between a first node in a first cloud and a second node in a second cloud in a hybrid cloud environment. The agent receives a request from a VPN manager which includes a first set of requirements for a first cloud application for the first VPN tunnel in the plurality of VPN tunnels. The agent creates the first VPN tunnel according to the first set of requirements. Next, the agent receives a modification request from the VPN manager containing a second set of requirements for a second cloud application.
    Type: Application
    Filed: October 14, 2018
    Publication date: February 14, 2019
    Inventors: Jeffrey R Hoy, Sreekanth R Iyer, Kaushal K Kapadia, Ravi K Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 10178044
    Abstract: Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: January 8, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 10178414
    Abstract: An indication is received, from each of multiple content viewing devices used by multiple remote viewers, that each specifies a respective individual video content sub-area of interest within streamed video content viewed by each of the multiple remote viewers. An aggregated video content area of interest is defined that includes a combination of each individually-specified video content sub-area of interest within the streamed video content. Video content outside of the aggregated video content area of interest is designated as a region not of interest (RNOI) within the streamed video content. A transmission rate of image changes of video content within the RNOI is reduced within the streamed video content. Bandwidth consumed to transmit the streamed video content is reduced in relation to the reduced transmission rate of the image changes of the video content within the RNOI.
    Type: Grant
    Filed: October 14, 2015
    Date of Patent: January 8, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10169032
    Abstract: Methods and systems may provide for tracking, on a position-by-position basis in a diverged code history associated with a diverged source stream, an origin source stream and an original position of code contained within the diverged source stream. Additionally, a modification may be detected with respect to a first portion of the code contained within the diverged source stream at a first position. In such a case, the modification and the first position may be automatically documented in the diverged code history.
    Type: Grant
    Filed: October 16, 2014
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Patent number: 10171381
    Abstract: Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 10171485
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10163059
    Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
    Type: Grant
    Filed: February 13, 2017
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10148660
    Abstract: Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.
    Type: Grant
    Filed: June 13, 2017
    Date of Patent: December 4, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 10140298
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Patent number: 10091305
    Abstract: Disconnection protection for command-line remote terminal may be provided. A command-line remote terminal session may be created at the first computer for interacting with the second computer. A command entered in the command-line remote terminal session may be intercepted. A disconnect protection may be injected into the command. The disconnect protection may comprise at least redirecting output from the command into a session log file. The output of the command may be tracked to simulate the command as an active process in the command-line remote terminal session at the first computer. Responsive to detecting a disconnect in the remote network connection with the second computer, the remote network connection with the second computer may be automatically recovered by restarting the remote network connection with the second computer based on information stored in the session log file at a point of the disconnect.
    Type: Grant
    Filed: December 17, 2014
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Joshua A. Alger, Alan R. Buss, James D. Creasman, Jeffrey R. Hoy
  • Patent number: 10042885
    Abstract: Embodiments of the present invention disclose optimizing resources of distributed database replicas in which one or more processors receive resource information associated with a plurality of database replicas hosted on a plurality of servers, the resource information includes identification of indexes of database tables of each database replica. The instances of indexes residing in memory of the plurality of servers is determined, based on the state of each index, which indicates whether the index resides in memory. The instances of indexes that reside in memory and are redundant among the plurality of database replicas are determined, and in response to receiving a query directed to a database replica, if an index of a database table having the query-requested data resides in memory, the query is routed to the database replica on which the index resides in memory.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: August 7, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Jeffrey R. Hoy, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
  • Patent number: 10015128
    Abstract: Prioritizing online comments on social network web page is disclosed. An activity of a user consuming a content presented on the social network web page is detected. Time spent by the user consuming the content is determined. Responsive to the user entering a comment on the content, a depth of consumption of the content by the user is determined based on the time spent by the user consuming the content. The comment entered by the user is ranked among a plurality of comments entered by one or more of the plurality of users based on the depth of consumption. The comment entered by the user is presented on the social network web page in the order of the ranking.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: July 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 10009308
    Abstract: Prioritizing online comments on social network web page is disclosed. An activity of a user consuming a content presented on the social network web page is detected. Time spent by the user consuming the content is determined. Responsive to the user entering a comment on the content, a depth of consumption of the content by the user is determined based on the time spent by the user consuming the content. The comment entered by the user is ranked among a plurality of comments entered by one or more of the plurality of users based on the depth of consumption. The comment entered by the user is presented on the social network web page in the order of the ranking.
    Type: Grant
    Filed: April 24, 2015
    Date of Patent: June 26, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 9954870
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: April 24, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20180109548
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Publication number: 20180109547
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Application
    Filed: December 14, 2017
    Publication date: April 19, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Publication number: 20180103048
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Application
    Filed: December 13, 2017
    Publication date: April 12, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro