Patents by Inventor Jeffrey R. Hoy

Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160315899
    Abstract: Prioritizing online comments on social network web page is disclosed. An activity of a user consuming a content presented on the social network web page is detected. Time spent by the user consuming the content is determined. Responsive to the user entering a comment on the content, a depth of consumption of the content by the user is determined based on the time spent by the user consuming the content. The comment entered by the user is ranked among a plurality of comments entered by one or more of the plurality of users based on the depth of consumption. The comment entered by the user is presented on the social network web page in the order of the ranking.
    Type: Application
    Filed: May 16, 2016
    Publication date: October 27, 2016
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Publication number: 20160316032
    Abstract: Embodiments include methods, systems and computer program products for tracking content sharing across multiple channels. Aspects include receiving, by a content server, a request for a piece of content from a user and determining if the request includes a view identifier that is associated with the user. Based on determining that the request does not include the view identifier that is associated with the user, aspects also include generating a new view identifier for the user and storing information about the user and the new view identifier and providing the requested piece of content to the user and providing an updated URL including the new view identifier to the user.
    Type: Application
    Filed: April 27, 2015
    Publication date: October 27, 2016
    Inventors: Jonathan F. BRUNN, Jeffrey R. HOY, Marit L. IMSDAHL, Asima SILVA
  • Publication number: 20160314210
    Abstract: Prioritizing online comments on social network web page is disclosed. An activity of a user consuming a content presented on the social network web page is detected. Time spent by the user consuming the content is determined. Responsive to the user entering a comment on the content, a depth of consumption of the content by the user is determined based on the time spent by the user consuming the content. The comment entered by the user is ranked among a plurality of comments entered by one or more of the plurality of users based on the depth of consumption. The comment entered by the user is presented on the social network web page in the order of the ranking.
    Type: Application
    Filed: April 24, 2015
    Publication date: October 27, 2016
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Publication number: 20160315835
    Abstract: Embodiments include methods, systems and computer program products for tracking content sharing across multiple channels. Aspects include receiving, by a content server, a request for a piece of content from a user and determining if the request includes a view identifier that is associated with the user. Based on determining that the request does not include the view identifier that is associated with the user, aspects also include generating a new view identifier for the user and storing information about the user and the new view identifier and providing the requested piece of content to the user and providing an updated URL including the new view identifier to the user.
    Type: Application
    Filed: June 14, 2016
    Publication date: October 27, 2016
    Inventors: JONATHAN F. BRUNN, JEFFREY R. HOY, MARIT L. IMSDAHL, ASIMA SILVA
  • Publication number: 20160306677
    Abstract: Mechanisms are provided, in a data processing system comprising a primary system-on-a-chip (SOC) and a pool of SOCs, for processing a workload. The data processing system receives a cloud computing workload submitted and allocates the cloud computing workload to the primary SOC. An analytics monitor of the data processing system monitors a bus of the data processing system for at least one first signal indicative of an overloaded condition of the primary SOC. A Power, Reset, and Clocking (PRC) hardware block powers-up one or more auxiliary SOCs in the pool of SOCs in response to the analytics monitor detecting the at least one first signal. The workload is then distributed across the primary SOC and the one or more auxiliary SOCs in response to powering-up the one or more SOCs. The workload is then executed by the primary SOC and the one or more SOCs.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 20, 2016
    Inventors: Kalpesh Hira, Jeffrey R. Hoy, Ivan M. Milman
  • Publication number: 20160308808
    Abstract: A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.
    Type: Application
    Filed: June 23, 2016
    Publication date: October 20, 2016
    Inventors: SHADI E. ALBOUYEH, BERNADETTE A. CARTER, JEFFREY R. HOY, STEPHANIE L. TRUNZO
  • Publication number: 20160306678
    Abstract: Mechanisms are provided, in a data processing system comprising a primary system-on-a-chip (SOC) and a pool of SOCs, for processing a workload. The data processing system receives a cloud computing workload submitted and allocates the cloud computing workload to the primary SOC. An analytics monitor of the data processing system monitors a bus of the data processing system for at least one first signal indicative of an overloaded condition of the primary SOC. A Power, Reset, and Clocking (PRC) hardware block powers-up one or more auxiliary SOCs in the pool of SOCs in response to the analytics monitor detecting the at least one first signal. The workload is then distributed across the primary SOC and the one or more auxiliary SOCs in response to powering-up the one or more SOCs. The workload is then executed by the primary SOC and the one or more SOCs.
    Type: Application
    Filed: June 3, 2015
    Publication date: October 20, 2016
    Inventors: Kalpesh Hira, Jeffrey R. Hoy, Ivan M. Milman
  • Publication number: 20160301787
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Application
    Filed: June 22, 2016
    Publication date: October 13, 2016
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Publication number: 20160299976
    Abstract: A method, system and computer program product for evaluating an impact of a user's content utilized in a social network. Content in a document (e.g., a presentation) that has been posted on a social network environment is detected as being reused by another user in another document. The author of the reused content is then identified. A counter keeping track of the number of times this content has been adopted in derivative works is then incremented. A score (“impact score”), representing the author's ability to influence other users to adopt the author's content in other users' derivative works, is then generated based on the number of times this content has been adopted in derivative works. Social credit is then provided to the author using the impact score. In this manner, recognition is provided to the author thereby providing motivation for users to post created content in the social network.
    Type: Application
    Filed: April 11, 2015
    Publication date: October 13, 2016
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 9467411
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Grant
    Filed: July 31, 2013
    Date of Patent: October 11, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 9462013
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: October 4, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20160275174
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Application
    Filed: June 1, 2016
    Publication date: September 22, 2016
    Applicant: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Publication number: 20160277492
    Abstract: A method transmits an image file to a target electronic device. One or more processors convert an original image file from a first format into a second format to create a converted image file. A locator address metatag is appended to the converted image file. The locator address metatag provides an address of a copy of the original image file in the first format. The converted image file with the locator address metatag is transmitted, from a source electronic device to a target electronic device, such that the locator address metatag enables the target electronic device to locate and retrieve the copy of the original image file.
    Type: Application
    Filed: March 16, 2015
    Publication date: September 22, 2016
    Inventors: SHADI E. ALBOUYEH, JEFFREY R. HOY, STEPHANIE L. TRUNZO
  • Patent number: 9442932
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: September 13, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Patent number: 9444776
    Abstract: A computer implemented method, computer program product, and system for providing a dynamic, intelligent e-mail signature. In an embodiment, the method includes the steps of receiving an e-mail from a sender, storing the e-mail for later retrieval, assigning a URL representing the e-mail signature and sending the URL to the sender. Further, the method includes the steps of receiving the URL from the e-mail recipient, analyzing the e-mail and social media activities of sender and recipient, determining a signature and sending the signature to the recipient.
    Type: Grant
    Filed: May 22, 2014
    Date of Patent: September 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 9442710
    Abstract: A method for utilizing a partial active installation session on a first computer system for an active installation session of a program product on a second computer system. Active installation of the program product having a plurality of components is initiated on the first computer system. A plurality of deployed components installed during the partial active installation session is duplicated. The deployed software components are archived into a new installation package. The new installation package is copied and deployed to the second computer system. Installation of the active product installation is completed on the second system.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: September 13, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Patent number: 9433858
    Abstract: A computer receives an image access preference that is associated with a user included in a first game session. The computer receives an image from a camera, connected to the computer, through a network. The computer analyzes the first image to identify the presence of the user. The computer generates and compares a first analysis result a to a set of stored data to determine, based on the comparison, if the user is present. Responsive to determining that the user is present, the computer applies the received access preferences, associated with the present user, to the first image.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: September 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey R. Hoy, Andrew J. Ivory, Barry J. Pellas, David M. Stecher
  • Publication number: 20160253160
    Abstract: A cloud based installer package is converted to a version that can be deployed in physical machines, e.g., by extracting an installer with embedded middleware configured to run on a remote cloud deployment, and identifying a physical machine to install the package and extracting information from the physical machine and utilizing the extracted information to convert the installer to a version that can be installed in a physical machine.
    Type: Application
    Filed: February 27, 2015
    Publication date: September 1, 2016
    Inventors: Joshua A. Alger, Jeffrey R. Hoy, Barry J. Pellas
  • Publication number: 20160253593
    Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored to a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 1, 2016
    Inventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20160248723
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Application
    Filed: March 22, 2016
    Publication date: August 25, 2016
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy