Patents by Inventor Jeffrey R. Hoy

Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160246770
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 25, 2016
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Patent number: 9426160
    Abstract: Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.
    Type: Grant
    Filed: December 2, 2014
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 9426192
    Abstract: A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.
    Type: Grant
    Filed: January 2, 2014
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 9420016
    Abstract: A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Publication number: 20160232024
    Abstract: An approach provides solutions for responding to threats to virtual machines (VMs) and mitigating the risks of potential breaches to VMs that reside in the same neighborhood as VMs that are affected by threats. The approach can provide proactive responsive actions for one or more VMs in a determined neighborhood that help protect those VMs in a selective and prioritized manner.
    Type: Application
    Filed: February 11, 2015
    Publication date: August 11, 2016
    Inventors: Rick A. Hamilton, II, Jeffrey R. Hoy, Jenny S. Li, Shawn P. Mullen
  • Patent number: 9401887
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Grant
    Filed: August 5, 2013
    Date of Patent: July 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 9398128
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: July 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 9380010
    Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20160182419
    Abstract: A social network activity mode that is implemented using social network activity rules is identified. The social network activity rules allow only social network posts of relevance to a particular activity of a user to be presented to the user. The social network activity mode is applied to a group of social network posts. Based upon applying the social network activity mode to the group of social network posts, social network posts that comply with the social network activity rules of the social network activity mode are provided to the user and social network posts that do not comply with the social network activity rules of the social network activity mode are blocked.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Publication number: 20160182647
    Abstract: Disconnection protection for command-line remote terminal may be provided. A command-line remote terminal session may be created at the first computer for interacting with the second computer. A command entered in the command-line remote terminal session may be intercepted. A disconnect protection may be injected into the command. The disconnect protection may comprise at least redirecting output from the command into a session log file. The output of the command may be tracked to simulate the command as an active process in the command-line remote terminal session at the first computer. Responsive to detecting a disconnect in the remote network connection with the second computer, the remote network connection with the second computer may be automatically recovered by restarting the remote network connection with the second computer based on information stored in the session log file at a point of the disconnect.
    Type: Application
    Filed: December 17, 2014
    Publication date: June 23, 2016
    Inventors: Joshua A. Alger, Alan R. Buss, James D. Creasman, Jeffrey R. Hoy
  • Publication number: 20160142411
    Abstract: A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common image, is created in a cloud computing environment. A unique set of randomized system parameters are then generated for the new node, which is then mapped to a set of generic system parameters. A request to access the new node is intercepted, which contains the generic system parameters. The intercepted access request is then parsed to extract the set of generic system parameters, which are then replaced with the unique set of randomized system parameters associated with the target node to generate a modified access request. The modified access request is then forwarded to the target node.
    Type: Application
    Filed: August 6, 2015
    Publication date: May 19, 2016
    Inventors: Joshua A. Alger, Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Publication number: 20160142334
    Abstract: A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common image, is created in a cloud computing environment. A unique set of randomized system parameters are then generated for the new node, which is then mapped to a set of generic system parameters. A request to access the new node is intercepted, which contains the generic system parameters. The intercepted access request is then parsed to extract the set of generic system parameters, which are then replaced with the unique set of randomized system parameters associated with the target node to generate a modified access request. The modified access request is then forwarded to the target node.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joshua A. Alger, Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Publication number: 20160134736
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Publication number: 20160111085
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Application
    Filed: December 29, 2015
    Publication date: April 21, 2016
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Publication number: 20160110187
    Abstract: Methods and systems may provide for tracking, on a position-by-position basis in a diverged code history associated with a diverged source stream, an origin source stream and an original position of code contained within the diverged source stream. Additionally, a modification may be detected with respect to a first portion of the code contained within the diverged source stream at a first position. In such a case, the modification and the first position may be automatically documented in the diverged code history.
    Type: Application
    Filed: October 16, 2014
    Publication date: April 21, 2016
    Inventors: Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Publication number: 20160110189
    Abstract: Methods and systems may provide for tracking, on a position-by-position basis in a diverged code history associated with a diverged source stream, an origin source stream and an original position of code contained within the diverged source stream. Additionally, a modification may be detected with respect to a first portion of the code contained within the diverged source stream at a first position. In such a case, the modification and the first position may be automatically documented in the diverged code history.
    Type: Application
    Filed: May 29, 2015
    Publication date: April 21, 2016
    Inventors: Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Patent number: 9294617
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: March 22, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Patent number: 9294616
    Abstract: Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
    Type: Grant
    Filed: June 30, 2013
    Date of Patent: March 22, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
  • Publication number: 20150381524
    Abstract: Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.
    Type: Application
    Filed: March 10, 2015
    Publication date: December 31, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JONATHAN F. BRUNN, JESSICA W. FORRESTER, STEPHEN C. HESS, JEFFREY R. HOY
  • Publication number: 20150381545
    Abstract: Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: JONATHAN F. BRUNN, JESSICA W. FORRESTER, STEPHEN C. HESS, JEFFREY R. HOY