Patents by Inventor Kaleb D. Walton

Kaleb D. Walton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150310852
    Abstract: In an approach to determining speech effectiveness, a computer receives speech input. The computer determines, based, at least in part, on the received speech input, whether the speech input is one of: a conversation with words spoken by two or more people during a predetermined time interval, and a presentation with words spoken by one person and not any other person during a predetermined time interval. The computer detects at least one problem with the speech input. If the speech input is the presentation, the computer weights, by a first factor, the detected at least one problem with the speech input based on the speech input being a presentation and not a conversation, and if the speech input is a conversation, the computer weights, by a second factor, the detected at least one problem with the speech input based on the speech input being a conversation and not a presentation.
    Type: Application
    Filed: April 24, 2014
    Publication date: October 29, 2015
    Applicant: International Business Machines Corporation
    Inventors: Patrick A. Spizzo, Sara H. Waggoner, Kaleb D. Walton, Aaron T. Wodrich
  • Patent number: 9158658
    Abstract: A method, system, and computer program product for detecting merge conflicts and compilation errors in a collaborative integrated development environment are provided in the illustrative embodiments. Prior to at least one user committing a set of uncommitted changes associated with a source code to a repository, the computer receives the set of uncommitted changes associated with the source code. The computer creates at least one temporary branch corresponding to the set of uncommitted changes associated with the source code. The computer device merges the at least one temporary branch to corresponding portions of the source code. The computer determines whether a merge conflict has occurred. If the merge conflict occurred, the computer communicates a first notification to the at least one user, the first notification indicating the merge conflict.
    Type: Grant
    Filed: October 15, 2013
    Date of Patent: October 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: George T. Bigwood, Jason T. McMann, Michael G. Nikitaides, Kaleb D. Walton
  • Publication number: 20150281230
    Abstract: A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network.
    Type: Application
    Filed: June 15, 2015
    Publication date: October 1, 2015
    Inventors: Zachary S. Herman, Randy S. Johnson, John F. Kelley, Tedrick N. Northway, Kaleb D. Walton
  • Publication number: 20150271199
    Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.
    Type: Application
    Filed: March 19, 2014
    Publication date: September 24, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
  • Publication number: 20150270983
    Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Gary I. Givental, Kaleb D. Walton
  • Patent number: 9100395
    Abstract: A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Zachary S. Herman, Randy S. Johnson, John F. Kelley, Tedrick N. Northway, Kaleb D. Walton
  • Publication number: 20150106790
    Abstract: A method, system, and computer program product for detecting merge conflicts and compilation errors in a collaborative integrated development environment are provided in the illustrative embodiments. Prior to at least one user committing a set of uncommitted changes associated with a source code to a repository, the computer receives the set of uncommitted changes associated with the source code. The computer creates at least one temporary branch corresponding to the set of uncommitted changes associated with the source code. The computer device merges the at least one temporary branch to corresponding portions of the source code. The computer determines whether a merge conflict has occurred. If the merge conflict occurred, the computer communicates a first notification to the at least one user, the first notification indicating the merge conflict.
    Type: Application
    Filed: October 15, 2013
    Publication date: April 16, 2015
    Applicant: International Business Machines Corporation
    Inventors: George T. Bigwood, Jason T. McMann, Michael G. Nikitaides, Kaleb D. Walton
  • Publication number: 20150098308
    Abstract: A method and a system of using vibration signatures for pairing two devices. The method and the system include an apparatus that has a master side and a slave side. The slave side has at least one frictional structure. A first device is inserted into the master side. When a second device is inserted through the slave side, a pattern of vibration is generated. Vibration detecting devices on the first and second devices detect the pattern of vibration. A program of the first device validates a master vibration signature and configures the first device as a master device. A program of the second device validates a slave vibration signature and configures the second device as a slave device. The master device and the slave device are automatically paired.
    Type: Application
    Filed: October 7, 2013
    Publication date: April 9, 2015
    Applicant: International Business Machines Corporation
    Inventors: Zachary S. Herman, Kaleb D. Walton
  • Publication number: 20150089593
    Abstract: A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network.
    Type: Application
    Filed: September 24, 2013
    Publication date: March 26, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zachary S. Herman, Randy S. Johnson, John F. Kelley, Tedrick N. Northway, Kaleb D. Walton
  • Publication number: 20140247218
    Abstract: An approach for modifying a size of a key on a keyboard displayed on a touch screen is presented. A fingertip of a user is determined to be aligned with the key or touch screen, and in response, the size of the key is enlarged by a first enlargement amount. Responsive to the fingertip moving closer to the key, a second, closer proximity of the fingertip to the key or touch screen is determined. The size of the key is further enlarged by a second enlargement amount to assist the user in touching the key and avoiding touching another, adjacent key on the keyboard.
    Type: Application
    Filed: March 4, 2013
    Publication date: September 4, 2014
    Applicant: International Business Machines Corporation
    Inventor: Kaleb D. Walton
  • Publication number: 20140059641
    Abstract: A computer receives entry of a proposed security rule during a security rule entry or editing session and determines that the proposed security rule requires review of a type of security data. The number of matches of the proposed security rule to the logged security data is determined and a user is notified as to the number of matches. The computer searches the security data and applies the proposed security rule to the security data to determine the predicted performance of the proposed security rule. The computer generates a report that may include warnings, recommendations, and information correlated to the security data. The report is presented to a user during the rule editing session, and based on the report a modification to the proposed security rule can be made.
    Type: Application
    Filed: August 22, 2012
    Publication date: February 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
  • Publication number: 20140019458
    Abstract: An approach is presented for generating a log parser. A tokenized log comprising elements is generated by delimiting a sample log based on a token. Matches between elements and attributes of fields of the sample log are determined. Positions of the matched elements are determined. Based on the matches, a ranking of the token is determined, which indicates a first likelihood that the token is a delimiter that delimits parts of the sample log. Another ranking of another token is determined, which indicates a second likelihood that the other token is the delimiter. A parser is generated based on the positions, the matches and the token. Based on the first likelihood exceeding the second likelihood, a result of parsing the sample log using the parser is presented without presenting another result of parsing the log using another parser based on the other token.
    Type: Application
    Filed: July 16, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Kaleb D. Walton
  • Patent number: 8620928
    Abstract: An approach is presented for generating a log parser. A tokenized log comprising elements is generated by delimiting a sample log based on a token. Matches between elements and attributes of fields of the sample log are determined. Positions of the matched elements are determined. Based on the matches, a ranking of the token is determined, which indicates a first likelihood that the token is a delimiter that delimits parts of the sample log. Another ranking of another token is determined, which indicates a second likelihood that the other token is the delimiter. A parser is generated based on the positions, the matches and the token. Based on the first likelihood exceeding the second likelihood, a result of parsing the sample log using the parser is presented without presenting another result of parsing the log using another parser based on the other token.
    Type: Grant
    Filed: July 16, 2012
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventor: Kaleb D. Walton