Patents by Inventor Leigh Williamson
Leigh Williamson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10642675Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.Type: GrantFiled: July 17, 2019Date of Patent: May 5, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
-
Patent number: 10621074Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.Type: GrantFiled: August 7, 2018Date of Patent: April 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
-
Patent number: 10614215Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.Type: GrantFiled: November 29, 2018Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
-
Patent number: 10606731Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: GrantFiled: April 23, 2019Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
-
Patent number: 10606734Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.Type: GrantFiled: June 8, 2018Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
-
Publication number: 20200056897Abstract: A method, computer program product, and a system where a processor(s) monitors activities of a user operating a vehicle with a navigational device providing route guidance, via a first route, to a geographic destination. The processor(s) identifies driving patterns of the user to generate a driver profile for the user, including a baseline activity pattern. The processor(s) determines, at a given time, that the monitored activities of the user are outside of the baseline activity pattern and enables an integrated image capture device in the vehicle and captures images of an environment outside of a the vehicle. The processor(s) utilizes the image capture device, to capture images and derives data describing environmental conditions, based on performing a semantic analysis of the images. The processor(s) transmits the data to a repository and generates a second route to the destination, based on the driver profile and relevant data from the repository data.Type: ApplicationFiled: August 14, 2018Publication date: February 20, 2020Inventors: Leigh Williamson, Vijay Ekambaram, Shinoj Zacharias, Roger Snook, Howard N. Anglin
-
Publication number: 20190377629Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.Type: ApplicationFiled: July 17, 2019Publication date: December 12, 2019Inventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
-
Publication number: 20190377628Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.Type: ApplicationFiled: June 11, 2018Publication date: December 12, 2019Inventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
-
Publication number: 20190317878Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: ApplicationFiled: April 23, 2019Publication date: October 17, 2019Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
-
Patent number: 10432418Abstract: Methods and systems may provide for technology to extract relationship data from one or more social networks and generate a trust network based on the relationship data, wherein the trust network identifies one or more trusted individuals. The technology also grants access to the smart device system with respect to the one or more trusted individuals.Type: GrantFiled: July 13, 2018Date of Patent: October 1, 2019Assignee: International Business Machines CorporationInventors: Jesus Alva, Leigh Williamson, Ricardo Olivieri
-
Publication number: 20190151758Abstract: A set of data associated with one or more real world conditions is received over at least one wireless network and from one or more sources. It is determined, based at least on a quantity of string instances of the set of data that match each other, that a first subset of the set of data surpasses an interest level threshold. A second subset of the set of data does not surpass the interest level threshold. At least one unique virtual entity is generated for use in a virtual environment of a virtual game based on the first subset of data surpassing the interest level threshold.Type: ApplicationFiled: November 22, 2017Publication date: May 23, 2019Inventors: Howard N. Anglin, Simon D. Mikulcik, Michael Rowden, Jillian F. Tempelmeyer, Leigh A. Williamson
-
Publication number: 20190114415Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.Type: ApplicationFiled: November 29, 2018Publication date: April 18, 2019Inventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
-
Patent number: 10257781Abstract: Context-based coordinated data retrieval for mobile devices is provided. An interface between application code of a mobile device and an operating system of the mobile device receives a declarative language based data-retrieval request made by the application code for data from an I/O device of the mobile device. Based on operating context of the mobile device, opportunistic coordination rule(s) are selected from a local rules cache, the rule(s) representative of at least one power-saving option for retrieving data for responding to the request. The rule(s) are evaluated to determine how to retrieve data for responding to the request, and action(s) are performed based on the evaluating, the action(s) including responding to the request.Type: GrantFiled: November 6, 2017Date of Patent: April 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Ekambaram, Roger C. Snook, Leigh A. Williamson, Shinoj Zacharias
-
Patent number: 10248546Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.Type: GrantFiled: December 15, 2017Date of Patent: April 2, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
-
Publication number: 20190065341Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: ApplicationFiled: October 30, 2018Publication date: February 28, 2019Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
-
Publication number: 20190057013Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: ApplicationFiled: October 24, 2018Publication date: February 21, 2019Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
-
Publication number: 20190034828Abstract: A computer-implemented method comprising receiving and analyzing a data point to determine parameters of the data point, generating an alert ticket based on the analysis of the data point, communicating, via a chatbot, at least some information contained in the alert ticket to one or more users, and categorizing, via the chatbot, the data point that resulted in the alert ticket based on behavior of a device that generated the data point.Type: ApplicationFiled: November 6, 2017Publication date: January 31, 2019Inventors: Jonathan A. Cagadas, Alexander D. Lewitt, Simon D. Mikulcik, Karan Shukla, Leigh A. Williamson
-
Publication number: 20190034824Abstract: An apparatus comprises a memory and a processor coupled to the memory. The processor is configured to receive input from a cloud service data source, wherein the input comprises at least one data point, analyze the data point via a machine learning model to determine characteristics indicated by the data point, determine whether the characteristics indicated by the data point meet an alert threshold that indicates a problem in a network, generate an alert ticket when the characteristics indicated by the data point meet the alert threshold, wherein the alert ticket indicates the problem in the network, communicate with a user based on contents of the alert ticket, receive feedback from the user relating to the alert ticket, and train the machine learning model according to the feedback received from the user.Type: ApplicationFiled: July 27, 2017Publication date: January 31, 2019Inventors: Jonathan A. Cagadas, Alexander D. Lewitt, Simon D. Mikulcik, Karan Shukla, Leigh A. Williamson
-
Patent number: 10169576Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.Type: GrantFiled: November 15, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
-
Patent number: 10169202Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: GrantFiled: November 15, 2017Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias