Patents by Inventor Mark A. Shewell
Mark A. Shewell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11232099Abstract: A method for aggregating data in database tables. A computer receives a request to create an aggregation object comprising a set of related tables and aggregation rules. The computer system creates an aggregation object comprising multiple tables with related key and data columns and managed as a single entity with a single definition. Upon receiving data in the form of a new, inserted, or updated row, the computer system automatically aggregates the data to all objects in the aggregation object hierarchy by creating a summarized row for the current table using the inserted, merged or updated row and defined aggregation rules for each object.Type: GrantFiled: November 2, 2018Date of Patent: January 25, 2022Assignee: International Business Machines CorporationInventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
-
Patent number: 11023325Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: GrantFiled: May 29, 2019Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10999363Abstract: An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.Type: GrantFiled: March 22, 2016Date of Patent: May 4, 2021Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10938943Abstract: Technical features are described for facilitating streaming of monitoring data from a server to multiple analytics nodes. For example, a method for streaming the monitoring data includes registering, by a data streamer, an analytics node by creating a profile corresponding to the analytics node. The method further includes adding, to the profile, a data type used by an insight engine that is executed by the analytics node. The method further includes streaming data of the data type to the analytics node for the insight engine to analyze, based on the profile.Type: GrantFiled: February 27, 2017Date of Patent: March 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Mik Clarke, Mark Shewell
-
Patent number: 10783125Abstract: A computer-implemented method for managing a database space includes writing, via a processor, a purge rule to a database management system (DBMS). When the purge rule is executed by the DBMS they automatically purge data in one or more databases at regular intervals. The method includes executing, via a DBMS processor, the purge rule. The purge rule is configured to define, via the DBMS processor, a purge object having purge object attributes without user intervention, and purge, via the DBMS processor, the data based on the purge rule at intervals defined by the purge rule attributes and without user intervention.Type: GrantFiled: November 8, 2016Date of Patent: September 22, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Karla Bester, Mark A. Shewell, Stephen J. Yates
-
Patent number: 10783198Abstract: A database management system provides row based filtering of data at a database level by evaluating content of at least one record of a write data request received from an application for a particular table from among at least one table of a database, against at least one filter rule specified for the particular table. The database management system selects, for the at least one record, whether to store the at least one record of the write data request as a separate row in the particular table based on a separate action triggered for the at least one record when evaluated against the at least one filter rule specified for the particular table, each record not selected for storage being silently discarded.Type: GrantFiled: May 1, 2017Date of Patent: September 22, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
-
Patent number: 10715318Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: GrantFiled: January 23, 2018Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10636320Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: GrantFiled: November 20, 2017Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10628183Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: January 18, 2017Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10613880Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: May 31, 2016Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190278658Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190229896Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: ApplicationFiled: January 23, 2018Publication date: July 25, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190220597Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: April 3, 2019Publication date: July 18, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10346249Abstract: A method to resolve or prevent a computer system failure is provided. The method may include capturing a plurality of snapshots associated with a computer system installation environment during a plurality of key times. The method may also include measuring each snapshot within the captured plurality of snapshots according to a measure of system health. The method may further include using each measured snapshot to develop a plurality of learned patterns of good and bad software installations. The method may additionally include providing a probability associated with a proposed installation operation based on the developed plurality of learned patterns of good and bad software installations. The method may also include providing at least one installation recommendation in response to a recovery from a system failure, whereby the provided at least one installation recommendation is based on the developed plurality of learned patterns of good and bad software installations.Type: GrantFiled: January 10, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Travis J. Kirke, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10313948Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: July 7, 2016Date of Patent: June 4, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190156696Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10289845Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: December 18, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10289844Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: January 19, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10264500Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: March 31, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10231269Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: December 8, 2017Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell