Patents by Inventor Mark A. Shewell

Mark A. Shewell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190073394
    Abstract: A method for aggregating data in database tables. A computer receives a request to create an aggregation object comprising a set of related tables and aggregation rules. The computer system creates an aggregation object comprising multiple tables with related key and data columns and managed as a single entity with a single definition. Upon receiving data in the form of a new, inserted, or updated row, the computer system automatically aggregates the data to all objects in the aggregation object hierarchy by creating a summarized row for the current table using the inserted, merged or updated row and defined aggregation rules for each object.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 7, 2019
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Publication number: 20190025939
    Abstract: An approach is provided that determines a user context that corresponds to a user of an information handling system. A number of predicted words are generated from various sources, with some of the words having a corresponding word-based context. The user context is compared to the word based context to identify at least one of the predicted words. The predicted words are displayed on a display device in a text messaging system utilized by the user, with the displayed word being selectable as a word to insert in a text message.
    Type: Application
    Filed: July 24, 2017
    Publication date: January 24, 2019
    Inventors: Kushal S. Patel, Sarvesh S. Patel, Mark A. Shewell, Gandhi Sivakumar
  • Patent number: 10169404
    Abstract: A method for aggregating data in database tables. A computer receives a request to create an aggregation object comprising a set of related tables and aggregation rules. The computer system creates an aggregation object comprising multiple tables with related key and data columns and managed as a single entity with a single definition. Upon receiving data in the form of a new, inserted, or updated row, the computer system automatically aggregates the data to all objects in the aggregation object hierarchy by creating a summarized row for the current table using the inserted, merged or updated row and defined aggregation rules for each object.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Patent number: 10143022
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180248777
    Abstract: Technical features are described for facilitating streaming of monitoring data from a server to multiple analytics nodes. For example, a method for streaming the monitoring data includes registering, by a data streamer, an analytics node by creating a profile corresponding to the analytics node. The method further includes adding, to the profile, a data type used by an insight engine that is executed by the analytics node. The method further includes streaming data of the data type to the analytics node for the insight engine to analyze, based on the profile.
    Type: Application
    Filed: February 27, 2017
    Publication date: August 30, 2018
    Inventors: Al Chakra, Mik Clarke, Mark Shewell
  • Publication number: 20180203999
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: December 18, 2017
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180203997
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: January 19, 2017
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180204000
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: February 6, 2018
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 10025803
    Abstract: According to embodiments of the present invention, two or more attributes that are included in a plurality of attributes are aggregated into a group defined by a first data definition language syntax. The first data definition language syntax defines the group as having a groupID and one or more of an attribute definition defined in a comma-separated list and a group definition. The attribute definition is defined by a second data definition syntax. The first data definition language syntax includes the second data definition language syntax. The first data definition language syntax is structured in a manner to allow a database operation associated with the group to be applied to all attributes and/or groups included therein.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Patent number: 10001984
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9977798
    Abstract: A method for migrating data between tables. The method includes, receiving a Structured Query Language (SQL) statement, where the SQL statement identifies a source table and a destination table, and the source table contains source data divided into columns with a set of column names. A database management system identifies a set of instructions for manipulating the source data. The database management system generates an interim SQL statement, based on the SQL statement. The database management system executes the interim SQL statement, which copies the manipulated source data into a set of columns of the destination table.
    Type: Grant
    Filed: July 20, 2015
    Date of Patent: May 22, 2018
    Assignee: International Business Machines Corporation
    Inventors: Karla Bester, Allan T. Chandler, Mark A. Shewell, Stephen J. Yates
  • Publication number: 20180129687
    Abstract: A computer-implemented method for managing a database space includes writing, via a processor, a purge rule to a database management system (DBMS). When the purge rule is executed by the DBMS they automatically purge data in one or more databases at regular intervals. The method includes executing, via a DBMS processor, the purge rule. The purge rule is configured to define, via the DBMS processor, a purge object having purge object attributes without user intervention, and purge, via the DBMS processor, the data based on the purge rule at intervals defined by the purge rule attributes and without user intervention.
    Type: Application
    Filed: November 8, 2016
    Publication date: May 10, 2018
    Inventors: Karla Bester, Mark A. Shewell, Stephen J. Yates
  • Publication number: 20180103494
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Application
    Filed: December 8, 2017
    Publication date: April 12, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180103493
    Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Application
    Filed: December 8, 2017
    Publication date: April 12, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9930610
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180052676
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.
    Type: Application
    Filed: August 17, 2016
    Publication date: February 22, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9854612
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: December 26, 2017
    Assignee: Internataionl Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20170344386
    Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
    Type: Application
    Filed: January 18, 2017
    Publication date: November 30, 2017
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20170346926
    Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20170289765
    Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.
    Type: Application
    Filed: July 7, 2016
    Publication date: October 5, 2017
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell