Patents by Inventor Melanie Dauber
Melanie Dauber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11989085Abstract: In an approach for predicting an optimal system upgrade, a processor detects an upgrade is available for a system of a first user computing device. A processor gathers a set of live data from an environment of the first user computing device using a process mining software. A processor compares the set of live data to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device. Responsive to identifying the second user computing device, a processor performs a pattern recognition to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device. A processor schedules the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.Type: GrantFiled: March 28, 2022Date of Patent: May 21, 2024Assignee: International Business Machines CorporationInventors: Melanie Dauber, Jaclyn Rudolf, Zachary A. Silverstein, Jeremy R. Fox
-
Publication number: 20240161027Abstract: A method includes: receiving, by a processor set, user input defining parameters of a project; receiving, by the processor set, opt-in input from team members defined in the parameters of the project; retrieving, by the processor set and from electronic data sources, data that corresponds to performance of tasks of the project by each of the team members; generating, by the processor set and based on the retrieved data, a respective contribution score of each of the team members; generating, by the processor set and based on the respective contribution scores of each of the team members, a respective allocation score of each of the team members; allocating, by the processor set, an award to the team members based on the respective allocation scores of each of the team members.Type: ApplicationFiled: November 11, 2022Publication date: May 16, 2024Inventors: Zachary A. Silverstein, Melanie Dauber, Jacob Ryan Jepperson, Jeremy R. Fox, Spencer Thomas Reynolds
-
Publication number: 20240129434Abstract: A computer-implemented method, according to one embodiment, includes monitoring, during a live web conference, audio and video data associated with participants of the live web conference. The participants include at least a first participant and a second participant. The method further includes analyzing the first participant's behavior to determine whether to classify the first participant's behavior as being indicative of sound-aware actions, and presenting information, based on the analysis, on a first user device of the first participant regarding audio and/or video data output from the first user device. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.Type: ApplicationFiled: October 14, 2022Publication date: April 18, 2024Inventors: Zachary A. Silverstein, Melanie Dauber, Jacob Ryan Jepperson, Jeremy R. Fox
-
Publication number: 20240103492Abstract: A method for data transfer from a legacy system to a modernized application alternative to the legacy system is provided. A Robotic Process Automation (RPA) agent monitors incoming legacy payloads. The RPA agent creates an integration pathway from the legacy system to the modernized application alternative to the legacy system. The RPA agent intercepts the incoming legacy payloads using any of payload injection, cancellation, or workflow interruption by integrating the RPA agent at a User Interface (UI) or an Application Programming Interface (API) level. The RPA agent captures the incoming legacy payloads. The RPA agent executes a determination of heritage, modernized, or mixed origination. The method also includes installing, through the integration pathway under a control of the RPA agent, portions of the legacy system corresponding to the incoming legacy payloads into the modernized application alternative to the legacy system responsive to the determination of heritage, modernized, or mixed origination.Type: ApplicationFiled: September 27, 2022Publication date: March 28, 2024Inventors: Melanie Dauber, Zachary A. Silverstein, Jacob Ryan Jepperson, Spencer Thomas Reynolds, Jeremy R. Fox
-
Publication number: 20240073365Abstract: Aspects of the present disclosure relate to web conference contact routing. An indication of a first participant device of a web conference attempting to contact a second participant device of the web conference can be received, where the second participant device is designated as a screen sharer within the web conference during a time of the contact and where the contact is configured to be received on a display shared in the web conference. Two or more candidate devices for routing the contact from the first participant device to can be identified. A candidate device of the two or more candidate devices for routing the contact from the first participant device to can be selected using a set of selection criteria. Contact from the first participant device can be routed to the selected candidate device instead of the display of the second participant device shared in the web conference.Type: ApplicationFiled: August 23, 2022Publication date: February 29, 2024Inventors: Melanie Dauber, Zachary A. Silverstein, Jacob Ryan Jepperson, Jeremy R. Fox, Spencer Thomas Reynolds
-
Patent number: 11916863Abstract: In an approach, a processor monitors messaging data between a plurality of users from a first collaboration application. A processor identifies an unanswered message within the first messaging data. A processor, subsequent to identifying the unanswered message, identifies that the plurality of users attends a collaborative session. A processor captures a second messaging data of the collaborative session. A processor determines that the second messaging data contains subject matter that meets a threshold of similarity to the unanswered message. A processor annotates the unanswered message.Type: GrantFiled: January 13, 2023Date of Patent: February 27, 2024Assignee: International Business Machines CorporationInventors: Jacob Ryan Jepperson, Zachary A. Silverstein, Melanie Dauber, Logan Bailey, Jeremy R. Fox
-
Patent number: 11915730Abstract: A computer program product, device, system, and method are provided for decommissioning a tape cartridge internally within a tape library. In one embodiment automated tape cartridge decommissioning operations internal within a tape library, include receiving selection of a tape cartridge for decommissioning in a tape library and, using a tape library robotic accessor, moving a selected tape cartridge to a decommission workstation within the tape library. The selected tape cartridge is mounted to the decommission workstation and a fusing element of the decommission workstation is activated to fuse together layers of magnetic tape of the selected tape cartridge mounted to the decommission workstation, so that the selected tape cartridge is decommissioned within the tape library to have a decommissioned status.Type: GrantFiled: June 13, 2023Date of Patent: February 27, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Leonard G. Jesionowski, Melanie Dauber, Shawn M. Nave, Benjamin K. Rawlins
-
Publication number: 20240061690Abstract: A computer-implemented method according to one embodiment includes embedding natural language processing (NLP) and/or user action capture into a browser to monitor a user's intent when navigating web page(s) within the browser. An indication of a navigation to a first web page via the browser is received and it is determined whether a first action attempted to be taken on the first web page matches the user's intent. In response to a determination that the first action attempted to be taken on the first web page does not match the user's intent, an intent-based blocking action is issued to prevent the first action on the first web page. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.Type: ApplicationFiled: August 17, 2022Publication date: February 22, 2024Inventors: Melanie Dauber, Zachary A. Silverstein, Jacob Ryan Jepperson, Spencer Thomas Reynolds, Jeremy R. Fox, Alexander James Parker
-
Publication number: 20240022793Abstract: Systems, methods and/or computer program products issuing and transferring presentation rights between users during digital events using NFTs and incentivizing audiences to remain active attendees of digital event as new presenters take over the presentation. Value exchanged for obtaining NFTs representing presentation rights can correlate to a speaker score which is calculated using audience metrics collected by the platform. Presenters with higher presenter scores and larger or more active audiences can result in higher valuations, increasing the value of the NFT being purchased. Exchanges of value and NFTs are executed using non-custodial wallets and/or smart contracts. The value exchanged for the NFT can be split between original presenters' wallets and wallets of the audience members in pre-determined ratios.Type: ApplicationFiled: July 14, 2022Publication date: January 18, 2024Inventors: Zachary A. Silverstein, Melanie Dauber, Jacob Ryan Jepperson, Spencer Thomas Reynolds, Jeremy R. Fox
-
Patent number: 11831709Abstract: Facilitating peer-to-peer cloud computing resource sharing utilizing a permissioned distributed ledger is provided. A request by a computational resource consumer for additional computational resources from a computational resource provider via a peer-to-peer decentralized network is detected. A computational resource exchange environment is generated to transfer the additional computational resources from the computational resource provider to the computational resource consumer in response to validating that the computational resource consumer is authorized to consume the additional computational resources and that the computational resource provider is authorized to transfer the additional computational resources to the computational resource consumer via the peer-to-peer decentralized network. The additional computational resources are transferred from the computational resource provider to the computational resource consumer for consumption via the computational resource exchange environment.Type: GrantFiled: December 7, 2022Date of Patent: November 28, 2023Assignee: International Business Machines CorporationInventors: Zachary A. Silverstein, Melanie Dauber, Jacob Ryan Jepperson, Jeremy R. Fox, Logan Bailey
-
Publication number: 20230305916Abstract: In an approach for predicting an optimal system upgrade, a processor detects an upgrade is available for a system of a first user computing device. A processor gathers a set of live data from an environment of the first user computing device using a process mining software. A processor compares the set of live data to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device. Responsive to identifying the second user computing device, a processor performs a pattern recognition to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device. A processor schedules the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.Type: ApplicationFiled: March 28, 2022Publication date: September 28, 2023Inventors: Melanie Dauber, Jaclyn Rudolf, Zachary A. Silverstein, Jeremy R. Fox
-
Patent number: 11586422Abstract: A method, system, and computer program product for implementing automated system capacity optimization is provided. The method includes retrieving from plug-in components running on a plurality of hardware and software sources, metrics data associated with the plug-in components. The metrics data is cross-referenced with respect to operational sizing recommendations for each plug-in component based on aggregated disparate sizing guidelines and resulting software code modules are generated. Software and hardware requirements for enabling target computing components are determined based on results of executing the software code modules and operational functionality of the target computing components are enabled in accordance with the software and hardware requirements.Type: GrantFiled: May 6, 2021Date of Patent: February 21, 2023Assignee: International Business Machines CorporationInventors: Melanie Dauber, Dana L. Price
-
Publication number: 20220357928Abstract: A method, system, and computer program product for implementing automated system capacity optimization is provided. The method includes retrieving from plug-in components running on a plurality of hardware and software sources, metrics data associated with the plug-in components. The metrics data is cross-referenced with respect to operational sizing recommendations for each plug-in component based on aggregated disparate sizing guidelines and resulting software code modules are generated. Software and hardware requirements for enabling target computing components are determined based on results of executing the software code modules and operational functionality of the target computing components are enabled in accordance with the software and hardware requirements.Type: ApplicationFiled: May 6, 2021Publication date: November 10, 2022Inventors: Melanie Dauber, Dana L. Price
-
Publication number: 20220321570Abstract: Shared content privilege modification is provided. An electronic message is identified containing an address for accessing shared content, where the message is for communication to a set of recipients. Existing privileges are determined for the shared content for each recipient in the set of recipients. A requested action regarding the shared content is determined by analyzing the communication using natural language processing. Privileges for the shared content are modified for at least one recipient based on the existing privileges for the at least one recipient being insufficient to perform the requested action.Type: ApplicationFiled: April 6, 2021Publication date: October 6, 2022Inventors: Dana L. Price, Heather Saunders, Kelly Camus, Melanie Dauber