Patents by Inventor Michael Spisak

Michael Spisak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11211072
    Abstract: Embodiments generally relate placing a voice response system into a forced sleep state. In some embodiments, a method includes receiving a voice command from a given user to place a voice response system in a woke state. The method further includes obtaining current context data, and analyzing the current context data using a voice response model trained using a voice response corpus that incorporated a history of interactions and context data by one or more users with the voice response system. The method further includes, from the analysis of the current context data using the voice response model, determining whether the voice response system is to be placed in the woke state; and, responsive to determining that the voice response system is not to be placed in the woke state, placing the voice response system in a sleep state contrary to the voice command.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: December 28, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar Kwatra, Adam Lee Griffin, Michael Spisak, Sarbajit K. Rakshit
  • Publication number: 20210233524
    Abstract: Embodiments generally relate placing a voice response system into a forced sleep state. In some embodiments, a method includes receiving a voice command from a given user to place a voice response system in a woke state. The method further includes obtaining current context data, and analyzing the current context data using a voice response model trained using a voice response corpus that incorporated a history of interactions and context data by one or more users with the voice response system. The method further includes, from the analysis of the current context data using the voice response model, determining whether the voice response system is to be placed in the woke state; and, responsive to determining that the voice response system is not to be placed in the woke state, placing the voice response system in a sleep state contrary to the voice command.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 29, 2021
    Inventors: Shikhar KWATRA, Adam Lee GRIFFIN, Michael SPISAK, Sarbajit K. RAKSHIT
  • Patent number: 11012472
    Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: May 18, 2021
    Assignee: International Business Machines Corporation
    Inventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
  • Patent number: 10771493
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20200186569
    Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.
    Type: Application
    Filed: December 5, 2018
    Publication date: June 11, 2020
    Inventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
  • Publication number: 20200092319
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Patent number: 10372800
    Abstract: A method, system, and computer program product for managing presentations. A user input defining content for a new presentation is received at a presentation manager in a drafting mode in a computer system. A slide for the new presentation using the user input, a presentation knowledgebase of presentations, and a presentation style profile defining a presentation style for a user is created. A context for the slide is defined, wherein the context aids in conveying a meaning intended by the user for the content. The slide is placed in the new presentation.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mariya Ali, Rhonda L. Childress, Justin Grant, Michael Spisak
  • Publication number: 20190138579
    Abstract: A method, system, and computer program product for managing presentations. A user input defining content for a new presentation is received at a presentation manager in a drafting mode in a computer system. A slide for the new presentation using the user input, a presentation knowledgebase of presentations, and a presentation style profile defining a presentation style for a user is created. A context for the slide is defined, wherein the context aids in conveying a meaning intended by the user for the content. The slide is placed in the new presentation.
    Type: Application
    Filed: November 9, 2017
    Publication date: May 9, 2019
    Inventors: Mariya Ali, Rhonda L. Childress, Justin Grant, Michael Spisak
  • Publication number: 20070226680
    Abstract: The dynamic workflow documentation system is a computer implemented process comprising the following steps: The dynamic workflow documentation system starts a workflow manager program, a class loader program in a computer memory and creates an instance of a workflow program in the computer memory. The dynamic workflow documentation system extracts metadata properties from the workflow program and records the metadata properties in the memory. The dynamic workflow documentation system notifies the workflow manager that a new instance of the workflow program has been created and repeats the steps of creating an instance of a workflow component program, extracting metadata properties, recording the metadata properties and notifying the workflow manager for all workflow components associated with the workflow program.
    Type: Application
    Filed: March 23, 2006
    Publication date: September 27, 2007
    Inventors: David Kumhyr, Patrick Brooks, Rhonda Childress, Michael Spisak
  • Publication number: 20070168471
    Abstract: A method of providing network resources for performing a target task includes determining a set of network accessible devices located at a location where the target task is to be accomplished and determining required user interface input/output hardware capabilities needed to accomplish the target task. The method further includes determining a target system configuration needed to accomplish the target task, selecting at least one of the network accessible devices based on the required user interface input/output hardware capabilities and the determined target system configuration, and providing configuration instructions to the selected device based on the device determination.
    Type: Application
    Filed: January 17, 2006
    Publication date: July 19, 2007
    Inventors: Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20070168347
    Abstract: A computer implemented method, data processing system, and a computer program product are provided for deriving optimal physical space and ambiance conditions for a user. A physical space analyzer comprising an information sensor and an optimal space analyzer detects a broadcast of characteristics of a set of nearby physical spaces. In turn, the physical space analyzer produces a ranking of the set of nearby physical spaces using the characteristics based on preferences of the user as expressed by the user's profile. An ambiance optimizer is provided to refine the ranking of the set of nearby physical spaces based on dynamically input preferences of the user.
    Type: Application
    Filed: January 17, 2006
    Publication date: July 19, 2007
    Inventors: Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20070067741
    Abstract: A method and article of manufacture in computer readable form for web page navigation without use of a computer mouse. A computer program is executed on a central processing unit (CPU) of a computer system that includes a keyboard and a display screen. A first web page, which includes at least one Universal Resource Locator (URL), is fetched. The fetched first web page is parsed. As each URL of the at least one URL on the first web page is encountered during the parsing of the first web page, computer code that associates a two-key code with each URL on the first web page is generated and executed. The first web page is displayed on the display screen, which includes depicting on the displayed first web page: each two-key code and an indication of which URL on the first web page each two-key code is associated with.
    Type: Application
    Filed: November 7, 2006
    Publication date: March 22, 2007
    Inventor: Michael Spisak
  • Publication number: 20070061182
    Abstract: The invention comprises a method of reporting and displaying workflow status information in a computer system having a workflow application and a graphical user interface including a display, the method comprising retrieving a set of metadata properties from a memory in the computer system, wherein at least one metadata property represents the number of workflow instances running in the workflow application, and at least one metadata property represents the type of each workflow instance running in the workflow application; and displaying on the display the number and type of each workflow instances running in the workflow application.
    Type: Application
    Filed: September 13, 2005
    Publication date: March 15, 2007
    Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20070061358
    Abstract: The invention is a computer-implemented workflow application comprising one or more workflow components, each workflow component comprising an object having a metadata property; a workflow program comprising workflow components connected together to execute an operational workflow; a class loader program operable to introspect the objects and extract the metadata properties when each workflow component of the workflow program is executed, and store the metadata properties in a memory; and a workflow manager program operable to analyze the metadata stored in the memory and provide requested status information.
    Type: Application
    Filed: September 13, 2005
    Publication date: March 15, 2007
    Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
  • Publication number: 20060206906
    Abstract: A web services endpoint emulator for testing and developing web server client program, which generates a service interface and makes the interface available for client consumption. Service interfaces are exposed with configuration options for each service. The configuration options produced by the invention includes pre-configured responses or the ability to prescript service responses from a configuration file, and to prompt a user for input during real time emulation of an endpoint service.
    Type: Application
    Filed: March 10, 2005
    Publication date: September 14, 2006
    Applicant: International Business Machines Corporation
    Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
  • Publication number: 20060161615
    Abstract: A method and program for providing the ability for systems personnel to use a personal wireless device, such as a mobile phone, palm device, or blackberry device, to receive a system alert regarding a developing situation requiring action and to be notified of pre-selected workflows that can resolve the situation prompting the alert. The systems personnel are then able to select a workflow, provide needed parameters, and provide the human approval to execute the workflow. The application packages the information provided by the user into a form usable by the orchestration/provisioning server. The server will perform the requested workflow as if entered on a local console and will respond to the device with a workflow status.
    Type: Application
    Filed: January 20, 2005
    Publication date: July 20, 2006
    Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
  • Patent number: 7038134
    Abstract: A coaxial cable termination system for providing a reliable electrical connection of an end of a coaxial cable to an electrical device. An electrically conductive core body is cast over the core of the coaxial cable, and an electrically conductive shield body is cast over the shield of the coaxial cable, wherein the core and shield bodies are electrically and mechanically connected to the coaxial cable, yet the core and shield bodies mutually have direct current electrical isolation with respect to each other. Each of the core and shield bodies has respective attachment features for a particular application, such as for example connecting to a circuit board.
    Type: Grant
    Filed: February 4, 2004
    Date of Patent: May 2, 2006
    Assignee: Delphi Technologies, Inc.
    Inventors: James D. Daugherty, Frederick Donald Esenwein, Joseph Howard Gladd, William C Ketterer, Andrew Michael Spisak