Patents by Inventor Michael Spisak
Michael Spisak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11211072Abstract: Embodiments generally relate placing a voice response system into a forced sleep state. In some embodiments, a method includes receiving a voice command from a given user to place a voice response system in a woke state. The method further includes obtaining current context data, and analyzing the current context data using a voice response model trained using a voice response corpus that incorporated a history of interactions and context data by one or more users with the voice response system. The method further includes, from the analysis of the current context data using the voice response model, determining whether the voice response system is to be placed in the woke state; and, responsive to determining that the voice response system is not to be placed in the woke state, placing the voice response system in a sleep state contrary to the voice command.Type: GrantFiled: January 23, 2020Date of Patent: December 28, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shikhar Kwatra, Adam Lee Griffin, Michael Spisak, Sarbajit K. Rakshit
-
Publication number: 20210233524Abstract: Embodiments generally relate placing a voice response system into a forced sleep state. In some embodiments, a method includes receiving a voice command from a given user to place a voice response system in a woke state. The method further includes obtaining current context data, and analyzing the current context data using a voice response model trained using a voice response corpus that incorporated a history of interactions and context data by one or more users with the voice response system. The method further includes, from the analysis of the current context data using the voice response model, determining whether the voice response system is to be placed in the woke state; and, responsive to determining that the voice response system is not to be placed in the woke state, placing the voice response system in a sleep state contrary to the voice command.Type: ApplicationFiled: January 23, 2020Publication date: July 29, 2021Inventors: Shikhar KWATRA, Adam Lee GRIFFIN, Michael SPISAK, Sarbajit K. RAKSHIT
-
Patent number: 11012472Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.Type: GrantFiled: December 5, 2018Date of Patent: May 18, 2021Assignee: International Business Machines CorporationInventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
-
Patent number: 10771493Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.Type: GrantFiled: September 18, 2018Date of Patent: September 8, 2020Assignee: International Business Machines CorporationInventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
-
Publication number: 20200186569Abstract: Security rules management mechanisms are provided. A cognitive computing system of the security rules management system ingests natural language content, from one or more corpora, describing features of security attacks, and ingests security event log data from a monitored computing environment. The cognitive computing system processes the natural language content from the one or more corpora and the security event log data to identify attack characteristics applicable to the security event log data. A security rule query engine evaluates existing security rules present in a security rules database to determine if any existing security rule addresses the attack characteristics. In response to the evaluation indicating that no existing security rule addresses the attack characteristics, a security rule generator automatically generates a new security rule based on the attack characteristics, which is then deployed to the monitored computing environment.Type: ApplicationFiled: December 5, 2018Publication date: June 11, 2020Inventors: Marina Milazzo, Michael Spisak, Carlos Alberto Lopez Chinchilla, Steven D. McKay, Eric Hanratty
-
Publication number: 20200092319Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.Type: ApplicationFiled: September 18, 2018Publication date: March 19, 2020Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
-
Patent number: 10372800Abstract: A method, system, and computer program product for managing presentations. A user input defining content for a new presentation is received at a presentation manager in a drafting mode in a computer system. A slide for the new presentation using the user input, a presentation knowledgebase of presentations, and a presentation style profile defining a presentation style for a user is created. A context for the slide is defined, wherein the context aids in conveying a meaning intended by the user for the content. The slide is placed in the new presentation.Type: GrantFiled: November 9, 2017Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventors: Mariya Ali, Rhonda L. Childress, Justin Grant, Michael Spisak
-
Publication number: 20190138579Abstract: A method, system, and computer program product for managing presentations. A user input defining content for a new presentation is received at a presentation manager in a drafting mode in a computer system. A slide for the new presentation using the user input, a presentation knowledgebase of presentations, and a presentation style profile defining a presentation style for a user is created. A context for the slide is defined, wherein the context aids in conveying a meaning intended by the user for the content. The slide is placed in the new presentation.Type: ApplicationFiled: November 9, 2017Publication date: May 9, 2019Inventors: Mariya Ali, Rhonda L. Childress, Justin Grant, Michael Spisak
-
Publication number: 20070226680Abstract: The dynamic workflow documentation system is a computer implemented process comprising the following steps: The dynamic workflow documentation system starts a workflow manager program, a class loader program in a computer memory and creates an instance of a workflow program in the computer memory. The dynamic workflow documentation system extracts metadata properties from the workflow program and records the metadata properties in the memory. The dynamic workflow documentation system notifies the workflow manager that a new instance of the workflow program has been created and repeats the steps of creating an instance of a workflow component program, extracting metadata properties, recording the metadata properties and notifying the workflow manager for all workflow components associated with the workflow program.Type: ApplicationFiled: March 23, 2006Publication date: September 27, 2007Inventors: David Kumhyr, Patrick Brooks, Rhonda Childress, Michael Spisak
-
Publication number: 20070168471Abstract: A method of providing network resources for performing a target task includes determining a set of network accessible devices located at a location where the target task is to be accomplished and determining required user interface input/output hardware capabilities needed to accomplish the target task. The method further includes determining a target system configuration needed to accomplish the target task, selecting at least one of the network accessible devices based on the required user interface input/output hardware capabilities and the determined target system configuration, and providing configuration instructions to the selected device based on the device determination.Type: ApplicationFiled: January 17, 2006Publication date: July 19, 2007Inventors: Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20070168347Abstract: A computer implemented method, data processing system, and a computer program product are provided for deriving optimal physical space and ambiance conditions for a user. A physical space analyzer comprising an information sensor and an optimal space analyzer detects a broadcast of characteristics of a set of nearby physical spaces. In turn, the physical space analyzer produces a ranking of the set of nearby physical spaces using the characteristics based on preferences of the user as expressed by the user's profile. An ambiance optimizer is provided to refine the ranking of the set of nearby physical spaces based on dynamically input preferences of the user.Type: ApplicationFiled: January 17, 2006Publication date: July 19, 2007Inventors: Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20070067741Abstract: A method and article of manufacture in computer readable form for web page navigation without use of a computer mouse. A computer program is executed on a central processing unit (CPU) of a computer system that includes a keyboard and a display screen. A first web page, which includes at least one Universal Resource Locator (URL), is fetched. The fetched first web page is parsed. As each URL of the at least one URL on the first web page is encountered during the parsing of the first web page, computer code that associates a two-key code with each URL on the first web page is generated and executed. The first web page is displayed on the display screen, which includes depicting on the displayed first web page: each two-key code and an indication of which URL on the first web page each two-key code is associated with.Type: ApplicationFiled: November 7, 2006Publication date: March 22, 2007Inventor: Michael Spisak
-
Publication number: 20070061182Abstract: The invention comprises a method of reporting and displaying workflow status information in a computer system having a workflow application and a graphical user interface including a display, the method comprising retrieving a set of metadata properties from a memory in the computer system, wherein at least one metadata property represents the number of workflow instances running in the workflow application, and at least one metadata property represents the type of each workflow instance running in the workflow application; and displaying on the display the number and type of each workflow instances running in the workflow application.Type: ApplicationFiled: September 13, 2005Publication date: March 15, 2007Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20070061358Abstract: The invention is a computer-implemented workflow application comprising one or more workflow components, each workflow component comprising an object having a metadata property; a workflow program comprising workflow components connected together to execute an operational workflow; a class loader program operable to introspect the objects and extract the metadata properties when each workflow component of the workflow program is executed, and store the metadata properties in a memory; and a workflow manager program operable to analyze the metadata stored in the memory and provide requested status information.Type: ApplicationFiled: September 13, 2005Publication date: March 15, 2007Inventors: Patrick Brooks, Rhonda Childress, David Kumhyr, Michael Spisak
-
Publication number: 20060206906Abstract: A web services endpoint emulator for testing and developing web server client program, which generates a service interface and makes the interface available for client consumption. Service interfaces are exposed with configuration options for each service. The configuration options produced by the invention includes pre-configured responses or the ability to prescript service responses from a configuration file, and to prompt a user for input during real time emulation of an endpoint service.Type: ApplicationFiled: March 10, 2005Publication date: September 14, 2006Applicant: International Business Machines CorporationInventors: Patrick Brooks, Rhonda Childress, Michael Spisak
-
Publication number: 20060161615Abstract: A method and program for providing the ability for systems personnel to use a personal wireless device, such as a mobile phone, palm device, or blackberry device, to receive a system alert regarding a developing situation requiring action and to be notified of pre-selected workflows that can resolve the situation prompting the alert. The systems personnel are then able to select a workflow, provide needed parameters, and provide the human approval to execute the workflow. The application packages the information provided by the user into a form usable by the orchestration/provisioning server. The server will perform the requested workflow as if entered on a local console and will respond to the device with a workflow status.Type: ApplicationFiled: January 20, 2005Publication date: July 20, 2006Inventors: Patrick Brooks, Rhonda Childress, Michael Spisak
-
Patent number: 7038134Abstract: A coaxial cable termination system for providing a reliable electrical connection of an end of a coaxial cable to an electrical device. An electrically conductive core body is cast over the core of the coaxial cable, and an electrically conductive shield body is cast over the shield of the coaxial cable, wherein the core and shield bodies are electrically and mechanically connected to the coaxial cable, yet the core and shield bodies mutually have direct current electrical isolation with respect to each other. Each of the core and shield bodies has respective attachment features for a particular application, such as for example connecting to a circuit board.Type: GrantFiled: February 4, 2004Date of Patent: May 2, 2006Assignee: Delphi Technologies, Inc.Inventors: James D. Daugherty, Frederick Donald Esenwein, Joseph Howard Gladd, William C Ketterer, Andrew Michael Spisak