Patents by Inventor Rick A. Hamilton, II

Rick A. Hamilton, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9954870
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: April 24, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 9954597
    Abstract: System, method and computer program product for extending mobile device cellular carrier network coverage using unmanned aerial vehicles (UAVs) equipped with telecommunications devices to act as temporary mobile device cellular network towers.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Maharaj Mukherjee, Monimala Mukherjee
  • Publication number: 20180109547
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Application
    Filed: December 14, 2017
    Publication date: April 19, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Publication number: 20180109638
    Abstract: A method for generating website recommendations based on user web browsing. The method includes a computer processor tracking a sequence of two or more websites traversed by a user, wherein the sequence is based, at least in part, on a web-browsing session of the user. The method further includes a computer processor identifying a plurality of sequences of websites traversed by other users, wherein the plurality of sequences of websites traversed by other users include at least one website in common with the tracked sequence of two or more websites traversed by the user. The method further includes a computer processor determining one or more recommended websites in the plurality of sequences of websites traversed by other users that are relevant to the tracked sequence of two or more websites traversed by the user. The method further includes a computer processor presenting the one or more recommended websites to the user.
    Type: Application
    Filed: December 18, 2017
    Publication date: April 19, 2018
    Inventors: Kulvir S. Bhogal, Gregory J. Boss, Sheryl L. Comes, Rick A. Hamilton, II, Anne R. Sand
  • Publication number: 20180104585
    Abstract: Customized wait state experiences for an avatar in a virtual universe are provided by determining user alternative wait context preferences, selecting alternative wait state content objects accordingly, creating a wait state context in the virtual universe system using the alternative wait state content objects, and transporting the waiting avatar to the newly created wait state context for the duration of the wait. The custom context can include scenery, sounds, and even information streams and feeds. The avatar is optionally returned to the original context upon an event, such as a customer service representative, being available and ready to interact with the user. Artificial intelligence processes are optionally used to determine probable wait state context preferences for the user. Rewards may be given to the user for waiting, and for completing games or challenges.
    Type: Application
    Filed: December 19, 2017
    Publication date: April 19, 2018
    Inventors: Christopher J. Dawson, Rick A. Hamilton, II, Clifford A. Pickover, Anne R. Sand
  • Publication number: 20180109548
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Publication number: 20180107183
    Abstract: A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable medium being operable to perform a thermal analysis of a data center and overlay the thermal analysis on a map of the data center to provide an overlaid thermal analysis. Additionally, the computer executable code is operable to dynamically control at least one partition in the data center based on the overlaid thermal analysis.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Patent number: 9946537
    Abstract: Embodiments of the present invention provide an approach for integrated development environment (IDE)-based repository searching (e.g., for library elements such as classes and/or functions) in a networked computing environment. In a typical embodiment, a first program code file is received from a first integrated development environment (IDE). The first program file may be associated with a set of attributes as stored in an annotation, header, or the like. Regardless, the first program file may be parsed and indexed into a repository based on the set of attributes. A search request may then be received from a second IDE. Based on the search request and the set of attributes, a matching program code file may then be identified as stored in the repository. Once identified, the matching program code file may be transmitted/communicated to the second IDE to fulfill the search request.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: April 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
  • Patent number: 9947035
    Abstract: A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable medium being operable to provide a shopping cart for a shopper, and segment items in the shopping cart based on the carbon footprint associated with each item. Additionally, the method may include displaying substitute or complementary items in the shopping cart for selection by the user to reduce total carbon values, and awarding carbon certificates.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Ruthie D. Lyle, Paul A. Moskowitz, Clifford A. Pickover
  • Publication number: 20180099223
    Abstract: Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules.
    Type: Application
    Filed: December 11, 2017
    Publication date: April 12, 2018
    Inventors: Kulvir S. BHOGAL, Gregory J. BOSS, Rick A. HAMILTON, II, Andrew R. JONES, Brian M. O'CONNELL
  • Publication number: 20180103048
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Application
    Filed: December 13, 2017
    Publication date: April 12, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Patent number: 9940648
    Abstract: Systems and methods for advertising, and, more particularly, systems and methods for managing ephemeral locations in a virtual universe. A method for managing ephemeral locations in a virtual universe (VU) includes causing a computer infrastructure to: render an ephemeral location upon a triggering in the VU; teleport a VU user avatar to the ephemeral location; permit the user avatar to interact in the ephemeral location; teleport the user avatar out of the ephemeral location; and un-render the ephemeral location.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: April 10, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Anne R. Sand, Keith R. Walker
  • Patent number: 9939796
    Abstract: A method implemented in a computer infrastructure having computer executable code embodied on a computer readable medium being operable to perform a thermal analysis of a data center and overlay the thermal analysis on a map of the data center to provide an overlaid thermal analysis. Additionally, the computer executable code is operable to dynamically control at least one partition in the data center based on the overlaid thermal analysis.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: April 10, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Publication number: 20180097846
    Abstract: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.
    Type: Application
    Filed: October 6, 2017
    Publication date: April 5, 2018
    Inventors: Rick A. Hamilton, II, Heather M. Hinton, Darren J. Moore, Neil Toussaint
  • Publication number: 20180097872
    Abstract: A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server.
    Type: Application
    Filed: November 21, 2017
    Publication date: April 5, 2018
    Inventors: Ankur CHANDRA, Rick A. HAMILTON, II, Nalini K. KARTHA, Keith R. WALKER
  • Publication number: 20180097848
    Abstract: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.
    Type: Application
    Filed: November 8, 2017
    Publication date: April 5, 2018
    Inventors: Rick A. Hamilton, II, Heather M. Hinton, Darren J. Moore, Neil Toussaint
  • Patent number: 9934161
    Abstract: Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ann Corrao, Rick A. Hamilton, II, Brian M. O'Connell, Brian J. Snitzer
  • Patent number: 9934474
    Abstract: A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: April 3, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Neal M. Keller, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
  • Patent number: 9935971
    Abstract: An approach provides solutions for responding to threats to virtual machines (VMs) and mitigating the risks of potential breaches to VMs that reside in the same neighborhood as VMs that are affected by threats. The approach can provide proactive responsive actions for one or more VMs in a determined neighborhood that help protect those VMs in a selective and prioritized manner.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Jeffrey R. Hoy, Jenny S. Li, Shawn P. Mullen
  • Publication number: 20180088760
    Abstract: A computer system receive a virtual world data set corresponding to a virtual world as experienced by a user. The computer system adds, to the virtual world data set, virtual world location data sets, with each given virtual world location data set respectively defining virtual world locations, with the virtual world location data sets including a first virtual location data set corresponding to a first virtual location that corresponds to a first real world location in the real world. The computer system adds, to the virtual world data set, a first virtual asset data set defining: (i) a first virtual asset, and (ii) a triggering rule that specifies the first real world location. The computer system determines that the user is in proximity to the first real world location. The computer system, responsive to the determination that the user is in proximity to the first real world location, applies the triggering rule to render the first virtual world asset in the first virtual location.
    Type: Application
    Filed: December 1, 2017
    Publication date: March 29, 2018
    Inventors: RICK A. HAMILTON, II, JAMES R. KOZLOSKI, BRIAN M. O'CONNELL, CLIFFORD A. PICKOVER, KEITH R. WALKER