Patents by Inventor Thomas Chefalas
Thomas Chefalas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10732705Abstract: A system and method to perform incremental adaptive modification of a virtual reality image involve obtaining sensor measurements from sensors coupled to an individual who is performing a task while viewing the virtual reality image. The method includes generating a true model of the individual from the sensor measurements, comparing the true model with an expert model obtained from another individual performing the task, and developing a lesson plan based on determining a difference between the true model and the expert model. The developing the lesson plan includes determining a gradient of intermediate models within the difference. A different one of the intermediate models is included iteratively along the gradient from the true model to the expert model in the virtual reality image.Type: GrantFiled: November 29, 2018Date of Patent: August 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James R. Kozloski, Ravi Tejwani, George Doerre, Neeraj Asthana, Thomas Chefalas
-
Patent number: 10713097Abstract: An aspect includes the automatic generation of blueprints for orchestration engines from discovered workload representations. A computer-implemented method includes receiving, using a processor, a description of a workload executing in a source computing environment. The description of the workload is mapped, using the processor, to one or more resource descriptors located in a repository of resource descriptors describing resources available in a target computing environment. A declarative representation of the workload in the target computing environment is generated, using the processor, based at least in part on the mapping and the description of the workload. The declarative representation includes a specification of resources required by the workload in the target environment.Type: GrantFiled: October 3, 2018Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Neeraj Asthana, Thomas Chefalas, Alexei Karve, Matthew Staffelbach, Alla Segal, Sai Zeng
-
Publication number: 20200174551Abstract: A system and method to perform incremental adaptive modification of a virtual reality image involve obtaining sensor measurements from sensors coupled to an individual who is performing a task while viewing the virtual reality image. The method includes generating a true model of the individual from the sensor measurements, comparing the true model with an expert model obtained from another individual performing the task, and developing a lesson plan based on determining a difference between the true model and the expert model. The developing the lesson plan includes determining a gradient of intermediate models within the difference. A different one of the intermediate models is included iteratively along the gradient from the true model to the expert model in the virtual reality image.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: James R. Kozloski, Ravi Tejwani, George Doerre, Neeraj Asthana, Thomas Chefalas
-
Publication number: 20200110638Abstract: An aspect includes the automatic generation of blueprints for orchestration engines from discovered workload representations. A computer-implemented method includes receiving, using a processor, a description of a workload executing in a source computing environment. The description of the workload is mapped, using the processor, to one or more resource descriptors located in a repository of resource descriptors describing resources available in a target computing environment. A declarative representation of the workload in the target computing environment is generated, using the processor, based at least in part on the mapping and the description of the workload. The declarative representation includes a specification of resources required by the workload in the target environment.Type: ApplicationFiled: October 3, 2018Publication date: April 9, 2020Inventors: Neeraj Asthana, Thomas Chefalas, Alexei Karve, Matthew Staffelbach, Alla Segal, Sai Zeng
-
Publication number: 20190122156Abstract: A method and system of assigning computing resources of a cloud by an orchestration engine is provided. A workload request is received via a network. A blueprint is extracted from the workload request. Milestones associated with the blueprint are identified. Business rules associated with the blueprint are determined. A cost of each of the identified milestones is determined. Upon determining that there is interdependence between at least some of the identified milestones, a group of milestones that are interdependent is created. The milestones are ranked based on the determined business rules and determined cost. A deployment plan is executed based on the ranked milestones.Type: ApplicationFiled: October 20, 2017Publication date: April 25, 2019Inventors: Neeraj Asthana, Thomas Chefalas, Alexei Karve, Clifford A. Pickover, Maja Vukovic
-
Publication number: 20080065577Abstract: A method, apparatus, and computer instructions for managing software. A solution to a problem that has occurred with a program on a client data processing system is received by a server. This solution is created while solving the problem that occurred on the data processing system. The solution includes a process that may be executed on another data processing system to solve the same problem on that data processing system. The process is, for example, a script, a macro, or a set of computer executable steps or instructions. A database of solutions is selectively updated to reflect the new solution. In response to a request for a solution by another client system to a problem, the server will respond with the current solution that exists in the database.Type: ApplicationFiled: October 24, 2007Publication date: March 13, 2008Inventors: THOMAS CHEFALAS, Steven Mastrianni
-
Publication number: 20080028465Abstract: The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.Type: ApplicationFiled: October 4, 2007Publication date: January 31, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Bantz, Thomas Chefalas, Steven Mastrianni
-
Publication number: 20070180061Abstract: In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event.Type: ApplicationFiled: February 2, 2006Publication date: August 2, 2007Inventors: David Bantz, Thomas Chefalas, Peter Gayek, Walter Huber, Srikant Jalan, Patrik Lehrner, Steven Mastrianni, Marco Porak
-
Publication number: 20070169089Abstract: The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner.Type: ApplicationFiled: January 17, 2006Publication date: July 19, 2007Applicant: International Business Machines CorporationInventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20070006321Abstract: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.Type: ApplicationFiled: July 1, 2005Publication date: January 4, 2007Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060265711Abstract: The present invention concerns methods and apparatus for managing multiple virtual machines simultaneously operative in a computing environment. The methods and apparatus of the present invention provide an integrated work environment—for example, a desktop—which incorporates graphical and control elements from multiple virtual machines. In embodiments of the present invention, application programs and resources available in multiple virtual machines can be accessed from a single desktop. Methods and apparatus of the present invention provide visual cues for associating control elements and resources with particular virtual machines. In embodiments of the present invention, multiple virtual machines operative in a computing environment can comprise a plurality of collaborative virtual machines, or a private virtual machine and one or more collaborative virtual machines.Type: ApplicationFiled: May 20, 2005Publication date: November 23, 2006Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060224930Abstract: A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Applicant: IBM CorporationInventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060156406Abstract: Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.Type: ApplicationFiled: January 13, 2005Publication date: July 13, 2006Applicant: International Business Machines CorporationInventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060155671Abstract: A method of transferring an image of a system or disk to a computer dedicated to performing a resource-intensive task, such as virus scanning, disk defragmentation or similar service. Once the dedicated computer has performed the task, the resulting image is compared to the current image of the client system or disk to produce an updated image. The client system or disk is then updated with the updated image.Type: ApplicationFiled: January 13, 2005Publication date: July 13, 2006Applicant: International Business Machines CorporationInventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060149628Abstract: A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.Type: ApplicationFiled: January 4, 2005Publication date: July 6, 2006Applicant: International Business Machines CorporationInventors: Thomas Chefalas, Steven Mastrianni, Ajay Mohindra, Clifford Pickover
-
Publication number: 20060149656Abstract: Systems and method for providing an auction. A computer server has a searchable database of items offered for sale by a plurality of sellers. The database is accessible by a plurality of sellers and a plurality of buyers. A conglomeration agent running on the server identifies related items for sale as a single conglomeration and stores the conglomeration in the database. The buyer may view both individual items for sale and conglomerations of items for sale, and place a bid on a conglomeration of such items or the individual item. If the bid matches the conditions set forth by the sellers, the sale of either a conglomeration or an individual item is completed. The system also generates a performance metric for both buyers and sellers which are also made available to buyer and sellers and may be used to assess the desirability of dealing with certain buyers or sellers.Type: ApplicationFiled: January 4, 2005Publication date: July 6, 2006Applicant: International Business Machines CorporationInventors: Thomas Chefalas, Steven Mastrianni, Clifford Pickover, Robert Wisniewski
-
Publication number: 20060112342Abstract: A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.Type: ApplicationFiled: November 20, 2004Publication date: May 25, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060112418Abstract: The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20060107269Abstract: A virtual device hub, into which local devices are plugged, enables those devices to be virtualized locally and with a remote virtual machine. Those devices then appear as available to the remote application, and can be used, for example, to print a report being processed on the remote host to a printer located at the user's physical location. The user's virtual device hub is a small computer device with network capability that is able to access the remote virtual machine. When the user runs an application, the application is actually being run in the remote virtual machine.Type: ApplicationFiled: November 17, 2004Publication date: May 18, 2006Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
-
Publication number: 20050246434Abstract: A subscriber to a service that monitors user behavior first registers with that service and selects a model of user behavior. The service then transmits that model to an agent, situated capable of monitoring user behavior and relating it to the model. After the monitoring interval the agent transmits data from the model to a server, where that data is summarized and reports created. These reports can then be sent to the subscriber in satisfaction of their needs for behavioral information.Type: ApplicationFiled: April 5, 2004Publication date: November 3, 2005Applicant: International Business Machines CorporationInventors: David Bantz, Peter Capek, Thomas Chefalas, David Chess, Christos Georgiou, William Grey, Steven Mastrianni, Paul Moskowitz, Clifford Pickover