Patents by Inventor Wojciech A. Wojcik
Wojciech A. Wojcik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240107274Abstract: A device, system and method for managing talkgroups is provided. A computing device determines that a communication device is communicating with a talkgroup via a first communication network, the talkgroup dominated by other communication devices communicating on one or more second communication networks different from the first communication network. The computing device determines a level of activity of the communication device in the talkgroup via the first communication network. When the level of activity meets a threshold condition, the computing device: requests a confirmation from the communication device to cease communication with the talkgroup; and when the confirmation is received, drops the communication device from the talkgroup.Type: ApplicationFiled: December 5, 2019Publication date: March 28, 2024Inventors: Wojciech WOJCIK, Grzegorz GUSTOF, Marcin MICHALAK
-
Patent number: 11822914Abstract: A method includes providing a relational database and at least one schema describing tables of the relational database with columns of the relational database, providing an application executing read/write or delete jobs in the relational database where the application is running in a cloud environment, upgrading the application running in the cloud environment to a new version of the application. The application uses pods to perform the steps of the upgrading. The method includes replacing an old version of the application using an intermediate version of the application, where the intermediate version of the application behaves differently depending on values of definitions in a new supportive column created in the relational database, and replacing the intermediate version of the application with pods using the new version of the application.Type: GrantFiled: November 3, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Wojciech Wojcik, Bartosz Tomasik, Krzysztof Rudek, Jaroslaw Jurowicz
-
Publication number: 20230132690Abstract: A method includes providing a relational database and at least one schema describing tables of the relational database with columns of the relational database, providing an application executing read/write or delete jobs in the relational database where the application is running in a cloud environment, upgrading the application running in the cloud environment to a new version of the application. The application uses pods to perform the steps of the upgrading. The method includes replacing an old version of the application using an intermediate version of the application, where the intermediate version of the application behaves differently depending on values of definitions in a new supportive column created in the relational database, and replacing the intermediate version of the application with pods using the new version of the application.Type: ApplicationFiled: November 3, 2021Publication date: May 4, 2023Inventors: Wojciech Wojcik, Bartosz Tomasik, Krzysztof Rudek, Jaroslaw Jurowicz
-
Publication number: 20230092091Abstract: A method and cloud-based resource management service is provides for optimizing a resource sharing process in a multi-tenant communication system. A resource sharing process is established electronically between a first tenant and a second tenant in the multi-tenant communication system. The resource sharing process establishes a first expected resource usage at the first tenant and a second expected resource usage at the second tenant. The cloud-based resource management service determines electronically a first actual resource usage at the first tenant and a second actual resource usage at the second tenant. The cloud-based resource management service utilizes electronically the first actual resource usage and the second actual resource usage to recommend modification of the resource sharing process.Type: ApplicationFiled: June 5, 2020Publication date: March 23, 2023Inventors: GRZEGORZ GUSTOF, PIOTR FURMAN, ALBERT DABROWSKI, WOJCIECH WOJCIK
-
Publication number: 20230042020Abstract: A device, method and system for changing communication infrastructure based on call security level is provided. A device determines a call security level of a call occurring at a first communication infrastructure; the first communication infrastructure associated with a first security level; the call security level determined from one or more of; a profile of a caller on the call; and audio on the call. In response to determining that the call security level and the first security level are misaligned, the device causes the call to change to a second communication infrastructure associated with a second security level aligned with the call security level.Type: ApplicationFiled: February 21, 2020Publication date: February 9, 2023Inventors: Grzegorz GUSTOF, Piotr FURMAN, Wojciech WOJCIK
-
Publication number: 20220415313Abstract: Methods and systems for consent based information sharing. One system includes a server including an electronic processor configured to receive a first set of parsed communication data for a first talkgroup and a second set of parsed communication data for a second talkgroup. The electronic processor is configured to determine a topic of interest of the first talkgroup. The electronic processor is configured to identify relevant communication data from the second set of parsed communication data, where the relevant communication data is relevant to the topic of interest. The electronic processor is configured to determine whether the relevant communication data is shareable. The electronic processor is configured to, in response to determining that the relevant communication data is not shareable, request consent from the first talkgroup and the second talkgroup to share the relevant communication data, and, in response to receiving consent, enable sharing of the relevant communication data.Type: ApplicationFiled: December 5, 2019Publication date: December 29, 2022Inventors: Grzegorz Gustof, Wojciech Wojcik, Piotr Furman
-
Patent number: 11120008Abstract: A verification check is performed for a configuration management database (CMDB) configuration item (CI), the CMDB CI being an information technology asset of a computing environment and being previously discovered as part of a CMDB CI discovery procedure for a CMDB system, and discovered on a hosting component hosting the CMDB CI. The discovery procedure provides configuration data associated with the CMDB CI, and the configuration data is stored as part of CMDB configuration information of the CMDB system. Performance of the verification check of the CMDB CI is tailored to the CMDB CI, and includes using the configuration data provided by the discovery procedure to target at least one inquiry to the hosting component, which may include an inquiry to the CMDB CI thereof. An updated status of the CMDB CI is determined based on performing the verification check.Type: GrantFiled: April 11, 2019Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jaroslaw Jurowicz, Tomasz P. Kania, Ewa Kilar, Wojciech A. Wojcik
-
Patent number: 10936659Abstract: A computer-implemented method for processing an update event for a target graph may be provided. The method comprises upon an event broker receiving a vertex update event, assigning the vertex update event to a compute node which processes update events for the vertex. Upon the event broker receiving an update event targeting a linking edge in the target graph, performing by the event broker: dividing the update event into a pair of create-if-not-exist sub-events, and an edge update sub-event, assigning the first create-if-not-exist sub-event to a first compute node, and integrating the first create-if-not-exist sub-event into a stream of update events for the first vertex. The same happens for the second vertex. The edge update sub-event is assigned to a third compute node, and integrates into the edge update sub-event stream.Type: GrantFiled: January 2, 2019Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Tomasz Niebielski, Jaroslaw Jurowicz, Wojciech Wojcik, Bartosz Tomasik
-
Patent number: 10914557Abstract: A process for managing a formation of intelligent electronically-embedded intelligent shields includes first receiving, from a plurality of primary officer and intelligent shield pairs, first location information and pressure information measured at a pressure sensor coupled to the intelligent shield and indicative of a pressure being applied to a front and/or rear face of the intelligent shield. The received pressure information is then compared to a threshold pressure value to identify those shields exceeding the threshold. Then a particular secondary support officer is identified for aiding the particular primary officer, after which either a redeployment message is transmitted to the particular secondary support officer or an indication instruction is transmitted to the intelligent shield in the particular primary officer and intelligent shield pair.Type: GrantFiled: December 9, 2016Date of Patent: February 9, 2021Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Wojciech Wojcik, Mariusz Wawrowski
-
Publication number: 20200210481Abstract: A computer-implemented method for processing an update event for a target graph may be provided. The method comprises upon an event broker receiving a vertex update event, assigning the vertex update event to a compute node which processes update events for the vertex. Upon the event broker receiving an update event targeting a linking edge in the target graph, performing by the event broker: dividing the update event into a pair of create-if-not-exist sub-events, and an edge update sub-event, assigning the first create-if-not-exist sub-event to a first compute node, and integrating the first create-if-not-exist sub-event into a stream of update events for the first vertex. The same happens for the second vertex. The edge update sub-event is assigned to a third compute node, and integrates into the edge update sub-event stream.Type: ApplicationFiled: January 2, 2019Publication date: July 2, 2020Inventors: Tomasz Niebielski, Jaroslaw Jurowicz, Wojciech Wojcik, Bartosz Tomasik
-
Publication number: 20200021666Abstract: A process for managing a formation of intelligent electronically-embedded intelligent shields includes first receiving, from a plurality of primary officer and intelligent shield pairs, first location information and pressure information measured at a pressure sensor coupled to the intelligent shield and indicative of a pressure being applied to a front and/or rear face of the intelligent shield. The received pressure information is then compared to a threshold pressure value to identify those shields exceeding the threshold. Then a particular secondary support officer is identified for aiding the particular primary officer, after which either a redeployment message is transmitted to the particular secondary support officer or an indication instruction is transmitted to the intelligent shield in the particular primary officer and intelligent shield pair.Type: ApplicationFiled: December 9, 2016Publication date: January 16, 2020Inventors: WOJCIECH WOJCIK, MARIUSZ WAWROWSKI
-
Publication number: 20190236061Abstract: A verification check is performed for a configuration management database (CMDB) configuration item (CI), the CMDB CI being an information technology asset of a computing environment and being previously discovered as part of a CMDB CI discovery procedure for a CMDB system, and discovered on a hosting component hosting the CMDB CI. The discovery procedure provides configuration data associated with the CMDB CI, and the configuration data is stored as part of CMDB configuration information of the CMDB system. Performance of the verification check of the CMDB CI is tailored to the CMDB CI, and includes using the configuration data provided by the discovery procedure to target at least one inquiry to the hosting component, which may include an inquiry to the CMDB CI thereof. An updated status of the CMDB CI is determined based on performing the verification check.Type: ApplicationFiled: April 11, 2019Publication date: August 1, 2019Inventors: Jaroslaw JUROWICZ, Tomasz P. KANIA, Ewa KILAR, Wojciech A. WOJCIK
-
Patent number: 10339128Abstract: A verification check is performed for a configuration management database (CMDB) configuration item (CI), the CMDB CI being an information technology asset of a computing environment and being previously discovered as part of a CMDB CI discovery procedure for a CMDB system, and discovered on a hosting component hosting the CMDB CI. The discovery procedure provides configuration data associated with the CMDB CI, and the configuration data is stored as part of CMDB configuration information of the CMDB system. Performance of the verification check of the CMDB CI is tailored to the CMDB CI, and includes using the configuration data provided by the discovery procedure to target at least one inquiry to the hosting component, which may include an inquiry to the CMDB CI thereof. An updated status of the CMDB CI is determined based on performing the verification check.Type: GrantFiled: May 17, 2016Date of Patent: July 2, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jaroslaw Jurowicz, Tomasz P. Kania, Ewa Kilar, Wojciech A. Wojcik
-
Patent number: 10078655Abstract: A computer-implemented method for storing and reconciling in a database sensor data from a plurality of sensors, the method comprising: repetitively receiving data sets for the plurality of sensors, each data set comprising sensor data detected by at least one of the plurality of sensors from a source during a sensing event, wherein a source identifier identifies the source, a sensor identifier identifies the at least one of the plurality of sensors, and wherein the sensor identifiers of at least two of the received data sets are different from each other, while both data sets comprise the same source identifier.Type: GrantFiled: September 28, 2015Date of Patent: September 18, 2018Assignee: International Business Machines CorporationInventors: Lukasz Debiec, Ivo Modrinic, Tomasz Niebielski, Wojciech Wojcik
-
Publication number: 20170337236Abstract: A verification check is performed for a configuration management database (CMDB) configuration item (CI), the CMDB CI being an information technology asset of a computing environment and being previously discovered as part of a CMDB CI discovery procedure for a CMDB system, and discovered on a hosting component hosting the CMDB CI. The discovery procedure provides configuration data associated with the CMDB CI, and the configuration data is stored as part of CMDB configuration information of the CMDB system. Performance of the verification check of the CMDB CI is tailored to the CMDB CI, and includes using the configuration data provided by the discovery procedure to target at least one inquiry to the hosting component, which may include an inquiry to the CMDB CI thereof. An updated status of the CMDB CI is determined based on performing the verification check.Type: ApplicationFiled: May 17, 2016Publication date: November 23, 2017Inventors: Jaroslaw JUROWICZ, Tomasz P. KANIA, Ewa KILAR, Wojciech A. Wojcik
-
Publication number: 20170091252Abstract: A computer-implemented method for storing and reconciling in a database sensor data from a plurality of sensors, the method comprising: repetitively receiving data sets for the plurality of sensors, each data set comprising sensor data detected by at least one of the plurality of sensors from a source during a sensing event, wherein a source identifier identifies the source, a sensor identifier identifies the at least one of the plurality of sensors, and wherein the sensor identifiers of at least two of the received data sets are different from each other, while both data sets comprise the same source identifier.Type: ApplicationFiled: September 28, 2015Publication date: March 30, 2017Inventors: Lukasz Debiec, Ivo Modrinic, Tomasz Niebielski, Wojciech Wojcik