596 patents
Utility
Domain Driven Secure Design of Distributed Computing Systems
18 Jan 24
A computer-implemented method, including identifying distributed computing design requirements; determining system offerings based on a machine learning model trained with the distributed computing design requirements; providing the system offerings for selection by a customer; receiving selections of the system offerings; and generating a bill of materials based on the selections of the system offerings.
Zbigniew Jan BOROWSKI, Xavier Gonzalo SANTOLARIA, Gerald Matthew COMEAU, Michael J SPISAK
Filed: 15 Jul 22
Utility
Securing Data Presented During Videoconferencing
18 Jan 24
A method includes: determining, by a videoconference server, a level of tolerated risk for a videoconference between a presenter and an attendee; obtaining, by the videoconference server, sensor data from at least one sensor at a location where a user device of the attendee displays the videoconference; generating, by the videoconference server, a current risk score based on the sensor data; determining, by the videoconference server, the current risk score exceeds the level of tolerated risk; and presenting, by the videoconference server and in response to the determining the current risk score exceeds the level of tolerated risk, an alert to the presenter of the videoconference.
Garfield W. Vaughn, Martin G. Keen, Gandhi Sivakumar, Abhishek Jain
Filed: 15 Jul 22
Utility
Card skimming detection
16 Jan 24
A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.
Cesar Augusto Rodriguez Bravo, Mohamed Zouhaier Ramadhane, Desilda Toska
Filed: 22 Oct 21
Utility
Headphone Biometric Authentication
11 Jan 24
A voice signal in a headphone is detected.
Cesar Augusto RODRIGUEZ BRAVO, Sarbajit K. RAKSHIT
Filed: 25 Sep 23
Utility
Workload Distribution Optimizer
11 Jan 24
Workload distribution is automatically optimized.
John V. Delaney, Alan P. Murphy, Claus Schroeder-Hansen, Clea A. Zolotow
Filed: 21 Sep 23
Utility
Automatically provisioned tag schema for hybrid multicloud cost and chargeback analysis
9 Jan 24
According to one embodiment, a method, computer system, and computer program product for provisioning a tag schema.
Keri Wheatley, Omar Odibat, Shikhar Kwatra, Manish Mahesh Modh, Ilyas Mohamed Iyoob
Filed: 23 Jun 21
Utility
Orchestrated disaster recovery
9 Jan 24
Orchestrated disaster recovery is provided in which replication volumes are automatically configured as part of a failover procedure.
Ozan A. Akyureklier, Ramandeep S. Arora, Richard Edwin Harper
Filed: 25 Jun 19
Utility
User interface sound emanation activity classification
9 Jan 24
Methods, computer program products, and systems are presented.
Tamer E. Abuelsaad, Gregory J. Boss, John E. Moore, Jr., Randy A. Rendahl
Filed: 30 Oct 19
Utility
Automated system alert based on logs sentiment analysis
2 Jan 24
Methods, computer program products, and systems are presented.
Dinesh Babu Yeddu, Sundaravelu Shanmugam, Raju Karuppiah
Filed: 1 Oct 21
Utility
Autonomous webpage content summation
2 Jan 24
A computer-implemented method includes: receiving, by a computing device, text extracted from a webpage in a browser and a Uniform Resource Locator (URL) of a linked webpage associated with the text; generating, by the computing device, questions based on the text; retrieving, by the computing device, content of the linked webpage using the URL; generating, by the computing device, answers to the questions using the retrieved content; and returning, by the computing device, the questions and the answers to the browser such that the browser displays the questions and the answers in the webpage.
Michael Seth Silverstein, Zachary A. Silverstein, Jayanth Krishnan, Krishnan Sugavanam
Filed: 11 Jan 22
Utility
Container scheduler with multiple queues for special workloads
2 Jan 24
A computer-implemented method to schedule special containers using a multi-queue scheduler.
Vishal Anand, Michael David Williams
Filed: 15 Feb 21
Utility
Multi-cluster container orchestration
2 Jan 24
Methods, computer program products, and systems are presented.
Vishal Anand
Filed: 29 Apr 20
Utility
Monitoring of Anomalies In Behavior to Increase Quality of Software Development
28 Dec 23
A method includes: identifying, by a computing device, an emotional awareness of an individual based on work product factors; analyzing, by the computing device, an impact on a product development process based on the emotional awareness of the individual; and providing, by the computing device, recommendations to improve the product development process based on the impact.
Shaleen TONGIA, Kalpesh SHARMA, Soumendra SAHOO
Filed: 23 Jun 22
Utility
Hyperparameter and network topology selection in network demand forecasting
19 Dec 23
Approaches for optimizing network demand forecasting models and network topology using hyperparameter selection are provided.
Aaron K. Baughman, Brian M. O'Connell, Michael Perlitz, Stefan A. G. Van Der Stockt
Filed: 28 Aug 19
Utility
Deploying Containers on a 5G Slice Network
14 Dec 23
In an approach to deploying containers on a 5G slice network, responsive to receiving a request to obtain and host a container within a 5G network, a slice network is created within the network for hosting of the container, where the slice network is created by a carrier for the network.
Park Foreman
Filed: 25 Aug 23
Utility
File reorganization
12 Dec 23
A method includes executing, by a computing device, a reorganization command within an environment; monitoring, by the computing device, unprocessed replication transactions within the environment; determining, by the computing device, whether the unprocessed replication transactions exceed a threshold; and pausing, by the computing device, the executing the reorganization command in response to determining the unprocessed replication transactions exceed the threshold.
James D. Powell
Filed: 19 Jan 22
Utility
Artificial intelligence system for tasks
12 Dec 23
An indication associated with an AI mode enabled by an AI system is received from a user with an affirmative opt-in status.
Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Romelia H. Flores, Sarbajit K. Rakshit
Filed: 2 Jun 21
Utility
Automatic Application Configuration Synchronization Based on Data Analytics
7 Dec 23
A computer-implemented method, including monitoring, by a computing device, usage data of an application on a primary user device; detecting, by the computing device, a mirroring of the application on a secondary user device based on an identification of the application; determining, by the computing device, a synchronization setting of the application including a secondary user device based on a historical synchronization data for the application; and generating, by the computing device, a synchronization configuration for the application on the secondary user device based on the usage data; and synchronizing, by the computing device, the application on the secondary user device with the synchronization configuration.
Keith Raymond Walker, Martin G. Keen, John M. Ganci, JR., Sarbajit K. Rakshit
Filed: 3 Jun 22
Utility
Transportation vehicle routing
5 Dec 23
Methods, computer program products, and systems are presented.
Garfield W. Vaughn, Yahi Chemlal, Syed Wahid, Aaron K. Baughman
Filed: 27 Jun 19
Utility
Dynamic creation of change management templates
5 Dec 23
A method of dynamically creating a change template based on a change request received from a user.
Randy S. Johnson, Tedrick N. Northway
Filed: 3 Nov 15