596 patents
Page 8 of 30
Utility
Computer environment compliance
23 May 23
An assessment component that facilitates assessment and enforcement of policies within a computer environment can comprise a compliance component that determines whether a policy, that defines one or more requirements associated with usage of one or more enterprise components of an enterprise computing system, is in compliance with a plurality of standardized policies that govern operation of the one or more enterprise components of the enterprise computing system.
Milton H. Hernandez, Anup Kalia, Brian Peterson, Vugranam C. Sreedhar, Sai Zeng
Filed: 23 Dec 20
Utility
Centralized power management of wireless devices
16 May 23
Systems and methods for centralized power management of wireless user devices are disclosed.
Cesar Augusto Rodriguez Bravo
Filed: 10 Aug 22
Utility
Replication continued enhancement method
16 May 23
A processor determines the data to be replicated in the production site.
Kim Poh Wong, Young Soo Basler
Filed: 13 Nov 20
Utility
Triggering actions responsive to blockchain transactions
16 May 23
A blockchain may store transactions for various purposes which may be later accessed by interested parties for ledger verification.
Douglas G. Kinnaird, Ruiping Li, Brian M. O'Connell, Susan K. Schreitmueller, Shelbee D. Smith-Eigenbrode, David D. Weck
Filed: 21 Nov 16
Utility
Virtual shopping assistant
16 May 23
In an approach to provide contact-less shopping assistance to a user, a computer implements a method for receiving customer authentication data from a user and associating the customer authentication data with a tagged wearable device and a tagged mobility device with the user.
Kenneth Gambon, Hasibe Göçülü, Saravanan Shanmugam
Filed: 31 Aug 21
Utility
Ledger-based image distribution permission and obfuscation
16 May 23
Using an image analysis model within an image intended for distribution online, an image portion depicting personally identifiable information is identified, the personally identifiable information comprising image data usable to identify a specific individual.
Pramod Verma, Richard Daniel Gunjal
Filed: 31 Oct 19
Utility
Dynamically determining visibility of a post
16 May 23
Embodiments of the present invention provide methods, computer program products, and systems.
Satvinder Kaur, Seema Nagar, Kuntal Dey, Prince Ravindran
Filed: 4 Sep 20
Utility
Identifying potential attacks against cellular networks
16 May 23
Aspects of the present invention disclose a method for identifying indications of an attack on a cellular network.
Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Craig M. Trim, Shikhar Kwatra
Filed: 17 Feb 20
Utility
Wearer physical status indication using an electronically adjustable garment
9 May 23
From a first sensor in a set of sensors, a set of sensor measurements corresponding to a wearer of a garment is collected.
David Bastian, Aaron K. Baughman, Shikhar Kwatra, Todd Russell Whitman
Filed: 31 Jan 20
Utility
Data analytics for mitigation of data center thermal issues
9 May 23
Mitigating the impact of data center thermal environmental issues on production applications includes retrieving, by a computer, from a centralized repository first data corresponding to I/O and processing activities of an infrastructure component executing one or more applications, second data corresponding to an application-to-infrastructure map, and third data corresponding to a business priority of the one or more applications.
Anil Kumar Narigapalli, Laxmikantha Sai Nanduru, Venkateswarlu Basyam, Srilakshmi Surapaneni
Filed: 31 Mar 21
Utility
Input/output Interface Security
4 May 23
Methods, computer program products, and systems are presented.
Cesar Augusto RODRIGUEZ BRAVO
Filed: 29 Oct 21
Utility
Intelligent Locking of Display Devices for Remote Use
4 May 23
A method, computer program product, and system include a processor(s) that continuously obtains data from the one or more sensor devices, generating, from the data, frames comprising images, identifies, utilizing the frames, entities within a pre-defined vicinity of a visual display unit at a first time, determines, based on applying the classification model, if each identified entity of the identified entities within the pre-defined vicinity at the first time is objectionable.
Saravanan Devendran, Thangadurai Muthusamy
Filed: 29 Oct 21
Utility
Automated Workload Monitoring by Statistical Analysis of Logs
4 May 23
Methods, computer program products, and systems are presented.
Hsiulan CHEN
Filed: 31 Oct 21
Utility
Carbon Footprint-based Control of Cloud Resource Consumption
4 May 23
An approach is provided for determining a carbon footprint-based consumption of cloud resources.
Kim Poh Wong, Firas Bouz, Seema Nagar, Pramod Vadayadiyil Raveendran
Filed: 29 Oct 21
Utility
Social Network Adapted Response
4 May 23
Methods, computer program products, and systems are presented.
Pritesh PATEL, Shikhar KWATRA, Zachary A. SILVERSTEIN, Jennifer L. SZKATULSKI
Filed: 29 Oct 21
Utility
Mask device for a listening device
2 May 23
A masking device for a virtual assistant, the masking device including a body configured to at least partially block a virtual assistant microphone of the virtual assistant, and an assistant initializer in or on an inside of the body.
Naga ManojKasyap Chilakamarthy Venkata, Zachary A. Silverstein, Natalie Watkins, Evan M. Blache
Filed: 17 Nov 20
Utility
Metadata decomposition for graph transformation
2 May 23
An embodiment includes identifying metadata attached to a first node of a graph, where the metadata satisfies an ontological condition.
Craig M. Trim, Mary Rudden, Ahmed Nassar, William G. Dusch
Filed: 2 Jan 20
Utility
Gesture-based Control of Plural Devices In an Environment
27 Apr 23
A computer-implemented method includes: predicting, by a computing device, devices for inclusion in an interface; generating, by the computing device, the interface including areas corresponding to the devices; detecting, by the computing device, a user selection of one of the areas of the interface; detecting, by the computing device, a hand gesture associated with the selected one of the areas; and transmitting, by the computing device, data defining the hand gesture to a respective one of the devices corresponding to the selected one of the areas, thereby causing the respective one of the devices to execute a command based on the hand gesture.
Mauro MARZORATI, Todd Russell WHITMAN, Jeremy R. FOX, Sarbajit K. RAKSHIT
Filed: 25 Oct 21
Utility
Deep Packet Analysis
20 Apr 23
A computer-implemented method for protecting a processing environment from malicious incoming network traffic may be provided.
Arjun Udupi Raghavendra, Tim Uwe Scheideler, Matthias Seul
Filed: 20 Dec 22
Utility
Storage Allocation Based on Application Priority Specific to a Select Entity
20 Apr 23
An application priority level of an application to be executed within a computing environment is determined.
Renato Lopes Ramos, Paulo Tomiyoshi Takeda, Nathan Rodrigues Levy, Sergio Varga
Filed: 19 Oct 21