-
公开(公告)号:US20190095688A1
公开(公告)日:2019-03-28
申请号:US16204211
申请日:2018-11-29
Applicant: International Business Machines Corporation
Inventor: David R. Burns , Gregory J. Boss , Andrew R. Jones , Kevin C. McConnell
Abstract: A method, system and computer program product are disclosed for tagging a resource. In one embodiment, the method comprises receiving a given number of unique electronic tags for tagging a specified resource; for a harvested one of the specified resources, generating image data representing an image of the harvested resource, and selecting one of the electronic tags for the harvested resource; and sending the image data and data identifying the selected electronic tag to a specified entity to register the harvested resource. In an embodiment, the given number of unique physical tags are generated for the specified resource, and the generated image data include data representing one of the physical tags. In an embodiment, a mobile computing device is used to receive the electronic tags, to generate the image data, and to transmit the image data to the specified entity.
-
公开(公告)号:US20190087235A1
公开(公告)日:2019-03-21
申请号:US16194623
申请日:2018-11-19
Applicant: International Business Machines Corporation
Inventor: Gregory J. Boss , Seyyed Vahid Hashemian , Ton A. Ngo , Thomas K. Truong
IPC: G06F9/50 , G06F9/455 , H04L12/911
Abstract: A host system reallocates resources in a virtual computing environment by first receiving a request to reallocate a first quantity of a first resource type. Next, potential trade-off groups are evaluated and a trade-off group is selected based on the evaluation. The selected trade-off group includes a set of applications running in the virtual computing environment that can use one or more alternate resource types as a substitute for the first quantity of the first resource type. After the selection, the host system reallocates the first quantity of the first resource type from the trade-off group. This reallocation may be made from the trade-off group to either a first application running in the virtual computing environment or the host system itself. If the reallocation is to the host system, then the total quantity of the first resource type allocated to applications running in the virtual computing environment is thereby reduced.
-
公开(公告)号:US10228984B2
公开(公告)日:2019-03-12
申请号:US15136456
申请日:2016-04-22
Applicant: International Business Machines Corporation
Inventor: Jason L. Anderson , Nimesh Bhatia , Gregory J. Boss , Animesh Singh
Abstract: Embodiments directed toward a method, and a system. A method can be directed toward deciding whether to accept a virtual machine migration on a host. The method can include receiving a request to host a migrated virtual machine. The method can include determining if the host is overcommitted. The method can include selecting a low priority virtual machine in response to the host being overcommitted. The method can include determining if a resource for the low priority virtual machine can be reduced to accommodate the migrated virtual machine. The method can include reducing the resources for the low priority virtual machine in response to the resources being able to be reduced. The method can include accepting the request to host the migrated virtual machine in response to the reduction of the resources.
-
公开(公告)号:US20190034991A1
公开(公告)日:2019-01-31
申请号:US15844988
申请日:2017-12-18
Applicant: International Business Machines Corporation
Inventor: Michael Bender , Gregory J. Boss , Jeremy R. Fox , Rick A. Hamilton, II
Abstract: A first user entering a physical location can be identified. In response, a first user profile information for the user can be accessed. The first user profile information can be compared to user profile information of a plurality of other users who are present at the physical location. Based on the comparing, at least a second user whose user profile information most closely matches the first user profile information can be identified. A notification can be communicated to a client device used by the second user, the notification notifying the second user to initiate interaction with the first user. The client device can be configured to present the notification to the second user.
-
公开(公告)号:US20190028218A1
公开(公告)日:2019-01-24
申请号:US16127161
申请日:2018-09-10
Applicant: International Business Machines Corporation
Inventor: Ira L. Allen , Lambert S. Berentsen , Gregory J. Boss
IPC: H04J11/00
CPC classification number: H04J11/003
Abstract: A boundary of a wireless network is monitored for incoming wireless signals that may interfere with an ability of a first wireless computing device to connect to the wireless network within the boundary of the wireless network. For an incoming wireless signal determined to interfere with the ability of the first wireless computing device to connect to the wireless network within the boundary of the wireless network, a directional opposing outgoing wireless signal is emitted to counteract the incoming wireless signal and to stop the incoming wireless signal from further interfering with the ability of the first wireless computing device to connect to the wireless network within the boundary of the wireless network.
-
公开(公告)号:US10181242B1
公开(公告)日:2019-01-15
申请号:US15646425
申请日:2017-07-11
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Charles E. Beller , Gregory J. Boss , Mary Diane Swift , Edgar A. Zamora Duran
Abstract: Embodiments of the present invention disclose a method, computer program product, and system for generating and transmitting a Personalized Emergency Evacuation Plan (PEEP). The computer receives an emergency condition real-time data from a plurality of building sensors, a tracking data of at least one user from a plurality of tracking sensors, a facility structural data from a facility database, and a stored user data from a user database for the at least one user. The computer generates a personalized emergency evacuation plan (PEEP) for the at least one user, wherein is a set of recommendations to put the user in the safest position, based on at least the emergency condition real-time data and the received stored user data. The computer transmits the PEEP to a user mobile device, wherein the user mobile device presents the PEEP to the at least one user.
-
公开(公告)号:US10171933B2
公开(公告)日:2019-01-01
申请号:US15666827
申请日:2017-08-02
Applicant: International Business Machines Corporation
Inventor: Ira L. Allen , Gregory J. Boss , Andrew R. Jones , Kevin C. McConnell , John E. Moore
Abstract: In an approach for notifying a user of a location of a device, a processor receives a first location of a first device. A processor determines that the first device has been separated from a user of the first device. A processor determines a second device located at, within a first predetermined threshold, the first location. A processor sends a first notification to the second device, wherein the notification includes, at least, that the first device is located nearby.
-
公开(公告)号:US20180351985A1
公开(公告)日:2018-12-06
申请号:US15610886
申请日:2017-06-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Charles E. Beller , Gregory J. Boss , Christopher L. Molloy , Bernadette A. Pierson
IPC: H04L29/06
CPC classification number: H04L63/1433 , H04L63/12 , H04L63/126 , H04M3/5116 , H04W12/00503 , H04W12/00506
Abstract: Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.
-
公开(公告)号:US20180349626A1
公开(公告)日:2018-12-06
申请号:US15609509
申请日:2017-05-31
Applicant: International Business Machines Corporation
Inventor: Michael Bender , Gregory J. Boss , Jeremy R. Fox , Rick A. Hamilton, II
Abstract: In an approach to adjusting user permissions based on mental acuity, one or more computer processors determine whether an individual is within a threshold proximity to a monitored location. In response to determining that an individual is within a threshold proximity to the monitored location, the one or more computer processors identify a required mental acuity for the monitored location. The one or more computer processors determine a current mental acuity for the individual. The one or more computer processors compare the determined mental acuity for the individual with the required mental acuity for the monitored location.
-
公开(公告)号:US20180336001A1
公开(公告)日:2018-11-22
申请号:US15601092
申请日:2017-05-22
Applicant: International Business Machines Corporation
Inventor: Tamer E. Abuelsaad , Gregory J. Boss , John E. Moore, JR. , Randy A. Rendahl
IPC: G06F3/16 , G10L21/0272 , G10L15/18 , G10L17/22 , H04M3/56
Abstract: A computer-implemented method includes identifying a first set of utterances from a plurality of utterances. The plurality of utterances is associated with a conversation and transmitted via a plurality of audio signals. The computer-implemented method further includes mining the first set of utterances for a first context. The computer-implemented method further includes determining that the first context associated with the first set of utterances is not relevant to a second context associated with the conversation. The computer-implemented method further includes dynamically muting, for at least a first period of time, a first audio signal in the plurality of audio signals corresponding to the first set of utterances. A corresponding computer system and computer program product are also disclosed.
-
-
-
-
-
-
-
-
-