-
公开(公告)号:US09986383B2
公开(公告)日:2018-05-29
申请号:US15662513
申请日:2017-07-28
Applicant: International Business Machines Corporation
Inventor: Liam M. Doherty , Benjamin T. Horwood
Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.
-
公开(公告)号:US09930610B2
公开(公告)日:2018-03-27
申请号:US15183825
申请日:2016-06-16
Applicant: International Business Machines Corporation
Inventor: Graham C. Charters , Bret W. Dixon , Benjamin T. Horwood , Alexander H. Poga , Mark A. Shewell
CPC classification number: H04W76/11 , H04W8/186 , H04W48/08 , H04W64/003 , H04W64/006 , H04W84/18
Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
-
公开(公告)号:US20170346926A1
公开(公告)日:2017-11-30
申请号:US15168277
申请日:2016-05-31
Applicant: International Business Machines Corporation
Inventor: Graham C. Charters , Bret W. Dixon , Benjamin T. Horwood , Alexander H. Poga , Mark A. Shewell
CPC classification number: G06F9/453 , G06F9/45533 , G06F9/45558 , G06F2009/45575 , H04L67/02 , H04L67/025 , H04L67/04 , H04L67/10 , H04L67/34 , H04L67/42
Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
-
公开(公告)号:US20170318129A1
公开(公告)日:2017-11-02
申请号:US15655926
申请日:2017-07-21
Applicant: International Business Machines Corporation
Inventor: Bret W. Dixon , Benjamin T. Horwood
CPC classification number: H04L67/42 , B65D83/12 , G06F9/466 , G06F13/37 , G06F21/31 , G06F21/335 , H04L9/32 , H04L12/417 , H04L63/0807 , H04L67/02 , H04L67/1097
Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.
-
公开(公告)号:US20170280308A1
公开(公告)日:2017-09-28
申请号:US15164265
申请日:2016-05-25
Applicant: International Business Machines Corporation
Inventor: Graham C. Charters , Bret W. Dixon , Benjamin T. Horwood , Alexander H. Poga , Mark A. Shewell
CPC classification number: H04L67/104 , H04L41/22 , H04L67/1076 , H04L67/14 , H04L67/20 , H04W4/18 , H04W24/02 , H04W72/048 , H04W84/18 , H04W88/02
Abstract: An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.
-
公开(公告)号:US20170134529A1
公开(公告)日:2017-05-11
申请号:US14933231
申请日:2015-11-05
Applicant: International Business Machines Corporation
Inventor: Bret W. Dixon , Benjamin T. Horwood
CPC classification number: H04L67/42 , B65D83/12 , G06F9/466 , G06F13/37 , G06F21/31 , G06F21/335 , H04L9/32 , H04L12/417 , H04L63/0807 , H04L67/02 , H04L67/1097
Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.
-
公开(公告)号:US20150254085A1
公开(公告)日:2015-09-10
申请号:US14200059
申请日:2014-03-07
Applicant: International Business Machines Corporation
Inventor: Craig A. Carson , Bret W. Dixon , Benjamin T. Horwood , John A. Kaputin
CPC classification number: G06F9/445
Abstract: A method for automatic execution of at least one program associated with a mounted medium, wherein the mounted medium is ejected from a device is provided. The method may include determining if an automatic program initiation on eject is required, wherein the determining is based on a detection of the mounted medium being mounted in the device. The method may also include registering the required automatic program initiation on eject, wherein the registering is based on the determination of the automatic program initiation on eject being required. The method may include storing an executable program content associated with the registered automatic program initiation on eject. Additionally, the method may include executing the stored executable program content, wherein the execution is based on a detection of the mounted medium being ejected from the device. The method may include deregistering the required automatic program initiation on eject.
Abstract translation: 提供了一种用于自动执行与安装介质相关联的至少一个程序的方法,其中安装的介质从设备中弹出。 该方法可以包括确定是否需要弹出的自动程序启动,其中确定是基于安装在设备中的安装介质的检测。 该方法还可以包括在弹出时登记所需的自动程序启动,其中登记是基于需要的弹出的自动程序启动的确定。 该方法可以包括在弹出时存储与注册的自动程序启动相关联的可执行程序内容。 另外,该方法可以包括执行存储的可执行程序内容,其中执行是基于从该设备弹出的所安装的介质的检测。 该方法可以包括在弹出时取消注册所需的自动程序启动。
-
公开(公告)号:US20190342706A1
公开(公告)日:2019-11-07
申请号:US16511116
申请日:2019-07-15
Applicant: International Business Machines Corporation
Inventor: Liam M. Doherty , Benjamin T. Horwood
Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.
-
公开(公告)号:US20190156696A1
公开(公告)日:2019-05-23
申请号:US15817327
申请日:2017-11-20
Applicant: International Business Machines Corporation
Inventor: Graham C. Charters , Benjamin T. Horwood , Mark A. Shewell , Bret W. Dixon , Alexander H. Poga
Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.
-
公开(公告)号:US10289845B2
公开(公告)日:2019-05-14
申请号:US15844777
申请日:2017-12-18
Applicant: International Business Machines Corporation
Inventor: Graham C. Charters , Bret W. Dixon , Benjamin T. Horwood , Alexander H. Poga , Mark A. Shewell
IPC: G06F21/56
Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
-
-
-
-
-
-
-
-
-