Sarah Nelson Brolley - Raleigh NC, US Bernadette Alexia Carter - Raleigh NC, US Jessica Whitley Forrester - Raleigh NC, US Kathryn Jane Lemanski - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/177
US Classification:
715738
Abstract:
A computerized application recommendation system includes a processor; and a memory communicatively coupled to the processor. The processor is configured to: receive usage data for applications in a category of applications from a plurality of users; and provide a first user with a recommendation for a first application in the category of applications based, at least in part, on a change in the usage data.
Sarah Nelson Brolley - Raleigh NC, US Bernadette Alexia Carter - Raleigh NC, US Jessica Whitley Forrester - Raleigh NC, US Kathryn Jane Lemanski - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 3/01 G06F 15/16
US Classification:
715738
Abstract:
A method for application recommendation performed by a computerized application recommendation system includes receiving usage data for applications within a category of applications from a plurality of users, and providing a first user with a recommendation for a first application in the category of applications based, at least in part, on a change in the usage data. A computerized application recommendation system includes a processor and a memory. The processor is configured to receive usage data for applications in a category of applications from a plurality of users, and provide a first user with a recommendation for a first application in the category of applications based, at least in part, on a change in the usage data.
Managing Access Control For A Screen Sharing Session
Sarah N. Brolley - Raleigh NC, US Bernadette A. Carter - Raleigh NC, US Jessica W. Forrester - Raleigh NC, US Kathryn J. Lemanski - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 15/16 G06F 21/00
US Classification:
726 28
Abstract:
A method, system or computer usable program product for filtering content in a screen sharing session based on user access rights including initiating the screen sharing session between a first and nth user, displaying the content on a first screen of the first user wherein the content is derived from a content source including a content representation and including a set of secure elements requiring access rights to view, determining a first subset of secure elements that the nth user has access rights to view, and transmitting the content representation and the first subset of secure elements to the nth user during the screen sharing session.
Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.
- Raleigh NC, US Jessica Whitley Forrester - Raleigh NC, US Benjamin Petersen - Raleigh NC, US Samuel George Padgett - Raleigh NC, US
International Classification:
G06F 9/455 G06F 9/44
Abstract:
A method relates to launching, by a processing device executing a virtual machine deployment application, an asset server communicatively coupled to a data storage, launching a container comprising a file server that stores configuration data associated with a web console, wherein the web console provide a user interface to access the virtual machine deployment application, recording, in a configuration data structure residing in the data storage, a network address associated with the container, retrieving, by the asset server, the configuration data stored in the file server using the network address recorded in the configuration data structure, and providing the configuration data to a cache associated with the web console to modify the user interface.
Identifying A Contact Based On A Voice Communication Session
Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
Identifying A Contact Based On A Voice Communication Session
Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
Identifying A Contact Based On A Voice Communication Session
- Armonk NY, US Jessica W. Forrester - Raleigh NC, US Stephen C. Hess - Durham NC, US Jeffrey R. Hoy - Southern Pines NC, US
International Classification:
G10L 15/08 H04M 3/42
Abstract:
Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
Red Hat
Senior Principal Software Engineer
Red Hat Jul 2015 - Oct 2018
Principal Software Engineer
Red Hat Apr 2013 - Jul 2015
Senior Software Engineer
Ibm Jun 2008 - Apr 2013
Staff Software Engineer
Ibm May 2007 - Dec 2007
Software Development Co-Op
Education:
North Carolina State University 2009 - 2014
Masters, Computer Science
Virginia Tech 2004 - 2008
Bachelors, Bachelor of Science, Mathematics, Computer Science
Hickory High School 2004
Skills:
Rest Java Software Development Javascript Ajax Css Agile Methodologies Xml Html Web Applications Lotus Connections Json Dojo Websphere Application Server Jquery C# Filenet Ruby Ruby on Rails Angularjs Go Less Sass Bootstrap Kubernetes Openshift Containerization Containers