James Grafton

San Francisco Bay Area Contact Info
1K followers 500+ connections

Join to view profile

About

Experienced engineering executive with 10+ years managing managers and a demonstrated…

Activity

Join now to see all activity

Experience & Education

  • Meta

View James’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Protocol for providing authenticated and authorised Upnp-like service discovery over the Internet

    IBM

    The solution we give is designed to be like Upnp in that it is as lightweight as possible whilst working as seamlessly as possible for the user. However, where Upnp works over a LAN and a private group of devices is automatically inherited as the group of devices connected on that LAN, such a private group of devices is not readily obtainable over the internet. Therefore, our solution provides a central repository of users who belong to groups where each user can have multiple devices. A…

    The solution we give is designed to be like Upnp in that it is as lightweight as possible whilst working as seamlessly as possible for the user. However, where Upnp works over a LAN and a private group of devices is automatically inherited as the group of devices connected on that LAN, such a private group of devices is not readily obtainable over the internet. Therefore, our solution provides a central repository of users who belong to groups where each user can have multiple devices. A private group of devices is the constructed from a group by taking all of its users and all of their currently connected devices. This design allows users and their devices to simultaneously belong to multiple groups which Upnp cannot allow. One criticism of Upnp is that it is insecure. Whilst this may be acceptable over a LAN, insecure transmission of information over the internet poses serious security threats. Therefore our solution also proposes a method of securing communication between devices which is transparent to the users and application using the protocol.

  • Smarter Planet dynamic power usage through optical cooking device size recognition and event management

    IBM

    The Cooking hob would have an in built event management system (e.g. Tivoli Netcool Omnibus ). An optical sensor for each cooking ring would be embedded in the appliance. When the pan is placed on the hob the optical sensor would send an event to a hob event management management system. The event would contain the pan base diameter size and restrict the maximum flame/element size accordingly. This prevents the factory set maximum flame size being used for a small pan and thus wasting heat by…

    The Cooking hob would have an in built event management system (e.g. Tivoli Netcool Omnibus ). An optical sensor for each cooking ring would be embedded in the appliance. When the pan is placed on the hob the optical sensor would send an event to a hob event management management system. The event would contain the pan base diameter size and restrict the maximum flame/element size accordingly. This prevents the factory set maximum flame size being used for a small pan and thus wasting heat by using a flame/element that is bigger than required. The optimum size of the maximum flame is therefore adjustable .
    A report could be created from the restricted usage in order to indicate to the consumer the power unit cost saving over time.

  • Security restricted Field Content enablement through meta data event enrichment

    IBM

    This invention proposes the creation of a secure event screening environment both Southbound and Northbound in relation to the Netcool Omnibus Object server via the XML like meta markup of specific incoming and outgoing events.

    The advantage of this approach is that its completely flexible and extensible (sets of recognised tags can be dynamically extended at any point along with their associated behaviours). Also for the first time it would offer inter event screeningin and out of the…

    This invention proposes the creation of a secure event screening environment both Southbound and Northbound in relation to the Netcool Omnibus Object server via the XML like meta markup of specific incoming and outgoing events.

    The advantage of this approach is that its completely flexible and extensible (sets of recognised tags can be dynamically extended at any point along with their associated behaviours). Also for the first time it would offer inter event screeningin and out of the Object Server, with the optional support of said functionality of the target end point as well.

  • Voice recognition for automated conference call login and identification of current speaker and location/organization

    IBM

    The implementation of this disclosure is concerned with a combination of voice recognition technologies and their Integration with exisiting internal IBM software - Lotus Notes domino database technologies and Bluepages.

    The proposed solution is operated by a user pressing a single key on an enabled phone, dictating a pre-recorded activation phrase so that the system can recognise the user in question, and link to their calendar to automatically log them in as the appropriate user or…

    The implementation of this disclosure is concerned with a combination of voice recognition technologies and their Integration with exisiting internal IBM software - Lotus Notes domino database technologies and Bluepages.

    The proposed solution is operated by a user pressing a single key on an enabled phone, dictating a pre-recorded activation phrase so that the system can recognise the user in question, and link to their calendar to automatically log them in as the appropriate user or administrator of the call.

    This voice recognition technology and Notes linkup is continued such that throughout the call the current speakers name, bluepages entry and current location are highlighted to each user through the meeting invite, via a LCD display attached to the phone device thus eliminating problems in knowing who asked which question or in working out the job role of the speaker and tailoring responses to the appropriate level of detail.

    The system would also recognise when a caller on a conference is external to IBM and highlight them appropriately thus indicating extra care needs to be taken by all employees when addressing said individual!

    By using voice recognition technologies this disclosure effectively eliminates the vulnerabilitys associated with manual pin entry, as well as allowing automated meeting information look up. Moreover by linking into bluepages it allows for immediate external caller identification and participant information enrichment.

  • Centralised property management and templating solution for network monitoring software

    IBM

    The proposed solution is this; have a centralized Integrations management console connected to each Object Server. Each probe would have minimal configuration that would tell it which Omnibus server to connect to along with a username and password (if necessary). The probe would send specific identification details along with the initial property request which would allow the Integrations management console to send back a set of properties specific for that probe deployment. After initial…

    The proposed solution is this; have a centralized Integrations management console connected to each Object Server. Each probe would have minimal configuration that would tell it which Omnibus server to connect to along with a username and password (if necessary). The probe would send specific identification details along with the initial property request which would allow the Integrations management console to send back a set of properties specific for that probe deployment. After initial connection the system would also allow for real time property changes via the Integrations console.

    The advantage of this is clear, it would allow for firewalled customers to be able to centralize their property management (since all probes already have access to Object servers), not only this but by using an advance multi tiered templating system it could allow complete control over probe behaviours across several layers of granularity. Moreover it would provide functionality that customers would pay for; scalability and dynamic real time property management. All this functionality would be provided in addition to our current offerings.

  • Dynamic real time event prioritization

    IBM

    The core idea is to prioritise events being processed by Netcool probes via a priority based algorithm to allow for higher severity events to gain events over those that are less important. The prioritisation can be controlled by rules files construct - so it is configurable and dynamic, and could allow for finer grained control for the end user.

    The advantage of this approach is allowing higher severity events to be prioritised thus meaning that business critical events can be seen far…

    The core idea is to prioritise events being processed by Netcool probes via a priority based algorithm to allow for higher severity events to gain events over those that are less important. The prioritisation can be controlled by rules files construct - so it is configurable and dynamic, and could allow for finer grained control for the end user.

    The advantage of this approach is allowing higher severity events to be prioritised thus meaning that business critical events can be seen far sooner then they otherwise would have been.

  • Temporarily toggling debugging code from source via annotations

    IBM

    The solution would detect the programming language being used by the developer, and then parse the code, searching for debugging statements. These statements would then be "commented out" with a specially formed comment tag, allowing the comments to be later removed to reinstate the debugging statements.

    The toggling of the debugging statements could be triggered by the developer, or as part of commits to library systems (i.e. SVN, CVS).

    The Ant-based regular expression prior-art…

    The solution would detect the programming language being used by the developer, and then parse the code, searching for debugging statements. These statements would then be "commented out" with a specially formed comment tag, allowing the comments to be later removed to reinstate the debugging statements.

    The toggling of the debugging statements could be triggered by the developer, or as part of commits to library systems (i.e. SVN, CVS).

    The Ant-based regular expression prior-art is only applicable for code between two points marked by the developer, relies on the developer implementing a custom build script, and does not take advantage of knowledge of the programming language. Users of our proposed system would not have to be aware of the semantics of the proposed system to be able to remove the majority of debugging statements with a click of the mouse.

  • Detailed description of Mobile Phone and one time encryption keys to prevent keylogging and screen scraping of private data on public computers

    The core invention is that a service generates an encryption key, this key is sent to a mobile phone and is subsequently used to encrypt selected fields before sending the data over the Internet to the user's browser. The mobile phone camera is pointed at the screen, OCR software is used to identify the characters on the screen, the pre-shared key is used to decrypt those characters and the plain text is displayed to the user. A further extension to this is that multiple keys are used to…

    The core invention is that a service generates an encryption key, this key is sent to a mobile phone and is subsequently used to encrypt selected fields before sending the data over the Internet to the user's browser. The mobile phone camera is pointed at the screen, OCR software is used to identify the characters on the screen, the pre-shared key is used to decrypt those characters and the plain text is displayed to the user. A further extension to this is that multiple keys are used to encrypt different keys. All keys are only valid for a single session.

    The advantages are:

    You can use this invention on a public terminal that is running malware, spyware, etc and key loggers and screen scrapers contained in these applications can not harvest sensitive information from the screen.

    By using the mobile phone this invention does not require any specialist equipment.

    Prevents screen details being observed by other patrons of the computer cafe.

    This service doesn't require passwords.

    Brute forces are mitigated by using multiple and short lived keys.

    By selectively encrypting sections of the screen you avoid the following problems associated with mobile phone interfaces: Lack of functionality, small screen resolution, restricted devices (no keyboard, mouse, etc) and limited bandwidth.

  • User notifications based on eye tracking in multiple monitor environments

    IBM

    The core idea of this invention is to use eye tracking techniques to better position alerts depending on where the user is looking. The secondary idea is that the software would learn based on the user’s actions. For instance, if the user repeatedly ignores a certain type of notification, e.g. an e-mail from someone in particular, this notification will then move further away from the user’s field of vision until eventually it won’t be displayed.

    There exists technology and algorithms…

    The core idea of this invention is to use eye tracking techniques to better position alerts depending on where the user is looking. The secondary idea is that the software would learn based on the user’s actions. For instance, if the user repeatedly ignores a certain type of notification, e.g. an e-mail from someone in particular, this notification will then move further away from the user’s field of vision until eventually it won’t be displayed.

    There exists technology and algorithms for working out where a user is looking. Software that wanted to implement notifications based on where the user is looking would be required to implement an interface provided by a modified version of this software/hardware.

    Current solutions that are built into software like Lotus Notes include sound, notification tabs and the actual window coming to the front. Sound is often not an option in an office environment and flashing every new e-mail and chat window to the front of the screen can be counter-productive and be on the wrong screen, the same goes for one size fits all tab notifications.

Patents

  • METHOD AND SYSTEM FOR TESTING CONFIGURATION OF ENVIRONMENTS

    Issued US 20110113290

    A method and system for testing configuration of environments are provided. A probe for connection to a network and/or devices interacts to launch a configuration analyser tool. The configuration analyser tool includes a test mechanism for running a set of tests for the probe relating to connectivity and configuration of attached networks and devices before connection and suggesting solutions to test results. The tests may be externalised and dynamically loaded at run time of the configuration…

    A method and system for testing configuration of environments are provided. A probe for connection to a network and/or devices interacts to launch a configuration analyser tool. The configuration analyser tool includes a test mechanism for running a set of tests for the probe relating to connectivity and configuration of attached networks and devices before connection and suggesting solutions to test results. The tests may be externalised and dynamically loaded at run time of the configuration analyser tool.

    See patent
  • Event Flood Optimization through user defined automation of event compression and field content reduction

    Issued US GB8-2010-0080

    Business rules driven or user driven mechanism for localized event caching to enable load reduction.

    The event transporting module monitors event rate. The user defines the rate at which event load could impact the target DB or the event emitter performance ( if not a pre defined default rate). When triggered the Event transporting module forwards a compressed events with reduced number of columns populated (as pre-difined by the user or business rules) The algorithm then extends the…

    Business rules driven or user driven mechanism for localized event caching to enable load reduction.

    The event transporting module monitors event rate. The user defines the rate at which event load could impact the target DB or the event emitter performance ( if not a pre defined default rate). When triggered the Event transporting module forwards a compressed events with reduced number of columns populated (as pre-difined by the user or business rules) The algorithm then extends the default cache if necessary and stores the complete event. When the load reduces to an acceptable level ( optionally ) read the cache and forward the data not previously sent .

  • Method and process for accessing the z/OS Syslog inside Unix System Services

    Issued US GB8-2008-0235

    Using new functionality in z/OS 1.9 we are able to access the syslog with REXX commands from within the z/OS environment. Our solution takes this feature and ports it to the USS environment. Using a combination of Rexx and Unix commands, we are able to poll the z/OS syslog and output this information to a Unix file. This file can then be monitored (using Unix Tail) and the Unix program can react accordingly.
    When the output file reaches a certain size, our script is able to copy away the…

    Using new functionality in z/OS 1.9 we are able to access the syslog with REXX commands from within the z/OS environment. Our solution takes this feature and ports it to the USS environment. Using a combination of Rexx and Unix commands, we are able to poll the z/OS syslog and output this information to a Unix file. This file can then be monitored (using Unix Tail) and the Unix program can react accordingly.
    When the output file reaches a certain size, our script is able to copy away the contents of the output file, empty it and begin outputting again, all without interrupting the monitoring of the output file. This provides complete access to the contents of the syslog from USS, with only a slight delay. This enables full functionality to any USS program requiring access to syslog messages, which is currently not possible without user intervention of some sort. This is the first entirely automated monitoring of the z/OS syslog from Unix System Services.

    To take a specific example, we currently require separate tests for the USS environment and the z/OS environment. Using our invention, we would only need to maintain one codebase, dramatically reducing workload and maintaining the integrity of the tests across different platforms. We also completely remove user intervention from the tests, eliminating the possibility of human error invalidating a test.

Projects

  • Recipe Shopper

    -

    iPhone app featuring recipes which are directly linked to Tesco’s online shopping site, enabling users to order ingredients directly from the app.

    Other creators
    See project

Recommendations received

More activity by James

View James’ full profile

  • See who you know in common
  • Get introduced
  • Contact James directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named James Grafton in United States

Add new skills with these courses