Search

Vincent V Diluoffo

from Sandy Hook, CT
Age ~62

Vincent Diluoffo Phones & Addresses

  • 6 Owl Ridge Ln, Sandy Hook, CT 06482 (203) 270-7587 (203) 270-7788
  • Bridgton, ME
  • Norwalk, CT
  • Hastings on Hudson, NY
  • Southbury, CT
  • 6 Owl Ridge Ln, Sandy Hook, CT 06482 (203) 270-7587

Work

Position: Homemaker

Education

Degree: Graduate or professional degree

Publications

Us Patents

Anti-Tamper Electronic Obscurity Using E-Fuse Technology

View page
US Patent:
7755502, Jul 13, 2010
Filed:
Oct 10, 2007
Appl. No.:
11/869807
Inventors:
Vincent V Diluoffo - Sandy Hook CT, US
Raymond J Eberhard - Endwell NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G08B 21/00
US Classification:
340638, 340509, 340590, 340635, 34063613, 34063617, 340652, 361104, 327525, 327526
Abstract:
A design structure embodied in a machine readable medium used in a design process includes a circuit that employs an anti-tamper sensor. The circuit employs an anti-tamper sensor that includes a circuit element that is responsive to a first input and to a second input. A selective coupling element couples the circuit element to the first input and is responsive to the anti-tamper sensor. The selective coupling element has a first state that allows the circuit element to operate normally when the anti-tamper sensor does not detect a tamper condition and is configured to enter a second state that causes the circuit element to become inoperable when the anti-tamper sensor detects a tamper condition. A decoy coupling element is disposed between the second input and the circuit element and has an appearance corresponding to the selective coupling element. The decoy coupling element will cause the circuit element not to operate normally if the decoy coupling element has a selected physical property of the selective coupling element in the first state.

Using Rfid And Sensored Zones To Geographically Control Cellular Phone Audio Profiles

View page
US Patent:
7835730, Nov 16, 2010
Filed:
Jan 18, 2007
Appl. No.:
11/624456
Inventors:
Gregory J. Boss - American Fork UT, US
Vincent V. Diluoffo - Sandy Hook CT, US
Timothy M. Waters - Hiram GA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04M 3/00
US Classification:
455419, 455418, 4554563, 4554564, 455567, 37920716, 37937301, 37937403, 37937602
Abstract:
A system and method for automatically controlling and adjusting the audio profile of pervasive devices, like cellular phones, within controlled zones. The system and method utilizes RFID and sensors to geographically control and adjust the audio profiles based on set criteria, such as default settings and hierarchy. The audio profiles may be controlled or adjusted based on a control zone profile settings or based on the profile settings of other individual devices within the same control zone. The zones may be adjusted due to the hierarchy or rank of devices present within the zone.

Anti-Tamper Electronic Obscurity Using E-Fuse Technology

View page
US Patent:
20080111682, May 15, 2008
Filed:
Nov 9, 2006
Appl. No.:
11/558137
Inventors:
Vincent V. Diluoffo - Sandy Hook CT, US
Raymond J. Eberhard - Endwell NY, US
International Classification:
G08B 21/00
US Classification:
340540
Abstract:
A circuit that employs an anti-tamper sensor includes a circuit element that is responsive to a first input and to a second input. A selective coupling element couples the circuit element to the first input and is responsive to the anti-tamper sensor. The selective coupling element has a first state that allows the circuit element to operate normally when the anti-tamper sensor does not detect a tamper condition and is configured to enter a second state that causes the circuit element to become inoperable when the anti-tamper sensor detects a tamper condition. A decoy coupling element is disposed between the second input and the circuit element and has an appearance corresponding to the selective coupling element. The decoy coupling element will cause the circuit element not to operate normally if the decoy coupling element has a selected physical property of the selective coupling element in the first state.

System To Automatically Move Physical Infrastructure To Optimize Geothermal Cooling

View page
US Patent:
20090283386, Nov 19, 2009
Filed:
May 15, 2008
Appl. No.:
12/121727
Inventors:
Vincent V. Diluoffo - Sandy Hook CT, US
Michael D. Kendzierski - New York NY, US
Christopher J. Dawson - Arlington VA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
B65G 29/02
US Classification:
1984688
Abstract:
A system for selectively moving computer equipment to a naturally cooled underground data center. In one aspect of this disclosure, the system includes at least one movable pod for mounting computer equipment. The pod is electrically connected to a power and communications source to provide power and communications to the computer equipment mounted in the pod. The pod is mounted on a vertical conveyor that is driven by a motor to selectively move the pod to and from the underground data center.

Managing Virtual Universe Avatar Behavior Ratings

View page
US Patent:
20100083112, Apr 1, 2010
Filed:
Sep 23, 2008
Appl. No.:
12/236321
Inventors:
Christopher J. Dawson - Arlington VA, US
Vincent V. Diluoffo - Sandy Hook CT, US
Michael D. Kendzierski - New York NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
G06F 3/048
US Classification:
715706
Abstract:
Inappropriate behavior, such as harassment, expletive laden communications, violence or sexually explicit behavior in a virtual universe (VU) can lead to negative experiences for VU users. Younger users of a VU can be more susceptible to inappropriate behavior than adult users. A VU system can monitor behavior and associate behavior ratings with avatars within the VU to respond to avatar/user behavior. A system can determine behavior ratings based upon avatar interactions, user complaints or complements about an avatar, actions within the VU, etc. The system can subject poorly behaving avatars to various penalties (e.g., restriction from certain areas, account termination, etc.). The system can also reward avatars that exhibit good behavior (e.g., allowing access to bonus areas or content, awarding points that can be used as VU currency, etc.). Penalizing inappropriate behavior and rewarding positive behavior can increase safety of minors in the VU, and increase user experience overall.

Managing Virtual Universe Avatar Behavior Ratings

View page
US Patent:
20130110952, May 2, 2013
Filed:
Dec 17, 2012
Appl. No.:
13/717241
Inventors:
International Business Machines Corporation - Armonk NY, US
Vincent V. Diluoffo - Sandy Hook CT, US
Michael D. Kendzierski - New York NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06Q 10/00
US Classification:
709206
Abstract:
Inappropriate behavior, such as harassment, expletive laden communications, violence or sexually explicit behavior in a virtual universe (VU) can lead to negative experiences for VU users. Younger users of a VU can be more susceptible to inappropriate behavior than adult users. A VU system can monitor behavior and associate behavior ratings with avatars within the VU to respond to avatar/user behavior. A system can determine behavior ratings based upon avatar interactions, user complaints or complements about an avatar, actions within the VU, etc. The system can subject poorly behaving avatars to various penalties (e.g., restriction from certain areas, account termination, etc.). The system can also reward avatars that exhibit good behavior (e.g., allowing access to bonus areas or content, awarding points that can be used as VU currency, etc.). Penalizing inappropriate behavior and rewarding positive behavior can increase safety of minors in the VU, and increase user experience overall.

Secure Boot Up Of A Computer Based On A Hardware Based Root Of Trust

View page
US Patent:
20130124840, May 16, 2013
Filed:
Nov 11, 2011
Appl. No.:
13/294467
Inventors:
Vincent V. Diluoffo - Sandy Hook CT, US
Dan P. Dumarot - Cornwall NY, US
Eugene B. Risi - Essex Junction VT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
G06F 9/00
US Classification:
713 2
Abstract:
A method includes performing a boot up of a computer having a system on-chip having multiple processors and a nonvolatile read-only machine-readable medium. The boot up includes enabling a first processor of the multiple processors, while maintaining others of the multiple processors in a disabled state. The boot up includes retrieving initial stage instructions from the nonvolatile read-only machine-readable medium. The boot up also includes executing the initial stage instructions and validating multiple stages of firmware separately. The boot up includes, in response to validating the multiple stages of firmware, executing the multiple stages of firmware in consecutive stages of the boot up, wherein executing of each stage of the multiple stages of firmware enables a different set of disabled hardware components of the computer. The boot up also includes validating an operating system and, in response to validation, transferring control of the computer to the operating system.

Protecting Against Data Loss In A Networked Computing Environment

View page
US Patent:
20140244311, Aug 28, 2014
Filed:
Feb 25, 2013
Appl. No.:
13/775426
Inventors:
- Armonk NY, US
Vincent V. Diluoffo - Sandy Hook CT, US
Barry M. Graham - Silver Spring MD, US
James W. Seaman - Falls Church VA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06Q 40/08
US Classification:
705 4
Abstract:
An approach for protecting (e.g., insuring) against data loss (e.g., due to SLA failures) in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a risk table is created that associates cloud/solution providers with a corresponding risk factor and a cost of insuring the providers based on the risk factors. The risk factors are typically calculated using historical data that is based on (among other things), each provider's historical capability of honoring SLA terms, expected performance levels, etc. In any event, each provider may be associated with a cost of insuring that provider against failing to perform/process one or more future jobs/workloads. This allows a consumer who needs a workload to be processed to: view the risk table, select a provider, and/or insure against any failure to properly and/or timely process the workload.
Vincent V Diluoffo from Sandy Hook, CT, age ~62 Get Report