410 N Elliott Rd, Chapel Hill, NC 27514 • 9194916521
410 N Elliott Rd #N, Chapel Hill, NC 27514
Pittsboro, NC
5500 Fortunes Ridge Dr, Durham, NC 27713
5500 Fortunes Ridge Dr #83B, Durham, NC 27713
5804 Tattersall Dr, Durham, NC 27713
5804 Tattersall Dr #21, Durham, NC 27713
713 Wellmeier Ave, Dayton, OH 45410
4954 Woodman Park Dr #16, Dayton, OH 45432
Wilmington, NC
Winston Salem, NC
Name / Title
Company / Classification
Phones & Addresses
Jeffrey Calcaterra Engineering Manager
Wpafb Nonclassifiable Establishments
2230 10 St, Dayton, OH 45433
Isbn (Books And Publications)
Materials Damage Prognosis: Proceedings of a Sympoium Sponsored By The Structural Materials Division (SMD) of TMS (The Minerals, Metals, & Materials Society), Held During The Mat
Provided are a computer program product, system, and method for using a declaration of security requirements to determine whether to permit application operations. A declaration of security requirements indicates actions the application designates to perform with respect to resources in a computer system, wherein a plurality of the indicated actions are indicated for at least two operation modes of the application. A detection is made of whether the application is requesting to perform a requested action with respect to a requested resource in the computer system. A determination is made of a current operation mode of the application comprising one of the at least two operation modes in response to detecting that the application is requesting the requested action. A determination is made as to whether the declaration of security requirements indicates the requested action with the current operation mode. The requested action with respect to the requested resource is allowed to proceed in response to determining that the declaration of security requirements indicates the requested action with respect to the requested resource as indicated with the current operation mode.
Method And Apparatus For Automating Updates To Dependencies
Jeffrey Calcaterra - Chapel Hill NC, US Theresa Ramsey - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717168000
Abstract:
Users of a software are able to, at install and runtime, confirm that the present configuration of dependency conditions including software, such as program files, data files, and hardware such as memory or hard drive capacity, will cooperate with the intended design of the software in a relatively error-free manner. This may be accomplished at those times by obtaining from a vendor site, a list of prerequisites, co-requisites, and mutually exclusive conditions to confirm proper configuration, even accounting for operating system upgrades that may have become available after the general availability of the particular software and particular version of that software
Dynamic, Selective Obfuscation Of Information For Multi-Party Transmission
Jeffrey A. Calcaterra - Chapel Hill NC, US John R. Hind - Raleigh NC, US Abdolreza Salahshour - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/06
US Classification:
380260
Abstract:
Selectively obfuscating, or obscuring, a portion or portions of information in a multi-party transmission. A user participating in a multi-party exchange signals a communication device (or proxy) that he will provide private information that is to be perceptible only to a subset of the other participants. This user also identifies that subset, preferably by providing a group identifier for a group in which that subset of participants are members. The communication device transmits a member-specific descriptor comprising an encrypted version of a group key, and uses this group key to encrypt the private information that is to be perceptible only to the subset. Device-specific characteristics of participant devices are used, in addition to user-provided data (such as a user's log-on identifier and/or password), as input to create cryptographic key information. Only participants in the subset can decrypt the encrypted private information; other participants preferably receive a filler pattern of some type instead.
Method And Apparatus For Multiple Electrical Circuit Mapping
Jeffrey Alan Calcaterra - Chapel Hill NC, US Steven Michael Miller - Cary NC, US Humberto Gutierrez-Rivas - Chapel Hill NC, US
International Classification:
G01R 19/145
US Classification:
324 66
Abstract:
A module is provided for identifying outlets on a common power circuit. The module comprises a connector adapted to electrically couple with an outlet, a signal generator electrically connected to the connector and adapted to send a signal through the connector into a power circuit in response to a predetermined discrete event, an indicator; and logic electrically connected to the connector and the indicator and adapted to detect a signal from another apparatus propagated on a common circuit and activate the indicator in response to the signal.
System, Method, And Program Product For Mapping Circuits
Jeffrey Alan Calcaterra - Chapel Hill NC, US Steven Michael Miller - Cary NC, US Humberto Gutierrez-Rivas - Chapel Hill NC, US
International Classification:
G01R 15/00
US Classification:
702 57
Abstract:
A method, apparatus and program product are provided for mapping electrical circuits. A user provides an electronic record of one or more rooms with outlets to be mapped and installs a module in each outlet to be mapped. Using an interactive program, the user prepares a diagram of a circuit box. The user triggers a probe to propagate a signal detectable by said modules over a circuit and to provide circuit information. The user retrieves the circuit information from the modules. Then, the interactive program associates the circuit information from each module with a corresponding outlet on said electronic record of one or more rooms.
Apparatus, System, And Method For Defining Normal And Expected Usage Of A Computing Resource
Jeffrey A. Calcaterra - Research Triangle Park NC, US Andrew L. Hanson - Rochester MN, US Gregory R. Hintermeister - Rochester MN, US Govindaraj Sampathkumar - Research Triangle Park NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 17/00
US Classification:
706 11
Abstract:
An apparatus, system, and method are disclosed for defining normal usage of a computing system resource. A method for defining normal usage of a computing system resource includes receiving a repeating schedule that represents system usage of one or more computing resources and receiving one or more demand events that will affect the system usage of the one or more computer resources. The method also automatically creates a predictive temporal profile that represents the system usage of the one or more computer resources from information comprising the repeating schedule and the one or more demand events. The predictive temporal profile is displayed for the user to review.
Management Of Actions Based On Priority Levels And Calendar Entries
Jeffrey Alan Calcaterra - Research Triangle Park NC, US Gregory Richard Hintermeister - Rochester MN, US David Bruce Lection - Research Triangle Park NC, US Alan David Seid - Poughkeepsie NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 9/54 G06Q 30/00 G06F 11/07
US Classification:
705 34, 719318, 714 57, 714E11025
Abstract:
A management application implemented in a computational device maintains priorities corresponding to a plurality of resources coupled to the computational device. Indications for actions to be performed corresponding to occurrences of events are stored to a calendar, wherein the calendar is configurable by a user. A selected indication for an action to be performed is stored to the calendar. In response to an occurrence of an event associated with a selected resource, a priority of the selected resource is determined. The action is performed, based on at least the determined priority of the selected resource and the selected indication for the action stored in the calendar, wherein different actions are performed in response to occurrences of a selected event at different times.
Remediating Gaps Between Usage Allocation Of Hardware Resource And Capacity Allocation Of Hardware Resource
Jeffrey A. Calcaterra - Chapel Hill NC, US Gregory R. Hintermeister - Rochester MN, US Michael D. Williams - Newark Valley NY, US
International Classification:
G06F 3/048 G06F 9/50
US Classification:
715771, 718104
Abstract:
A usage allocation of a hardware resource to each of a number of workloads over time is determined using a demand model. The usage allocation of the resource includes a current and past actual usage allocation of the resource, a future projected usage allocation of the resource, and current and past actual usage of the resource. A capacity allocation of the resource is determined using a capacity model. The capacity allocation of the resource includes a current and past capacity and a future projected capacity of the resource. Whether a gap exists between the usage allocation and the capacity allocation is determined using a mapping model. Where the gap exists between the usage allocation of the resource and the capacity allocation of the resource, a user is presented with options determined using the mapping model and selectable by the user to implement a remediation strategy to close the gap.
Youtube
Good Engineers Save Lives | Dr. Jeff Calcater...
Dr. Jeff Calcaterra, Air Force Research Laboratory materials engineer,...
Duration:
18m 19s
Jeff Calcaterra
Duration:
9m 37s
Jeff Calcaterra on the 2011 Incoming Class
Head coach Jeff Calcaterra discusses the eleven-man incoming class for...
Duration:
3m 31s
Jeff Calcaterra postgame 3.26.11
Head coach Jeff Calcaterra talks about his team's defeats to Yale in t...
Duration:
2m 12s
Brother Rice Athletic Director Jeff Calcaterr...
Duration:
2m 14s
Joey Calcaterra 14 Clutch Points in the 2nd H...
The legend of Joey Calcaterra was the storyline of the comeback win to...