About
John is an IBM Master Inventor, Honorary Professor, Research Fellow, Impact Fellow and…
Articles by John
-
UCL collaborate with IBM to innovate on Enterprise Messaging & create a visual MQ
UCL collaborate with IBM to innovate on Enterprise Messaging & create a visual MQ
By John McNamara
-
Chance encounter results in award winning research and a robot called CATHI
Chance encounter results in award winning research and a robot called CATHI
By John McNamara
-
IBM Hursley gives life to cognitive innovation
IBM Hursley gives life to cognitive innovation
By John McNamara
Activity
-
IBM believes the talent gap is one of the biggest challenges facing businesses today and we are taking bold action to help close it through…
IBM believes the talent gap is one of the biggest challenges facing businesses today and we are taking bold action to help close it through…
Liked by John McNamara
-
Congratulations to all the talented students who delivered their presentations for the Management Consultancy Unit yesterday! 🎉 Students have been…
Congratulations to all the talented students who delivered their presentations for the Management Consultancy Unit yesterday! 🎉 Students have been…
Liked by John McNamara
-
We are thrilled to announce that our teacher training is rated ‘outstanding’ across all four areas, from early years to post-16 📣 We were the first…
We are thrilled to announce that our teacher training is rated ‘outstanding’ across all four areas, from early years to post-16 📣 We were the first…
Liked by John McNamara
Experience
Education
Licenses & Certifications
Publications
-
Invention publication: Intelligent Fuel Management System
ip.com
This publication outlines a method to determine required fuel by using the information on driver history and using this to predict fuel requirements. This would provide the driver with a fuel management system which would notify the driver of fuel needs automatically based on their upcoming journeys, rather than simply on the level of fuel in the car. This method would prevent the driver from running out of fuel on long journeys, spending time and energy on searching for filling stations in an…
This publication outlines a method to determine required fuel by using the information on driver history and using this to predict fuel requirements. This would provide the driver with a fuel management system which would notify the driver of fuel needs automatically based on their upcoming journeys, rather than simply on the level of fuel in the car. This method would prevent the driver from running out of fuel on long journeys, spending time and energy on searching for filling stations in an unfamiliar area. It would be particularly useful where the drivers car ran on alternative fuels which may not be supported by all filling stations.
-
Invention publication: Method for constructing time based complex event logic using a visual timeline
ip.com
Complex event processing (CEP) constructs invariably contain a time based element where actions are generated as a result of incoming events over time. Using conventional logic based CEP user interfaces, time is represented as a numeric parameter within the logic. Such an approach means that the temporal relationship between events can be difficult to visualise and construct for a business user. As it is the business user, who is best placed to author these CEP constructs (as they know the…
Complex event processing (CEP) constructs invariably contain a time based element where actions are generated as a result of incoming events over time. Using conventional logic based CEP user interfaces, time is represented as a numeric parameter within the logic. Such an approach means that the temporal relationship between events can be difficult to visualise and construct for a business user. As it is the business user, who is best placed to author these CEP constructs (as they know the requirements driving the CEP logic), defining time-based patterns of events should be as non-technical as possible.
Other authorsSee publication -
Invention publication: Micro Blogging Auto Scheduler
ip.com
A method for automatically targeting customer base geographically with relative timezone accuracy
-
Invention publication: Automatic resource prioritisation for messages
ip.com
A method to automatically adjust machine resource levels to support high priority messages in a heavily utilised environment
Other authorsSee publication -
Invention publication: Governance process for Information Development Style Checking System
ip.com
Within any collaborative style checking system, it is important to have a governance process to ensure that the information remains accurate and useful. No such automated processes exist currently, and this disclosure proposes such an automated system.
Other authorsSee publication -
Invention publication: Complex Event Processing Sarbanes Oxley Compliance System
ip.com
Risk mitigation compliance is becoming an increasingly significant factor not only in the way in which companies do business, but also in how the Information Technology infrastructure supports how that business is executed. It may be overtly obvious to those specialists involved in the construction of business processes, which activities incur risk and require a balancing mitigation activity, but it is not obvious to those which define and support the technical infrastructure. This area of…
Risk mitigation compliance is becoming an increasingly significant factor not only in the way in which companies do business, but also in how the Information Technology infrastructure supports how that business is executed. It may be overtly obvious to those specialists involved in the construction of business processes, which activities incur risk and require a balancing mitigation activity, but it is not obvious to those which define and support the technical infrastructure. This area of uncertainly can expose companies to risk of non compliance, as technical infrastructures are updated and re-factored on a regular basis and this can lead to changes in the way such mitigation activities are supported, or not. This article outlines a method which can be used in Complex Event Processing technology to assure the continued support of required risk mitigation activities and therefore assist companies in remaining compliant to acts such as Sarbanes Oxley.
Other authorsSee publication -
Invention publication: Goal Directed Automated Simulation for Complex Event Processing and Complex Business Process Management
ip.com
BPM simulation tools have been a long standing invaluable tool for the business process expert in attempting to determine if the designed business process will meet the business requirements goals. The use of these simulation tools however, can require the business user to set dozens of parameters independently and generate dozens of simulations to determine if the change made to the process moves it nearer the goals of the BPM requirements. This can be a long, drawn out and error prone…
BPM simulation tools have been a long standing invaluable tool for the business process expert in attempting to determine if the designed business process will meet the business requirements goals. The use of these simulation tools however, can require the business user to set dozens of parameters independently and generate dozens of simulations to determine if the change made to the process moves it nearer the goals of the BPM requirements. This can be a long, drawn out and error prone process, which unfortunately has been necessary as only the business expert knows which of the parameters are acceptable to be altered and by how much. This article outlines a method of automating the process of this step by step granular user heavy activity, and using automated business intelligence for the simulator to determine for itself which of these parameters need to be altered and by what quantity in order to reach business goals
Other authorsSee publication -
Invention publication: Autocorrection of style and content problems in information items using entity files
ip.com
Tools exist to help developers of documentation to maintain a consistent style and correct errors such as spelling or grammar. These tools usually use a standard style and grammar tool that is often inflexible, and certainly doesn't reflect the individual requirements of any particular organisation or team. Writers might ignore the warnings generated by these tools as irrelevant, or else potential problems not included in the design of the tool are missed. One solution to this problem is to…
Tools exist to help developers of documentation to maintain a consistent style and correct errors such as spelling or grammar. These tools usually use a standard style and grammar tool that is often inflexible, and certainly doesn't reflect the individual requirements of any particular organisation or team. Writers might ignore the warnings generated by these tools as irrelevant, or else potential problems not included in the design of the tool are missed. One solution to this problem is to take user defined content in the form of entity files, and use this to enhance to tools to make it more relevant to the local style and content requirements. An example of this is standard text such as a product name, legal statement or interface element. These are highly specific to a group, but could easily be found by comparison to the entity file. These recognised word strings can then be checked and if necessary replaced with the correct style or content.
-
Invention publication: Information Development Style Checking System
ip.com
This article outlines how human effort and time could be saved in Information Development, by providing an increasingly rich automated Buddy Checking process. One of the challenges with buddy checking is that it is very dependant on the type of writing style required for the product. One style of writing may be inappropriate for one type of product, by acceptable for another. This article outlines how a product/team based automated buddy check system could be used to 'learn' from previous and…
This article outlines how human effort and time could be saved in Information Development, by providing an increasingly rich automated Buddy Checking process. One of the challenges with buddy checking is that it is very dependant on the type of writing style required for the product. One style of writing may be inappropriate for one type of product, by acceptable for another. This article outlines how a product/team based automated buddy check system could be used to 'learn' from previous and current buddy checks and to assimilate this information into its product/team style database. This automated buddy check could then be run by information developers, thus reducing wasted cycles on manually checking and then re-working problems seen before.
Other authorsSee publication -
Invention publication: Event Processing Simulator
IP.com
An event processing simulator to allow automatic calculation of financial and resource statistics. The simulator takes given inputs for cost and resources and delivers statistics that would result from the processing of events and actions in the system over time. Different results can automatically be obtained by modifying the attributes and repeating the simulation. This provides a way to create an adaptable financial model for an event processing application.
Patents
-
Metal fatigue analytics and alert systems
Issued US US20160132574A1
The disclosure is directed to metal fatigue analytics and alert systems. A system in accordance with an embodiment includes: a first database on a vehicle, the database storing a list of at least one metal part in the vehicle and corresponding metal batch information for each metal part in the list; a second database on a server remote from the first database, the second database storing metal batch information for at least one batch of metal from which faulty metal parts have been constructed;…
The disclosure is directed to metal fatigue analytics and alert systems. A system in accordance with an embodiment includes: a first database on a vehicle, the database storing a list of at least one metal part in the vehicle and corresponding metal batch information for each metal part in the list; a second database on a server remote from the first database, the second database storing metal batch information for at least one batch of metal from which faulty metal parts have been constructed; a comparing system for comparing the metal batch information stored in the first database with the metal batch information stored in the second database; and a messaging system for generating a failure alert message when the comparing system finds a match between the metal batch information stored in the first database and the metal batch information stored in the second database.
-
Socially enabled guidance for products
Issued US US20160147397A1
The disclosure is directed to socially enabled guidance for products with GUIs. A method in accordance with an embodiment includes: recording a set of sequential graphical user interface (GUI) interactions in a product GUI; saving the set of sequential GUI interactions in a file; importing the file containing the set of sequential GUI interactions; parsing the file to extract the set of sequential GUI interactions; highlighting a GUI interaction listed in the set of sequential GUI interactions;…
The disclosure is directed to socially enabled guidance for products with GUIs. A method in accordance with an embodiment includes: recording a set of sequential graphical user interface (GUI) interactions in a product GUI; saving the set of sequential GUI interactions in a file; importing the file containing the set of sequential GUI interactions; parsing the file to extract the set of sequential GUI interactions; highlighting a GUI interaction listed in the set of sequential GUI interactions; and in response to a user selection of the highlighted GUI interaction, highlighting a next GUI interaction listed in the set of sequential GUI interactions.
-
Intelligent offline caching of non navigated content based on usage metrics
Issued US US 8769073 B2
A request for a navigated content associated with a browsing session can be received. The navigated content can be an electronic artifact which can be presented within an interface during the browsing session. The navigated content can be associated with a data source. The interface can be associated with a computing device. A usage metric associated with the navigated content can be collected. The usage metric can be a frequency and/or a duration measurement. The usage metric can be determined…
A request for a navigated content associated with a browsing session can be received. The navigated content can be an electronic artifact which can be presented within an interface during the browsing session. The navigated content can be associated with a data source. The interface can be associated with a computing device. A usage metric associated with the navigated content can be collected. The usage metric can be a frequency and/or a duration measurement. The usage metric can be determined to be equivalent to a threshold value of a usage ruleset and can automatically persist within an offline cache the navigated content. A non-navigated content within the offline cache can be programmatically stored. The non-navigated content can be an electronic artifact linked to the navigated content wherein the non-navigated content is not presented within the interface during the browsing session.
-
Updating software based on utilized functions
Issued US US9286057 B2
In a method for managing updates for a software product, receiving a request to install a software product update, wherein the software product update modifies a software product on a computing device. The method further includes identifying a first set of one or more functions of the software product that are to be modified by the software product update. The method further includes identifying historical usage information corresponding to the software product, wherein the historical usage…
In a method for managing updates for a software product, receiving a request to install a software product update, wherein the software product update modifies a software product on a computing device. The method further includes identifying a first set of one or more functions of the software product that are to be modified by the software product update. The method further includes identifying historical usage information corresponding to the software product, wherein the historical usage information indicates a second set of one or more functions of the software product and a number of times each respective function of the second set of one or more functions of the software product has been used by the computing device. The method further includes determining whether the software product update modifies at least one function of the software product that corresponds to historical usage information that exceeds a minimum usage threshold condition.
-
Automated Business Process Modeling
Issued US US 8521762B2
In a method for generating a business process model project, a computer receives a data file comprising text, descriptive of a business process. The computer searches a sentence in the text for a keyword indicative of existence of a corresponding business artifact stated elsewhere in the sentence. In response, the computer identifies an indicator in the sentence, the indicator designating a name of the corresponding business artifact. The computer identifies a business artifact based on the…
In a method for generating a business process model project, a computer receives a data file comprising text, descriptive of a business process. The computer searches a sentence in the text for a keyword indicative of existence of a corresponding business artifact stated elsewhere in the sentence. In response, the computer identifies an indicator in the sentence, the indicator designating a name of the corresponding business artifact. The computer identifies a business artifact based on the keyword and the indicator. The computer generates a business process model project based in part on the business artifact.
-
Conditional probability operator for event processing systems
Issued US US20130144814 A1
An event processing system in which a computer receives an input event comprising one or more factors. The computer evaluates the factors of the input event based on an event processing rule containing a pattern detection operator and a conditional probability operator. The conditional probability operator can operate to calculate a conditional probability for a set of training data that a specified pattern will appear in the factors of an input event given a specified output event, and can…
An event processing system in which a computer receives an input event comprising one or more factors. The computer evaluates the factors of the input event based on an event processing rule containing a pattern detection operator and a conditional probability operator. The conditional probability operator can operate to calculate a conditional probability for a set of training data that a specified pattern will appear in the factors of an input event given a specified output event, and can further operate to assign a conditional rule value a binary value based on how the conditional probability compares to a target probability.
-
Generating Security Permissions
Filed US 20130067532
Embodiments of the invention relate to generating security permissions for applications. A static analysis on an application is carried out to determine security exceptions and to determine the application components responsible for the security exceptions. The determined security exceptions are analysed to calculate permissions required for each component. A security policy file that includes a hierarchy of the required permissions suitable for the type of application is formatted and applied…
Embodiments of the invention relate to generating security permissions for applications. A static analysis on an application is carried out to determine security exceptions and to determine the application components responsible for the security exceptions. The determined security exceptions are analysed to calculate permissions required for each component. A security policy file that includes a hierarchy of the required permissions suitable for the type of application is formatted and applied to the application to provide a security enabled application.
Read more: http://www.faqs.org/patents/app/20130067532#b#ixzz2T6Jw8T3IOther inventorsSee patent
Honors & Awards
-
Honorary Professor at University College London
University College London
Awarded title of Honorary Professor at University College London
-
Honorary Professor Sheffield Hallam University
Sheffield Hallam University
Awarded Honorary Professor title at Sheffield Hallam University
-
Advanced Visiting Research Fellow at the University of Sheffield
University of Sheffield
Awarded title of Advanced Visiting Research Fellow at the University of Sheffield
-
Impact Fellow at Sheffield Hallam University
Sheffield Hallam University
Awarded title of Impact Fellow at Sheffield Hallam University
-
The International Federation for the Promotion of Machine Science
The International Award Committee for Medical and Service Robotics
In testimony for significant achievement in Medical and Service Robotics with paper: IBM AI Cloud Services to Enhance Automatic Cognitive Assessment via Human-Robot Interaction
-
Excellence Award
IBM
EAG Technical Excellence
-
Visiting Research Fellow at the University of Portsmouth
University of Portsmouth
Awarded Visiting Research Fellow at the University of Portsmouth
-
Eminence and Excellence
IBM
IBM Technical Rockstar Award for IBM Cloud
-
Eminence and Excellence
IBM
Technical Excellence for Cloud
-
Eminence and Excellence
IBM
IBM Technical Rockstar Award for IBM Cloud
-
Eminence and Excellence
IBM
Technical Rockstar Award for IBM Cloud
-
Eminence and Excellence
IBM
Technical Rockstar Award
-
Excellence Award
IBM
Technical Excellence IIC
-
Eminence and Excellence
IBM
Technical Rockstar Award
Recommendations received
14 people have recommended John
Join now to viewMore activity by John
-
Congratulations to all our students completing their dissertations! 🎉
Congratulations to all our students completing their dissertations! 🎉
Liked by John McNamara
-
IBM 🇧🇬 Academic program in action! #TuesFest Technology School Electronic Systems (TUES), associated with Technical University-Sofia team rocked…
IBM 🇧🇬 Academic program in action! #TuesFest Technology School Electronic Systems (TUES), associated with Technical University-Sofia team rocked…
Liked by John McNamara
-
"I would 100% recommend apprenticeships and Sheffield Hallam University as a provider. The service we've had from the university has been fantastic…
"I would 100% recommend apprenticeships and Sheffield Hallam University as a provider. The service we've had from the university has been fantastic…
Liked by John McNamara
-
Met the wonderful Professor Charlotte Valeur yesterday - we were both guests on a panel talking about 'Fostering an Inclusive Workplace'. Hosted by…
Met the wonderful Professor Charlotte Valeur yesterday - we were both guests on a panel talking about 'Fostering an Inclusive Workplace'. Hosted by…
Liked by John McNamara
-
Delighted to welcome John Granger to our Glasgow office yesterday and have great discussions around IBM strategy, the monumental Gen AI shift in…
Delighted to welcome John Granger to our Glasgow office yesterday and have great discussions around IBM strategy, the monumental Gen AI shift in…
Liked by John McNamara
-
It was a pleasure to host HSBC in the London Innovation Studio! More importantly, I would like to personally thank the HSBC team for their…
It was a pleasure to host HSBC in the London Innovation Studio! More importantly, I would like to personally thank the HSBC team for their…
Liked by John McNamara
-
I'm thrilled to announce that the East Midlands Cyber Security Cluster has finally found its home, identity and brand! This wouldn't have been…
I'm thrilled to announce that the East Midlands Cyber Security Cluster has finally found its home, identity and brand! This wouldn't have been…
Liked by John McNamara
-
Agile: Tu camino hacia el éxito en un mundo en constante transformación. Con su enfoque versátil, adaptable y colaborativo, estarás listo para…
Agile: Tu camino hacia el éxito en un mundo en constante transformación. Con su enfoque versátil, adaptable y colaborativo, estarás listo para…
Liked by John McNamara
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named John McNamara in United Kingdom
-
John McNamara
-
John McNamara
Regional Sales Manager Wolseley
-
John McNamara
Head of Stakeholder Relations at Great British Nuclear
-
John McNamara
Non-Executive Chair Innovate Awarding Ltd.
80 others named John McNamara in United Kingdom are on LinkedIn
See others named John McNamara