Patents by Inventor Denny Pichardo
Denny Pichardo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9996447Abstract: Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running. The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold.Type: GrantFiled: December 1, 2014Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Mark A. Alkins, Denny Pichardo, Martin J. C. Presler-Marshall, Hunter K. Presnall
-
Publication number: 20150089482Abstract: Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold.Type: ApplicationFiled: December 1, 2014Publication date: March 26, 2015Inventors: Mark A. Alkins, Denny Pichardo, Martin J. C. Presler-Marshall, Hunter K. Presnall
-
Patent number: 8904360Abstract: Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running. The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold.Type: GrantFiled: September 17, 2013Date of Patent: December 2, 2014Assignee: International Business Machines CorporationInventors: Mark A. Alkins, Denny Pichardo, Martin J. C. Presler-Marshall, Hunter K. Presnall
-
Publication number: 20140019944Abstract: Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running. The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold.Type: ApplicationFiled: September 17, 2013Publication date: January 16, 2014Applicant: International Business Machines CorporationInventors: Mark A. Alkins, Denny Pichardo, Martin J. C. Presler-Marshall, Hunter K. Presnall
-
Patent number: 8549487Abstract: Detection of redundant or duplicate method calls in a running program is provided. One or more methods can be selectively called when a program is running. Specified data is collected each time that a call to a given one of the methods occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method. The collected data includes an element uniquely identifying each of the particular argument values. The collected data is stored at a selected location, and a call threshold is selected for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method. The collected data is selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold.Type: GrantFiled: October 29, 2008Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Mark Andrew Alkins, Denny Pichardo, Martin Joseph Clayton Presler-Marshall, Hunter K. Presnall
-
Patent number: 8291389Abstract: A code profiler can be digitally encoded in a storage medium that is configured to automatically detect an existence of non-modifying transforms within monitored programmatic code using hash codes of arguments of the monitored programmatic code.Type: GrantFiled: August 21, 2008Date of Patent: October 16, 2012Assignee: International Business Machines CorporationInventors: Mark A. Alkins, Denny Pichardo, Martin J. C. Presler-Marshall, Hunter K. Presnall
-
Publication number: 20100107144Abstract: Embodiments of the invention use an automated procedure to detect the occurrence of redundant or duplicate method calls in a running program. Software developers may then be notified of the redundant calls, and correct the redundancies if necessary. One embodiment, directed to a process or inventive method, is associated with a program disposed to run on a data processing system, wherein the program is provided with one or more methods that can be selectively called when the program is running. The process includes the step of collecting specified data each time that a call to a given one of the methods occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values.Type: ApplicationFiled: October 29, 2008Publication date: April 29, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Andrew Alkins, Denny Pichardo, Martin Joseph Clayton Presler-Marshall, Hunter K. Presnall
-
Publication number: 20100050162Abstract: A code profiler can be digitally encoded in a storage medium that is configured to automatically detect an existence of non-modifying transforms within monitored programmatic code using hash codes of arguments of the monitored programmatic code.Type: ApplicationFiled: August 21, 2008Publication date: February 25, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MARK A. ALKINS, DENNY PICHARDO, MARTIN J. C. PRESLER-MARSHALL, HUNTER K. PRESNALL
-
Patent number: 7647193Abstract: A method, apparatus and computer program product for authenticating a pharmaceutical product is provided. The method includes receiving an identifier and a quantity for the pharmaceutical product and receiving a photonic signal from the pharmaceutical product, wherein the photonic signal includes a frequency and amplitude. The method can further include searching for the identifier and quantity that was received in a predefined list comprising identifier-quantity pairs, wherein a frequency and amplitude corresponds to each identifier-quantity pair. The method can further include matching the identifier and quantity that was received to a first identifier-quantity pair in the list. The method can further include storing a record indicating that the pharmaceutical product is counterfeit if the frequency and amplitude of the photonic signal does not match the frequency and amplitude corresponding to the first identifier-quantity pair.Type: GrantFiled: January 23, 2008Date of Patent: January 12, 2010Assignee: International Business Machines CorporationInventors: Arthur R. Francis, Ruthie D. Lyle, Veronique L. Moses, Denny Pichardo
-
Publication number: 20090187364Abstract: A method, apparatus and computer program product for authenticating a pharmaceutical product is provided. The method includes receiving an identifier and a quantity for the pharmaceutical product and receiving a photonic signal from the pharmaceutical product, wherein the photonic signal includes a frequency and amplitude. The method can further include searching for the identifier and quantity that was received in a predefined list comprising identifier-quantity pairs, wherein a frequency and amplitude corresponds to each identifier-quantity pair. The method can further include matching the identifier and quantity that was received to a first identifier-quantity pair in the list. The method can further include storing a record indicating that the pharmaceutical product is counterfeit if the frequency and amplitude of the photonic signal does not match the frequency and amplitude corresponding to the first identifier-quantity pair.Type: ApplicationFiled: January 23, 2008Publication date: July 23, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur R. Francis, Ruthie D. Lyle, Veronique L. Moses, Denny Pichardo
-
Publication number: 20080309484Abstract: A method, system and computer program product for detecting an explosive mixture. A potentially hazardous material is embedded with molecules where these molecules are used for identifying individual cells. Upon scanning the potentially hazardous material, the embedded molecules give off light or sonar signatures as output. The output of these molecules is read by a reader which is used to identify the type of material as well as the amount of the material. This information is stored and correlated with the passenger carrying the identified material and the passenger's flight information. A security alert is generated if there is a combination of amounts of potentially hazardous materials previously identified with the amount of potentially hazardous material currently identified that together would be classified as an explosive device where these potentially hazardous materials are to be carried by individual(s) on the same flight(s).Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Applicant: International Business Machines CorporationInventors: Arthur R. Francis, Ruthie D. Lyle, Veronique Le Shan Tice Moses, Denny Pichardo
-
Publication number: 20080201645Abstract: A Portal Page Customizer (PPC) provides a tagging component and a portal page generator that enables a user to quickly display portlets most preferred by a community of portlet users. Each tag is associated with one or more portlet. A user can add new descriptive tags to portlets using tools on the portal page. When a user selects a tag from a tag cloud, the PPC displays portlets associated with the selected tag.Type: ApplicationFiled: February 21, 2007Publication date: August 21, 2008Inventors: Arthur R. Francis, Ruthie D. Lyle, Veronique L. Moses, Denny Pichardo