Patents by Inventor Jessica C. Murillo
Jessica C. Murillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150074125Abstract: A computer identifies at least one common content element used by each of at least two users from at least one communication by each of the at least two users. Responsive to one of the at least two users constructing content for a potential communication to the other of the at least two users, the computer accesses the at least one common content element for use by at least one content prediction service enabled for presenting one or more possible content elements comprising the at least one common content element for user selection during construction of the content for the potential communication.Type: ApplicationFiled: September 9, 2013Publication date: March 12, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald F. MCBREARTY, Shawn P. MULLEN, Jessica C. MURILLO, Johnny M. SHIEH
-
Publication number: 20140331284Abstract: Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.Type: ApplicationFiled: May 2, 2013Publication date: November 6, 2014Inventors: Susann M. Keohane, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8856519Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key. Examples of protected resource include, but are not limited to, databases, communication devices and a lightweight directory access protocol server.Type: GrantFiled: April 24, 2013Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140280640Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: ApplicationFiled: November 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20140282079Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20140267337Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.Type: ApplicationFiled: September 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140282690Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140194104Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.Type: ApplicationFiled: October 30, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140194101Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8725874Abstract: The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server.Type: GrantFiled: September 27, 2007Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140006801Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key.Type: ApplicationFiled: April 24, 2013Publication date: January 2, 2014Applicant: International Business Machines CorporationInventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140006079Abstract: Methods, systems, and computer program products may schedule viewing of a recorded event. The method may include receiving, by an electronic apparatus, an electronic request for an invitee to attend an event that will be recorded, and determining, by the electronic apparatus, that the invitee cannot attend the event. The method may additionally include determining, by the electronic apparatus, one or more open time intervals on an electronic calendar of the invitee to view a recording of the event, and selecting, by the electronic apparatus, at least one open time interval from the determined one or more open time intervals. The method may further include scheduling, by the electronic apparatus, viewing of the recording during the selected open time interval on the electronic calendar.Type: ApplicationFiled: June 28, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8621052Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.Type: GrantFiled: August 20, 2010Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20130179203Abstract: A method for restricting access to project data includes determining that a user has failed to indicate an intention to attend a meeting by failing to respond to a meeting notice or by indicating that the user will not participate in the meeting. The meeting notice includes an invitation sent electronically to the user to attend a meeting, and the user has electronic access to data by way of permissions associated with a user account assigned to the user. The meeting is related to the data. The method includes recording a failure-to-attend event in response to determining that the user has failed to indicate an intention to attend a meeting. The method includes blocking the user from accessing the user account in response to a quantity of failure-to-attend events reaching non-attendance criteria.Type: ApplicationFiled: January 9, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20130179260Abstract: Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system.Type: ApplicationFiled: January 9, 2012Publication date: July 11, 2013Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8271056Abstract: A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip.Type: GrantFiled: January 17, 2008Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8271268Abstract: A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device.Type: GrantFiled: April 18, 2007Date of Patent: September 18, 2012Assignee: Nuance Communications, Inc.Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny Meng-Han Shieh
-
Publication number: 20120222113Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.Type: ApplicationFiled: May 8, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20120047240Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.Type: ApplicationFiled: August 20, 2010Publication date: February 23, 2012Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8041680Abstract: Backing up a database, including providing, in the database by a DBMS, at least one record with at least one backup field, the backup field being a data element that controls the backing up of the record, and backing up, by a backup module, the a record in dependence upon a value of the backup field.Type: GrantFiled: June 8, 2007Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh