Patents by Inventor Latha Sivakumar

Latha Sivakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9229738
    Abstract: A message occurrence can be detected when a software application runs on a computing device. The message occurrence can be an occurrence where a text containing message is presented upon a user interface of the software application or a log associated with the software application is updated with a text containing message. A user context for the message occurrence can be determined. The user context can include a user sequence and an execution path. Message occurrence information can be conveyed to a message context catalog. Within the message context catalog, the message occurrence information can be indexed against unique message identifiers. Message occurrence information from the message context catalog can be presented in a computer's user interface when a message uniquely identified by the message identifier is presented in the user interface. The user interface can permit a user to edit text of messages.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: January 5, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ana C. Biazetti, Virginia D. Hill, Radhika Ramakrishnan, Jeffrey T. Robke, Latha Sivakumar, Mary E. Sturgeon
  • Patent number: 8788457
    Abstract: A method, system and computer program product for ensuring that archival data deleted in a source table is already stored in a target table. An external data source sets a flag in the first table to identify the row in the source table to be deleted. An application sets a flag in a second table for each row of the source table that is marked to be deleted according to the first table. The application performs uncommitted read operations on the source table for each row corresponding to the distinct primary key values stored in the first table. The application inserts the data read into the corresponding rows of the target table. The application deletes the rows in the source table indicated to be deleted by the second table. In this manner, the archival data deleted from the source table is ensured to already be stored in the target table.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey
  • Patent number: 8572027
    Abstract: A method, system and computer program product for performing synchronization between source and target tables. An external data source inserts a new row in a first table as it modifies or creates a row in the source table where each new row in the first table includes a primary key value associated with the modified/created row in the source table. An application copies the distinct values for the primary keys listed in the first table and inserts them in a second table. The application performs uncommitted read operations on the source table for each row corresponding to the primary key values stored in the second table. The application inserts the data read into the corresponding rows of the target table. In this manner, a platform agnostic application may be able to synchronize the relational source and target tables in an efficient manner while minimizing the contention at the source table.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey
  • Patent number: 8477921
    Abstract: A computer implemented method manages participation in a teleconference. Teleconference inputs from participants of a teleconference are monitored for use of an unrelated term, which is a term that has been deemed unrelated to a topic of the teleconference. Upon determining that an errant participant is using the unrelated term in at least one of the teleconference inputs, an alert is generated to prompt the errant participant to limit future teleconference inputs to the topic of the teleconference.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Feng-Wei Chen, Ying Chen, Dinah H. Lin, Latha Sivakumar
  • Publication number: 20120002798
    Abstract: A computer implemented method manages participation in a teleconference. Teleconference inputs from participants of a teleconference are monitored for use of an unrelated term, which is a term that has been deemed unrelated to a topic of the teleconference. Upon determining that an errant participant is using the unrelated term in at least one of the teleconference inputs, an alert is generated to prompt the errant participant to limit future teleconference inputs to the topic of the teleconference.
    Type: Application
    Filed: June 30, 2010
    Publication date: January 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: FENG-WEI CHEN, YING CHEN, DINAH H. LIN, LATHA SIVAKUMAR
  • Publication number: 20100325540
    Abstract: A message occurrence can be detected when a software application runs on a computing device. The message occurrence can be an occurrence where a text containing message is presented upon a user interface of the software application or a log associated with the software application is updated with a text containing message. A user context for the message occurrence can be determined. The user context can include a user sequence and an execution path. Message occurrence information can be conveyed to a message context catalog. Within the message context catalog, the message occurrence information can be indexed against unique message identifiers. Message occurrence information from the message context catalog can be presented in a computer's user interface when a message uniquely identified by the message identifier is presented in the user interface. The user interface can permit a user to edit text of messages.
    Type: Application
    Filed: June 19, 2009
    Publication date: December 23, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ANA C. BIAZETTI, VIRGINIA D. HILL, RADHIKA RAMAKRISHNAN, JEFFREY T. ROBKE, LATHA SIVAKUMAR, MARY E. STURGEON
  • Publication number: 20090083337
    Abstract: A method, system and computer program product for performing synchronization between source and target tables. An external data source inserts a new row in a first table as it modifies or creates a row in the source table where each new row in the first table includes a primary key value associated with the modified/created row in the source table. An application copies the distinct values for the primary keys listed in the first table and inserts them in a second table. The application performs uncommitted read operations on the source table for each row corresponding to the primary key values stored in the second table. The application inserts the data read into the corresponding rows of the target table. In this manner, a platform agnostic application may be able to synchronize the relational source and target tables in an efficient manner while minimizing the contention at the source table.
    Type: Application
    Filed: September 21, 2007
    Publication date: March 26, 2009
    Applicant: International Business Machines Corporation
    Inventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey
  • Publication number: 20090083341
    Abstract: A method, system and computer program product for ensuring that archival data deleted in a source table is already stored in a target table. An external data source sets a flag in the first table to identify the row in the source table to be deleted. An application sets a flag in a second table for each row of the source table that is marked to be deleted according to the first table. The application performs uncommitted read operations on the source table for each row corresponding to the distinct primary key values stored in the first table. The application inserts the data read into the corresponding rows of the target table. The application deletes the rows in the source table indicated to be deleted by the second table. In this manner, the archival data deleted from the source table is ensured to already be stored in the target table.
    Type: Application
    Filed: September 21, 2007
    Publication date: March 26, 2009
    Applicant: International Business Machines Corporation
    Inventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey