Patents by Inventor Viktors Berstis

Viktors Berstis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080240392
    Abstract: A method and system are provided in which teleconference calls are scheduled in advance and, at an appropriate predetermined time, calls are automatically made to the designated participants of the conference calls thereby avoiding the need for the participants to call into a teleconference center. In a preferred embodiment, when teconferences are scheduled, the telecon participants are designated and their phone numbers are input or otherwise determined, for example, through access to a centralized database. A calendar is monitored and at a predetermined time relative to the scheduled start of the telecon, a server system application initiates the calling of the participants for connection to the telecon. The system may be configured to require participants to enter a password before the connection is completed. The status of the called participants is determined and displayed on individual display devices of the other participants in the telecon.
    Type: Application
    Filed: June 9, 2008
    Publication date: October 2, 2008
    Inventors: Viktors Berstis, Randolph Michael Forlenza
  • Patent number: 7428588
    Abstract: A method and system for balancing server work load for cellular phone client-proxy applications in an environment where the clients change position within a given geographic area is disclosed. The method comprises the steps of mapping, monitoring, automatically re-mapping the system when required, updating a map address book, and updating a client address book. The system has a mapping system and a communication system connected to a plurality of servers, proxy servers and applications by an internal network. The proxy servers are connected to a plurality of clients by the Internet. If a threshold is exceeded, the monitoring program sends a message to a mapping program. Upon receipt of the message, the mapping program uses a rules engine to calculate a new map graph to remove load from an overloaded server (or servers) and to adjust communication requirements for data by reconfiguring partitions.
    Type: Grant
    Filed: April 8, 2004
    Date of Patent: September 23, 2008
    Assignee: International Business Machines Corporation
    Inventors: Viktors Berstis, John Daniel Sieron Bethencourt, Kevin Blake Damm, Robert Glenn Deen, Matthew Hammer, James H. Kaufman, Toby Lehman
  • Publication number: 20080229322
    Abstract: A method and apparatus for scheduling execution of a grid project in accordance with multiple dimensions of dynamic load factors. The present invention provides a mechanism for determining grid node availability based on both processor load and network traffic loads on the nodes in a grid of computing devices. This availability information is used to determine scheduling of the running of grid projects.
    Type: Application
    Filed: June 2, 2008
    Publication date: September 18, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Viktors Berstis, Ellen Kay Harper, Brian E. Leonard, Kyle Joseph Prestenback, Justin Lucus Youngblood
  • Publication number: 20080222000
    Abstract: Systems and media for awarding credits based on provided usage information are disclosed. More particularly, hardware and/or software for collecting and disseminating usage information related to electronic documents and for awarding usage credits to users in exchange for providing usage information are disclosed. Embodiments include receiving an indication of the usage of an electronic document by a user and aggregating the received usage indication for the document with usage indications relating to other users. Embodiments may also include creating document utilization information for the electronic document based on the aggregated usage indications and awarding usage credit to the user based on the user's providing statistics on the usage of the electronic document.
    Type: Application
    Filed: May 16, 2008
    Publication date: September 11, 2008
    Inventors: Viktors Berstis, Randolph Michael Forlenza
  • Publication number: 20080222536
    Abstract: Methods and arrangements to communicate aurally during a chat conference are contemplated. Embodiments include transformations, code, state machines or other logic to communicate aurally during a chat conference by receiving through a user interface for the chat conference the designation of a participant in the chat conference, receiving through the user interface for the chat conference a command to capture audio, capturing audio, and transmitting the captured audio to the participant based upon the designation of the participant. In some embodiments, a participant may be designated by a mouse click on a name representing the participant. In some embodiments, the command to capture audio may be expressed by holding down a mouse button. In alternate embodiments, the command to capture audio may be expressed by a pop-up menu. In further embodiments, the captured audio may be stored and transmitted to additional participants.
    Type: Application
    Filed: May 23, 2008
    Publication date: September 11, 2008
    Inventors: Viktors Berstis, Randolph M. Forlenza
  • Patent number: 7421426
    Abstract: Systems, methods and media for utilizing electronic document usage information are disclosed. More particularly, hardware and/or software utilizing electronic document usage information to respond to user search requests with search engines are disclosed. Embodiments include receiving a search request from a requesting user and receiving document utilization information associated with one or more electronic documents, where the document utilization information provides an indication of the usage of the electronic documents by one or more users. Further embodiments include generating search results based at least partially on the search request and the document utilization information and transmitting an indication of the search results to the requesting user. Further embodiments include generating statistical information regarding the search results for electronic documents and transmitting the generated statistical information.
    Type: Grant
    Filed: January 11, 2005
    Date of Patent: September 2, 2008
    Assignee: International Business Machines Corporation
    Inventors: Viktors Berstis, Randolph Michael Forlenza
  • Patent number: 7406689
    Abstract: Disclosed is a computer-implemented planning process that aids a system administrator in the task of creating a job schedule. The process treats enterprise computing resources as a grid of resources, which provides greater flexibility in assigning resources to jobs. During the planning process, an administrator or other user, or software, builds a job-dependency tree. Jobs are then ranked according to priority, pickiness, and network centricity. Difficult and problematic jobs then are assigned resources and scheduled first, with less difficult jobs assigned resources and scheduled afterwards. The resources assigned to the most problematic jobs then are changed iteratively to determine if the plan improves. This iterative approach not only increases the efficiency of the original job schedule, but also allows the planning process to react and adapt to new, ad-hoc jobs, as well as unexpected interruptions in resource availability.
    Type: Grant
    Filed: March 22, 2005
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Viktors Berstis, Kyle Boon, Creighton M. Hicks, Bella Voldman
  • Publication number: 20080172471
    Abstract: Systems, methods and media for screening member messages in an instant messaging environment are disclosed. In one embodiment, chat messages are stored as communications requests in a queue. A user-specified chat limit determines the maximum number of chats that may be taking place concurrently. When the chat limit is reached, additional requests received are placed in the queue, waiting to be processed. When a chat terminates, a next-out request is received from the queue and processed. Also, a user may specify a priority for each of a plurality of members in a communications network. A request from a user with special priority may be advanced to the head of the queue to be processed immediately.
    Type: Application
    Filed: March 24, 2008
    Publication date: July 17, 2008
    Inventor: Viktors Berstis
  • Publication number: 20080167072
    Abstract: The present invention is a method for providing telephone service. The method includes receiving a request at a first telephone from a second telephone to access the first telephone's telephone service in response to the second telephone's inability to access the second telephone's telephone service. The method further includes granting access to the first telephone's telephone service for use by the second telephone in response to receiving the request at the first telephone prompting the first telephone to grant access to the first telephone's telephone service. The request is received by the first telephone from the second telephone via a short-range wireless connection.
    Type: Application
    Filed: January 4, 2007
    Publication date: July 10, 2008
    Inventors: Viktors Berstis, Herman Rodriguez, Newton J. Smith
  • Publication number: 20080168277
    Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. This process is similar to the existing word processor capability to highlight areas on a document and then assign rich text attributes, such as BOLD, ITALICS, etc., to those areas. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
    Type: Application
    Filed: December 11, 2007
    Publication date: July 10, 2008
    Inventors: Randolph Michael Forlenza, Viktors Berstis
  • Publication number: 20080166166
    Abstract: A perforating print head for a printing device comprising a frame assembly, a plurality of perforating printing assemblies coupled to the frame assembly, each having an impact element further comprising a first end for impacting a printable media surface and a second end suitable for receiving a driving force, and a drive mechanism suitable for applying the driving force to the second end of the impact element. The drive mechanism may be suitable for applying sufficient driving force to the second end of the impact element to allow the first end of the impact element to perforate the printable media surface.
    Type: Application
    Filed: January 4, 2007
    Publication date: July 10, 2008
    Inventors: VIKTORS BERSTIS, HERMAN RODRIGUEZ
  • Patent number: 7392517
    Abstract: A method and implementing computer system are provided in which selected information is embedded within computer program structures without requiring separate bit strings. In an exemplary embodiment, the embedded selected information includes an identification of a licensed user together with a serial number of the associated licensed program. That information is converted into a binary representation, and a transfer function is used to embed the binary representation into the structure of the licensed program. In the example, when a licensed program is compiled, linked and downloaded over an interconnection network, the order or sequence of the modules of the licensed program is arranged in a manner to correspond to the embedded selected information. The embedded information can then be extracted from the program by analysis of the organization of the modules comprising the program.
    Type: Grant
    Filed: October 4, 2001
    Date of Patent: June 24, 2008
    Assignee: International Business Machines Corporation
    Inventor: Viktors Berstis
  • Publication number: 20080141245
    Abstract: A method and implementing computer system are provided in which selected information is embedded within computer program structures without requiring separate bit strings. In an exemplary embodiment, the embedded selected information includes an identification of a licensed user together with a serial number of the associated licensed program. That information is converted into a binary representation, and a transfer function is used to embed the binary representation into the structure of the licensed program. In the example, when a licensed program is compiled, linked and downloaded over an interconnection network, the order or sequence of the modules of the licensed program is arranged in a manner to correspond to the embedded selected information. The embedded information can then be extracted from the program by analysis of the organization of the modules comprising the program.
    Type: Application
    Filed: December 17, 2007
    Publication date: June 12, 2008
    Inventor: Viktors Berstis
  • Patent number: 7386569
    Abstract: Systems, methods and media for determining and aggregating electronic document segment usage information from different versions of a document are disclosed. More particularly, hardware and/or software for determining the aggregate segment usage for an electronic document received from one or more users are disclosed. Embodiments include receiving from one or more users an indication of their usage of segments of different versions of the electronic document, aggregating the segment usage indications received, and creating document utilization information for the electronic document. Further embodiments include transmitting the document utilization information to one or more users. Other embodiments include displaying to the user an electronic document and indications of the document utilization information. Electronic documents may be in PDF format, HTML format, etc.
    Type: Grant
    Filed: January 11, 2005
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Viktors Berstis, Randolph Michael Forlenza
  • Publication number: 20080107045
    Abstract: Methods and arrangements to play Voice over Internet Protocol (VoIP) messages are contemplated. Embodiments include transformations, code, state machines or other logic to play VoIP messages by receiving overlapping VoIP messages from a VoIP conference, placing at least one of the overlapping VoIP messages in a queue, and playing the overlapping VoIP messages one at a time. The playing may include retrieving the overlapping VoIP messages from the queue. The embodiments may include displaying the VoIP messages through a graphical user interface and receiving instructions from a user on the playing of the messages through the graphical user interface. In some further embodiments, the instructions may describe the order for playing the messages. In many further embodiments, the instructions may request the deletion of VoIP messages from the queue without the playing of the VoIP messages.
    Type: Application
    Filed: November 2, 2006
    Publication date: May 8, 2008
    Inventors: Viktors Berstis, Randolph M. Forlenza
  • Publication number: 20080086692
    Abstract: Systems, methods and media for determining and aggregating electronic document segment usage information from different versions of a document are disclosed. More particularly, hardware and/or software for determining the aggregate segment usage for an electronic document received from one or more users are disclosed. Embodiments include receiving from one or more users an indication of their usage of segments of different versions of the electronic document, aggregating the segment usage indications received, and creating document utilization information for the electronic document. Further embodiments include transmitting the document utilization information to one or more users. Other embodiments include displaying to the user an electronic document and indications of the document utilization information. Electronic documents may be in PDF format, HTML format, etc.
    Type: Application
    Filed: December 4, 2007
    Publication date: April 10, 2008
    Inventors: Viktors Berstis, Randolph Forlenza
  • Publication number: 20080069310
    Abstract: Methods and arrangements to selectively retrieve Voice over Internet Protocol (VoIP) messages are contemplated. Embodiments include transformations, code, state machines or other logic to selectively retrieve VoIP messages by storing the VoIP messages associating one or more descriptors with the VoIP messages, and displaying at least some of the VoIP messages. The display may include one or more of the descriptors associated with the displayed VoIP messages. The embodiments may include receiving a designation of a designated VoIP message from the VoIP messages. The embodiments may include retrieving the designated VoIP message. In some embodiments, the designated VoIP message may be played. In further embodiments, the designated VoIP message may be forwarded. In many embodiments, the descriptors associated with the displayed VoIP messages may consist of values of attributes of the displayed VoIP messages. In several embodiments, the attributes may have been received through a user interface.
    Type: Application
    Filed: September 15, 2006
    Publication date: March 20, 2008
    Inventors: Viktors Berstis, Randolph M. Forlenza
  • Patent number: 7346769
    Abstract: The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. This process is similar to the existing word processor capability to highlight areas on a document and then assign rich text attributes, such as BOLD, ITALICS, etc., to those areas. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
    Type: Grant
    Filed: October 23, 2003
    Date of Patent: March 18, 2008
    Assignee: International Business Machines Corporation
    Inventors: Randolph Michael Forlenza, Viktors Berstis
  • Patent number: 7340689
    Abstract: A system and method are disclosed for displaying a web page on a computer screen. The method and system provide zoom in and out viewing of the web page as the web page is constructed. In accordance with the method, a browser determines whether web object display has exceeded a current zoomed view of the web page and zooms out the current zoomed view to accommodate additional web objects if display has exceeded the current zoomed view. The browser processes all of the web objects to display the entire web page with all of the web objects. The browser then zooms back into the current view of the web page to only an initial portion of the web page. A scroll indicator is displayed in conjunction with the current view of the web page to permit a user to access portions of the web page that are not displayed within the current view.
    Type: Grant
    Filed: October 22, 2003
    Date of Patent: March 4, 2008
    Assignee: International Business Machines Corporation
    Inventor: Viktors Berstis
  • Publication number: 20080037725
    Abstract: Methods and arrangements to check for permission to record Voice over Internet Protocol (VoIP) messages and to respond to requests for permission are contemplated. Embodiments include transformations, code, state machines or other logic to check for permission to record VoIP messages and to respond to requests by transmitting an inquiry on permission to record a VoIP message of a participant in a VoIP call session comprising the VoIP message, receiving a response to the inquiry, determining by a processor whether the response to the inquiry grants permission to record the VoIP message, and recording the VoIP message based upon the response to the inquiry granting permission to record the VoIP message. Some embodiments may involve querying a participant in a VoIP call session comprising a VoIP message for permission to record the VoIP message through a user interface mechanism for checking for permission to record VoIP messages.
    Type: Application
    Filed: July 10, 2006
    Publication date: February 14, 2008
    Inventors: Viktors Berstis, Randolph M. Forlenza