Patents by Inventor Boas Betzler
Boas Betzler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100281433Abstract: Computer method and apparatus controls avatar relative to a subject virtual environment, in particular entrance to and/or exit from the subject environment. An entrance/exit specification engine provides a plurality of characteristics of the subject environment and/or of an avatar representing a corresponding user in the subject environment. A script generator responsive to the entrance/exit specification engine generates scripts as a function of the plurality of characteristics. The generated scripts form a script collection executable with the avatar. Execution of the generated scripts on a processor of the corresponding user controls avatar entrance to and/or exit from the subject environment.Type: ApplicationFiled: April 29, 2009Publication date: November 4, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul B. Moody, Boas Betzler, Rick A. Hamilton, II, Neil A. Katz, Brian M. O'Connell
-
Patent number: 7788639Abstract: The present invention relates to the field of provisioning of electronic computing resources via a network to a client, and in particular to a method for automatically selecting resources in for application environments consisting of a multitude of resources, wherein a resource managing component is provided for associating specific, selected resource combinations to the application environment, wherein a list of qualifying working combinations of the resource combinations is maintained.Type: GrantFiled: September 28, 2004Date of Patent: August 31, 2010Assignee: International Business Machines CorporationInventors: Boas Betzler, Mark Dettinger, Werner Ederer
-
Publication number: 20100122328Abstract: Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events.Type: ApplicationFiled: November 12, 2008Publication date: May 13, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Ramamohan Chennamsetty, Jeffrey A. Frey, Michael D. Williams
-
Publication number: 20100121729Abstract: A virtual business transaction is implemented between a first virtual world and a second virtual world by providing a searchable catalog that includes one or more items each comprising a virtual good, a virtual service, a real good, or a real service. An object representation is stored for each of the items. Each of the stored object representations is associated with metadata comprising any of digital rights metadata, ownership metadata, identity metadata, payment method metadata, or currency detail metadata. A set of transformation algorithms are established that are customized through a rule set. A request is received specifying a copying, modifying, or reselling of an item selected from the items in the searchable catalog. The copying, modifying, or reselling of the item from a first virtual world to a second virtual world is implemented using the set of transformation algorithms.Type: ApplicationFiled: November 11, 2008Publication date: May 13, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Sandra L. Kearney, Tanaz Sowdagar, Hagen R. Wenzek
-
Publication number: 20100079446Abstract: A computer implemented method, a computer program product, and a data processing system manage regions within a virtual universe. A current location of an avatar is identified within a virtual universe, the current location being within a currently populated region. A vectored movement of the avatar is identified. Any adjacent region that may probabilistically encounter a horizon of the avatar within a region activation time of the virtual universe is identified. If the adjacent region is deactivated, then the adjacent region is activated. An unpopulated region that is currently active is identified, wherein the unpopulated region is within an extended distance from the avatar's current location. The unpopulated region is then deactivated.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Sean L. Dague, Peter George Finn
-
Publication number: 20090307110Abstract: The present invention relates to relates to the management of virtual universe item returns. A method for in accordance with an embodiment of the present invention includes: initiating a return of a item by a user in a virtual universe; granting control of the return of the item to a return agency, the return agency submitting a return request on behalf of the user to a vendor associated with the item; upon approval of the return request by the vendor, sending instructions to the user to destroy the item; and upon confirmation of the destruction of the item by the user, crediting the user for the return.Type: ApplicationFiled: June 9, 2008Publication date: December 10, 2009Inventors: Boas Betzler, Kulvir S. Bhogal, Rick A. Hamilton, II, Jenny S. Li, Clifford A. Pickover
-
Patent number: 7516360Abstract: The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.Type: GrantFiled: September 9, 2004Date of Patent: April 7, 2009Assignee: International Business Machines CorporationInventors: Utz Bacher, Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
-
Publication number: 20080201720Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.Type: ApplicationFiled: February 8, 2008Publication date: August 21, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Steffen Rost
-
Publication number: 20080189402Abstract: The present invention relates to performing systems management on IT-resources using web services, wherein the resources are managed in a computational network within a plurality of runtime environments having different respective instrumentations, wherein the web services are implemented according to a public web service standard, and wherein a resource configuration database is provided for storing a collection of resource-specific data on said IT-resources.Type: ApplicationFiled: August 10, 2007Publication date: August 7, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Dietmar Kuebler, Georg Ochs
-
Publication number: 20080189713Abstract: The present invention relates to the field of systems management on IT-resources using web services. An improved method proposes a single web service implementation which dynamically and automatically generates multiple WSDLs for respective multiple resource type classes. This implementation is model-agnostic, as it doesn't require any knowledge about the underlying model, be that a resource model, or any other model in question, and uses introspection of the applied model at the time of invocation for the dynamic WSDL generation. The state of the resource is maintained within the instrumentation of the resource. No additional persistence on top needs to be implemented. A single implementation of a low number of generic web services, basically only two, reduces implementation and maintenance efforts significantly.Type: ApplicationFiled: August 10, 2007Publication date: August 7, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Dietmar Kuebler, Georg Ochs
-
Patent number: 7392376Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.Type: GrantFiled: December 30, 2002Date of Patent: June 24, 2008Assignee: International Business Machines CorporationInventors: Paul E. McKenney, Orran Y. Krieger, Boas Betzler
-
Patent number: 7392314Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.Type: GrantFiled: August 12, 2004Date of Patent: June 24, 2008Assignee: International Business Machines CorporationInventors: Boas Betzler, Steffen Rost
-
Publication number: 20080022127Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.Type: ApplicationFiled: May 31, 2007Publication date: January 24, 2008Inventors: Paul McKenney, Orran Krieger, Boas Betzler
-
Publication number: 20070226792Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.Type: ApplicationFiled: May 31, 2007Publication date: September 27, 2007Inventors: Paul McKenney, Orran Krieger, Boas Betzler
-
Patent number: 6985240Abstract: A method and apparatus for retrieving information about an object of interest to an observer. A position sensor wearable by the observer generates position information indicating the position of the observer relative to a fixed position. A direction sensor wearable by the observer generates direction information indicating the orientation of the observer relative to a fixed orientation. An object database stores position information and descriptive information for each of one or more objects. An identification and retrieval unit uses the position and direction information to identify from the object database an object being viewed by the observer by determining whether the object is along a line of sight of the observer and retrieves information about the object from the database. The identification and retrieval unit retrieves the descriptive information stored for the object in the database for presentation to the observer via an audio or video output device.Type: GrantFiled: December 23, 2002Date of Patent: January 10, 2006Assignee: International Business Machines CorporationInventors: Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
-
Publication number: 20050251806Abstract: A system, method and computer program product for enhancing a real-time operating system (RTOS) with functionality normally associated with a general purpose operating system (GPOS). A hypervisor that is adapted to perform a real-time scheduling function supports concurrent execution of an RTOS and a GPOS on a system of shared hardware resources. The RTOS or its applications can utilize services provided by the GPOS. Such services may include one or more of file system organization, network communication, network management, database management, security, user-interface support and others. To enhance operational robustness and security, the hypervisor can be placed in read-only storage while maintaining the ability to update scheduling mechanisms. A programmable policy manager that is maintained in read-write storage can be used to dictate scheduling policy changes to the hypervisor as required to accommodate current needs.Type: ApplicationFiled: May 10, 2004Publication date: November 10, 2005Inventors: Marc Auslander, Boas Betzler, Dilma Da Silva, Michael Day, Orran Krieger, Paul McKenney, Michal Ostrowski, Bryan Rosenburg, Robert Wisniewski, James Xenidis
-
Publication number: 20050081097Abstract: The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.Type: ApplicationFiled: September 9, 2004Publication date: April 14, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Utz Bacher, Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
-
Publication number: 20050071107Abstract: The present invention relates to the field of provisioning of electronic computing resources via a network to a client, and in particular to a method for automatically selecting resources in for application environments consisting of a multitude of resources, wherein a resource managing component is provided for associating specific, selected resource combinations to the application environment, wherein a list of qualifying working combinations of the resource combinations is maintained.Type: ApplicationFiled: September 28, 2004Publication date: March 31, 2005Applicant: International Business Machines CorporationInventors: Boas Betzler, Mark Dettinger, Werner Ederer
-
Publication number: 20050055696Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.Type: ApplicationFiled: August 12, 2004Publication date: March 10, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Boas Betzler, Steffen Rost
-
Publication number: 20040128507Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.Type: ApplicationFiled: December 30, 2002Publication date: July 1, 2004Inventors: Paul E. McKenney, Orran Y. Krieger, Boas Betzler