Patents by Inventor Chris Aniszczyk

Chris Aniszczyk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9348624
    Abstract: A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitored process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: May 24, 2016
    Assignee: International Business Machines Corporation
    Inventors: Chris Aniszczyk, Jennifer E. King, Christina K. Lauridsen, Robert R. Peterson, Borna Safabakhsh, Rhys D. Ulerich
  • Publication number: 20110023019
    Abstract: A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitoring process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface.
    Type: Application
    Filed: July 23, 2009
    Publication date: January 27, 2011
    Applicant: International Business Machines Corporation
    Inventors: Chris Aniszczyk, Jennifer E. King, Christina K. Lauridsen, Robert R. Peterson, Borna Safabakhsh, Rhys D. Ulerich
  • Patent number: 7774289
    Abstract: First and second applications having disparate concrete configuration models are integrated into a unified abstract model wherein configuration elements and associated element values are used to control configurable functions of the first and second application programs, respectively, and wherein the second configuration element has a similar configuration function as the first configuration element; using a first equivalence definition reflecting a functional relationship between the first application configuration element and an abstract model configuration element having the similar configuration function, wherein the abstract model configuration is application-independent and platform-independent; using a second equivalence definition reflecting a functional relationship between the second application program configuration element and the abstract model configuration element; and producing and associating a second configuration element value with the second application configuration element wherein the se
    Type: Grant
    Filed: January 3, 2007
    Date of Patent: August 10, 2010
    Assignee: International Business Machines Corporation
    Inventors: Chris Aniszczyk, Borna Safabakhsh, Pierre F. Padovani
  • Publication number: 20080235677
    Abstract: A computer implemented method, data processing system, and computer program product for providing an auto-completion assist box comprising different views of selectable method and field information, thereby allowing a user to easily locate desired information. A list of methods for an object is provided to one or more view plug-ins in the auto-completion system, wherein each view plug-in manages the list of methods according to a function of the view plug-in to form a managed view. Responsive to receiving a managed view from each view plug-in, an auto-completion assist box is created which comprises the managed views. The auto-completion assist box is then presented to a user, wherein the user selects a managed view to locate a method for the object for code assistance.
    Type: Application
    Filed: March 19, 2007
    Publication date: September 25, 2008
    Inventors: Chris Aniszczyk, Nikhil Kumar Batra, Yasmary Hernandez, Nathan Shlomo Marz, Lee Parnell Thompson
  • Publication number: 20080161083
    Abstract: An approach for utilizing a gaming environment for evaluating security policies is presented. An administrator uses a mapping system to map policy tags corresponding to a policy manager with game tags corresponding to a game manager. In addition, the mapping system configures a participant's game based upon gaming attributes and history data, such as assigning incentives to particular roles or locations, using customized terrains, and configuring screen resolution. Once the mapping system maps policy tags to game tags and configures the game, the mapping system invokes the game and allows the game participant to play the game. While the game participant plays the game, the mapping system identifies policy events, such as a security breach, and rewards the game participant accordingly.
    Type: Application
    Filed: March 15, 2008
    Publication date: July 3, 2008
    Inventors: Chris Aniszczyk, David Perry Greene, Borna Safabakhsh
  • Publication number: 20080162107
    Abstract: A computer implemented method, apparatus, and computer program product for integrating first and second applications having disparate concrete configuration models into a unified abstract model comprising through mapping corresponding configuration objects with similar functions in each application, defining an equivalence between at least one particular object within the first application and at least one particular object within the second application, optionally receiving user input at a time of configuration regarding user permissions as they relate to the mapped configuration objects, and configuring each application using the received user input, automatically translating the user input, through mapping rules and equivalence definitions, so that each application is automatically configured to the unified abstract configuration model.
    Type: Application
    Filed: January 3, 2007
    Publication date: July 3, 2008
    Inventors: Chris Aniszczyk, Borna Safabakhsh, Pierre F. Padovani
  • Publication number: 20070300148
    Abstract: Computer implemented method, system and computer program product for creating a resume that facilitates generating and updating multiple versions of the resume. A computer implemented method for creating a resume includes storing resume information. Rules are specified by which a resume for a particular job application is to be created, and the stored resume information is parsed according to the specified rules to provide specified resume information. A resume is then created for the particular job application from the specified resume information.
    Type: Application
    Filed: June 27, 2006
    Publication date: December 27, 2007
    Inventors: Chris Aniszczyk, Terence Kiprop Chesire, Phillip Matthew Crosby, Bryan Estrada, Mark William Weaver, Eric Joseph Wood
  • Publication number: 20070174106
    Abstract: A computer implemented method, apparatus, and computer program product for effectively reducing a complicated problem space to enable faster implementation of system management software, and in particular, policy management for security software. The policy management tool of the present invention receives input from a user to configure a policy model, wherein the policy model is configured according to a set of policy requirements. The policy management tool presents a graphical view of a policy model according to the input from the user, wherein the graphical view allows the user to visualize internals of the policy model as a whole. The policy management tool performs validations on the policy model against requirements of the set of policy requirements. A simulation of the policy model may then be performed to determine the validity of the policy model and generate real test results feedback at a time the policy model is configured.
    Type: Application
    Filed: January 26, 2006
    Publication date: July 26, 2007
    Inventors: Chris Aniszczyk, David Greene, Devin Lindsey, Pierre Padovani, Borna Safabakhsh
  • Publication number: 20070083932
    Abstract: A system and method for utilizing a gaming environment for evaluating security policies is presented. An administrator uses a mapping system to map policy tags corresponding to a policy manager with game tags corresponding to a game manager. In addition, the mapping system configures a participant's game based upon gaming attributes and history data, such as assigning incentives to particular roles or locations, using customized terrains, and configuring screen resolution. Once the mapping system maps policy tags to game tags and configures the game, the mapping system invokes the game and allows the game participant to play the game. While the game participant plays the game, the mapping system identifies policy events, such as a security breach, and rewards the game participant accordingly.
    Type: Application
    Filed: October 6, 2005
    Publication date: April 12, 2007
    Inventors: Chris Aniszczyk, David Greene, Borna Safabakhsh