Patents by Inventor Curtis Duane Kronlund

Curtis Duane Kronlund has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7987452
    Abstract: An apparatus, program product and method utilize metadata collected for a lock in a computer program to determine an optimal lock acquisition strategy for the lock. The metadata is typically collected via profiling of the computer program to determine a wait characteristic for the lock in the particular runtime environment in which the computer program executes, and the metadata is used to select from among different lock access implementations to be used to attempt to acquire the lock, often enabling an optimum lock access implementation to be selected for a lock.
    Type: Grant
    Filed: December 15, 2005
    Date of Patent: July 26, 2011
    Assignee: International Business Machines Corporation
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson, Mark Douglas Schroeder
  • Patent number: 7917589
    Abstract: In an embodiment, an instant message is received that includes data, a privacy indication, and an override indication. In an embodiment, if the privacy indication specifies that the data is non-private, then the data is presented. But, if the privacy indication specifies that the data is private, then a privacy notice is presented and the data is hidden until an acknowledgment of the privacy notice is received. The privacy notice may include a prompt for the acknowledgment. In an embodiment, if the privacy indication specifies that the data is private and the override indication allows the privacy indication to be overridden, the data is presented. In another embodiment, if the privacy indication specifies that the data is private, the override indication allows the privacy indication to be overridden, and a time period since a user interface device received input is less than a threshold amount of time, then the data is presented.
    Type: Grant
    Filed: August 24, 2006
    Date of Patent: March 29, 2011
    Assignee: International Business Machines Corporation
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Patent number: 7770173
    Abstract: An apparatus, program product and method improve management of available computing resources by adjusting use of the resource over a first interval according to actual use of the resource during a second interval. This feature enables a computing resource to exceed its normal limits during the first interval of operation. Use during the second interval may be limited to balance out the burst, or excessive resource usage of the first interval.
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventors: Charles Richard Farrell, Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Publication number: 20090181684
    Abstract: A portable phone a portable phone is equipped with a personal area network (PAN) detection mechanism to detect all portable phones and electronic identifiers (e.g., key fobs) in its PAN. A buddy list is included in the portable phone. If an electronic identifier is detected, such as from a key fob, but its corresponding portable phone is not, a proxy signal mechanism signals to the wireless telephone network that the phone may receive calls for a different phone. In response, the wireless telephone network routes calls for the different phone to the proxy phone instead. In this manner a phone may change functions automatically as devices enter and leave the PAN.
    Type: Application
    Filed: March 26, 2009
    Publication date: July 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Patent number: 7526309
    Abstract: A portable phone a portable phone is equipped with a personal area network (PAN) detection mechanism to detect all portable phones and electronic identifiers (e.g., key fobs) in its PAN. A buddy list is included in the portable phone. If an electronic identifier is detected, such as from a key fob, but its corresponding portable phone is not, a proxy signal mechanism signals to the wireless telephone network that the phone may receive calls for a different phone. In response, the wireless telephone network routes calls for the different phone to the proxy phone instead. In this manner a phone may change functions automatically as devices enter and leave the PAN.
    Type: Grant
    Filed: June 9, 2005
    Date of Patent: April 28, 2009
    Assignee: International Business Machines Corporation
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Publication number: 20080132216
    Abstract: In various embodiments, a source telephone receives message data and an identifier of a destination telephone, either from a user interface or from an origin telephone. In response to detecting that the source telephone is not located within a cell, the source telephone selects an intermediate telephone that is connected to the source telephone via a local wireless network. The source telephone then sends a forward request to the intermediate telephone. The forward request includes the message data and the identifier of the destination telephone. In various embodiments, the intermediate telephone is selected if it is located within a cell, if it is moving toward a cell, or if its estimated arrival time at one of the cells is earlier than the estimated arrival time of the source telephone. The forward request instructs the intermediate telephone to forward the message data upon reaching the cell or to another intermediate telephone.
    Type: Application
    Filed: November 8, 2006
    Publication date: June 5, 2008
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Publication number: 20080071881
    Abstract: Methods, computer program products and systems for displaying an advertising image in a Web browser window when the window becomes deactivated or idle for a period of time. The image may replace the Web content previously loaded and displayed in the Web browser window. However, it is desirable for the Web content to remain loaded in memory so that the Web content may be quickly displayed after reactivating the window or detecting user interaction with the window. However, the advertisement preferably remains for a brief delay period after either reactivation or detection of user interaction in order to enhance advertising effectiveness and provide the user with a brief opportunity to read the advertisement, click on a hyperlink for more information, or hold the image for further viewing. After the delay period, the Web content preferably will automatically return to be displayed in the client area of the Web browser window.
    Type: Application
    Filed: September 15, 2006
    Publication date: March 20, 2008
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Publication number: 20080052759
    Abstract: In an embodiment, an instant message is received that includes data, a privacy indication, and an override indication. In an embodiment, if the privacy indication specifies that the data is non-private, then the data is presented. But, if the privacy indication specifies that the data is private, then a privacy notice is presented and the data is hidden until an acknowledgment of the privacy notice is received. The privacy notice may include a prompt for the acknowledgment. In an embodiment, if the privacy indication specifies that the data is private and the override indication allows the privacy indication to be overridden, the data is presented. In another embodiment, if the privacy indication specifies that the data is private, the override indication allows the privacy indication to be overridden, and a time period since a user interface device received input is less than a threshold amount of time, then the data is presented.
    Type: Application
    Filed: August 24, 2006
    Publication date: February 28, 2008
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson
  • Publication number: 20080010497
    Abstract: In an embodiment, data and a specification of a default logging method are received from an application. If more than a threshold amount of metadata has been collected, then a logging method is selected based on the metadata and rules, and the data is saved via the selected logging method; otherwise, the data is saved via the default logging method. In various embodiments, the metadata describes the data, the performance of the computer system in which the saving is performed, the resources of the computer, or a reason for saving the data. A rule identifies a field in the metadata, a field threshold, and a rule logging method. If a value in the field in the metadata satisfies the field threshold in the rule, then the selected logging method is the rule logging method; otherwise, a different rule is chosen. In this way, an appropriate logging method for logging data may be selected.
    Type: Application
    Filed: June 12, 2006
    Publication date: January 10, 2008
    Inventors: Curtis Duane Kronlund, Scot Alan Moore, Gregory Allan Olson
  • Publication number: 20070288577
    Abstract: In an embodiment, a send command is received that specifies a reply email, which is a reply to a source email. If the source email includes an answer-required field associated with a question, a determination is made whether the reply email includes an answer associated with the answer-required field. If the reply email includes the answer, then the reply email is sent to a source of the source email, but if the reply email does not include the answer, the reply email is blocked from being sent. In an embodiment, the source email is embedded in the reply email as a replied-to email, the source email includes reply data that is separate from the replied-to email, and the reply data includes the answer and a pointer that identifies the answer-required field. In another embodiment, the answer is embedded in the answer-required field in the replied-to email. In this way, answers may be required to email questions.
    Type: Application
    Filed: June 12, 2006
    Publication date: December 13, 2007
    Inventors: Curtis Duane Kronlund, Scott Alan Moore, Gregory Allan Olson