Patents by Inventor Eduardo Spring
Eduardo Spring has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070288329Abstract: Operating a publicly accessible purchasing system including receiving, on a receipt date, from a purchaser in a publicly accessible purchasing system, a deferred purchase request (“DPR”) for an item, granting to vendors review access to DPRs, receiving from a proposing vendor a proposal regarding a reviewed DPR, selecting a selected vendor, in dependence upon the proposal, and issuing a purchase order to the selected vendor for an item on a date subsequent to the receipt date.Type: ApplicationFiled: July 2, 2007Publication date: December 13, 2007Inventors: Scott Broussard, Joseph Mcintyre, Eduardo Spring
-
Publication number: 20070261099Abstract: A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages.Type: ApplicationFiled: May 2, 2006Publication date: November 8, 2007Inventors: Scott Broussard, Tony Kwong, Eduardo Spring, Anthony Wrobel
-
Patent number: 7284148Abstract: A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.Type: GrantFiled: June 17, 2004Date of Patent: October 16, 2007Assignee: International Business Machines CorporationInventors: Dwip Banerjee, Kumar Ravi, Eduardo Spring, Vasu Vallabhaneni
-
Publication number: 20070180258Abstract: A confidential content search engine system and method are provided. With the system and method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.Type: ApplicationFiled: January 20, 2006Publication date: August 2, 2007Inventors: Scott Broussard, Tony Kwong, Eduardo Spring, Anthony Wrobel
-
Publication number: 20060242635Abstract: A method, computer program product, and data processing system for allocating memory for arrays in a fragmented heap is disclosed. In a preferred embodiment, a JAVA virtual machine (JVM) is enhanced to organize each array as an array of arrays (or, internally, an array of pointers to arrays, since JAVA arrays are reference types). The individual “inner arrays” within the “outer array” are segments that collectively simulate a larger “virtual array.” Because all accesses and allocations of these arrays are performed by the JAVA virtual machine, the array segmentation is entirely transparent to the programmer, at least at the JAVA-language level. Support for native methods is provided by making relatively minor modifications to some of the array manipulation functions of the JAVA Native Interface (JNI), so as to minimize the impact of the segmentation scheme on native code.Type: ApplicationFiled: April 21, 2005Publication date: October 26, 2006Inventors: Scott Broussard, Eduardo Spring
-
Publication number: 20060195322Abstract: Provided is an improved method for recording audio notes for easier later retrieval. The system monitors audio input and recommends recording of an extended audio segment based on detection of audio triggers. If the user accepts the recommendation, the use is provided with the opportunity to record a segment name. Segment names are recorded with links to the extended audio segment. Later review of segment names eases retrieval of extended audio segment with desired content.Type: ApplicationFiled: February 17, 2005Publication date: August 31, 2006Inventors: Scott Broussard, Eduardo Spring
-
Publication number: 20060190545Abstract: A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.Type: ApplicationFiled: April 13, 2006Publication date: August 24, 2006Inventors: Dwip Banerjee, Rabindranath Dutta, Eduardo Spring
-
Publication number: 20050283643Abstract: A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.Type: ApplicationFiled: June 17, 2004Publication date: December 22, 2005Applicant: International Business Machines CorporationInventors: Dwip Banerjee, Kumar Ravi, Eduardo Spring, Vasu Vallabhaneni
-
Publication number: 20050160424Abstract: A method, apparatus, computer program product, and data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. The virtual machines share information such that a virtual machine may be added to the virtual machine cluster or such that a virtual machine may be removed from the virtual machine cluster as the virtual machine cluster continues to run. Load-balancing operations may be performed within the virtual machine cluster, and threads and objects may be moved within the virtual machine cluster.Type: ApplicationFiled: January 21, 2004Publication date: July 21, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott Broussard, Ying Liu, Eduardo Spring
-
Publication number: 20050160413Abstract: A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.Type: ApplicationFiled: January 21, 2004Publication date: July 21, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott Broussard, Ying Liu, Eduardo Spring
-
Publication number: 20050155044Abstract: A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.Type: ApplicationFiled: January 12, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Scott Broussard, Ying Liu, Eduardo Spring
-
Publication number: 20050153758Abstract: A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may be situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.Type: ApplicationFiled: January 13, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Scott Broussard, Ying Liu, Ann Robinson, Eduardo Spring
-
Publication number: 20050130676Abstract: Methods, systems, and media for acquiring ratings for points of interest associated with a particular location are disclosed. Embodiments include hardware and/or software for receiving from a user at a current location a request for rating information related to a particular location, receiving differential information, determining the current location, determining the particular location based on the current location and the differential information, transmitting the particular location to a wireless network to request the rating information, receiving rating information related to the particular location, and displaying at least part of the rating information to a user. Embodiments may also include receiving rating information relating to a particular location, wherein the rating information includes ratings for a plurality of points of interest. In one embodiment, the ratings for a plurality of points of interest are user ratings.Type: ApplicationFiled: December 11, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Scott Broussard, Ying Liu, Eduardo Spring
-
Publication number: 20050131639Abstract: Methods, systems, and media for providing a location-based service are disclosed. Embodiments include hardware and/or software for receiving from a user at a current location differential information indicating a difference between the current location and a particular, different location, determining the current location, determining the particular location based on the current location and the differential information, providing a location-based service based at least partially on the particular location, and displaying information to the user. Embodiments may also include determining directional information between the current location and the particular location. In one embodiment, the differential information comprises a distance between the current and particular locations.Type: ApplicationFiled: December 11, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Scott Broussard, Ying Liu, Eduardo Spring