Patents by Inventor Erik Burckart
Erik Burckart has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190188475Abstract: A method and system for providing augmented reality experiences unique to a user's interface format is provided. The method includes receiving from a mobile device identification of an interface format from which a camera view is opened in the mobile device. The method further includes identifying a trigger within the camera view for launching one version of an augmented reality experience; identifying, from the plurality of versions of the augmented reality experience, the one version that uniquely corresponds to the interface format; and providing to the mobile device for display the one version.Type: ApplicationFiled: December 17, 2018Publication date: June 20, 2019Applicant: SpokeHub, Inc.Inventors: John McAdory, Robert Hartsfield, Kerianne Enderline, John York, Richard Berryman, Andrew Jason Ivory, Benjamin Mark Schell, Kristal Michelle York, Erik Burckart
-
Publication number: 20060253553Abstract: Under the present invention, when a configuration change for a computer system is monitored and a message corresponding thereto is issued, a response to the message will be observed. Thereafter, the configuration change, the message and the response will be logged. In logging this information, the respective times and identities of corresponding users will be stored together. Thus, if an error condition results from the configuration change, a supervisor or the like will be able to access the log file and see (among other things): (1) the configuration change that caused the error condition; (2) the identity of the user who made it; and (3) the user's response to the corresponding message that was provided.Type: ApplicationFiled: March 30, 2005Publication date: November 9, 2006Applicant: International Business Machines CorporationInventors: Erik Burckart, Jeffrey Care, David Schell, Ryan Urquhart
-
Publication number: 20060212532Abstract: A set of programs allows a server computer that does not have an application installed to temporarily hand off a client request for the application to a peer server until the application is installed on the first server. The hand off is transparent to the client and temporary to the peer server. The server asynchronously starts the application, and when the application is ready for use, the first server stops sending requests to the peer server, and begins serving the requests. Since the first server has full session knowledge, it will be transparent to the client that the server servicing those requests temporarily changed.Type: ApplicationFiled: March 15, 2005Publication date: September 21, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Erik Burckart, John Cammarata, Michael Morton
-
Publication number: 20060075125Abstract: Under the present invention, when a TCS receives a data command (e.g., a read or write command) pursuant to a communication session between the TCS and an application, it will first request permission from a permission system to execute the data command. By applying a set of rules to a setting of a state variable associated with the TCS, the permission system will determine whether to grant the permission. If so, the TCS will execute the data command and change the setting of the state variable. If a close command is later received by the TCS to close the communication session, permission will once again be requested from the permission system, which will again apply a set of rules to the current setting of the state variable to determine if the session can be safely closed.Type: ApplicationFiled: September 28, 2004Publication date: April 6, 2006Applicant: International Business Machines CorporationInventors: Erik Burckart, David Gilgen, Craig Lanzen, William Wigger
-
Publication number: 20060070033Abstract: A system and method for analyzing configuration changes made to a computerized system. A configuration analysis system is provided that includes: a system for generating characteristic data for a captured set of configuration changes; an analyzer repository for storing a set of analyzers configured to analyze configuration changes, wherein each analyzer is associated with a rule relating to at least one predefined configuration change; and an analyzer selection system for selecting at least one analyzer from the analyzer repository by comparing the characteristic data with the rules of the associated analyzers.Type: ApplicationFiled: September 24, 2004Publication date: March 30, 2006Applicant: International Business Machines CorporationInventors: Jeffrey Care, Erik Burckart, Ryan Urquhart, David Schell
-
Publication number: 20050278283Abstract: A system and method for searching a bytestream or other string in a case insensitive manner. In a preferred embodiment, the present invention includes an ASCII tree that associated both upper and lower case letters of an incoming header key (or other symbols) with nodes. When enough nodes are gathered, a target word is found.Type: ApplicationFiled: May 27, 2004Publication date: December 15, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, Madhu Chetupararnbil, Rohit Kelapure, Jeffrey Lee, Aravind Srinivasan, Kevin Vaughan
-
Publication number: 20050193136Abstract: The present invention is a method, system and apparatus for configuring a client-side communications protocol stack. In a method of the invention, a mapping can be consulted to determine a set of client-side protocol stack components which correspond to a set of protocol stack components in a server side protocol stack instance. Subsequently, a listing can be created of the determined set of client-side protocol stack components. Finally, the listing can be published for access by externally disposed client computing processes. Preferably, the listing can be reversed. Also, the consulting step further can include determining at least one attribute to be applied to at least one of the client-side protocol stack components when enabling a client-side protocol stack to interoperate with the server-side protocol stack instance.Type: ApplicationFiled: February 27, 2004Publication date: September 1, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, Stephen Fontes, Craig Lanzen
-
Publication number: 20050144231Abstract: A method and system is provided for policy driven, online meeting updates during the course of an electronic meeting. The invention defines one or more groups of participants in an electronic meeting, and assigns a unique relative priority to each group of participants. Meeting events, such as slide changes or other data that is sent to the various participants for viewing, are transmitted to the various groups in a sequence ordered by the relative priorities assigned to the groups. Alternatively, the invention provides for randomly staggering the delivery of data to the various groups. Both embodiments alleviate the scalability problems that arise for electronic meetings having large numbers of participants.Type: ApplicationFiled: December 11, 2003Publication date: June 30, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, James Galvin, Brian Pulito
-
Publication number: 20050144258Abstract: The present invention facilitates associating content with a portion of a presentation to which the content relates. Methods are provided in which a presentation is received by a client computer to be sequentially presented. Content is input during the presentation, the content relating to a particular portion of the presentation. The content, and an indication of an association between the content and the portion of the presentation to which the content relates, are stored. The stored indication is transmitted for use in retrieving the portion of the presentation to which the input content relates in association with the input content.Type: ApplicationFiled: December 15, 2003Publication date: June 30, 2005Inventors: Erik Burckart, James Galvin, Brian Pulito
-
Publication number: 20050120117Abstract: The present invention is a method, system and apparatus for highly efficient connection pool management. In a preferred aspect of the invention, a highly efficient connection pool management system can include a connection pool configured to store one or more idle connections. The system further can include a connection manager programmed for coupling to the connection pool. The connection manager further can be programmed to validate individual ones of the idle connections by issuing a non-blocking input/output (I/O) operation to each of the individual ones of the idle connections.Type: ApplicationFiled: November 26, 2003Publication date: June 2, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, David Gilgen, Craig Lanzen
-
Publication number: 20050108723Abstract: In a preferred aspect of the present invention, a method for augmenting a hierarchy of layered applications and corresponding protocols can include applying a discrimination algorithm to a selection process in which a particular application/protocol layer in a listing of adjacent application/protocol layers is selected to receive traffic flowing through the hierarchy. A new application/protocol layer can be inserted adjacent to the particular application/protocol layer in the hierarchy. Also, the new application/protocol layer can be added to the listing. Finally, the discrimination algorithm can be replaced with another discrimination algorithm programmed to consider the new application/protocol layer during the selection process. Significantly, each of the steps of performing the inserting, adding and replacing steps can be performed without decoupling or disabling other applications and protocols in the hierarchy.Type: ApplicationFiled: November 19, 2003Publication date: May 19, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, Stephen Fontes, Robert High, Craig Lanzen, William Newport, James Van Oosten
-
Publication number: 20050055437Abstract: A mechanism by which URLs are progressively hashed character by character and clauses of the URL are used to traverse a tree data structure for matching of the URL to resources/rules is provided. The hash code for a single character is appended to a prior hash code for a preceding character in the URL portion. At the time that the entire portion of the URL is hashed, as determined based on the presence of a delimiter character, the particular node in a tree data structure associated with the resulting hash code is identifiable within a hash table of a current node of the tree data structure. Each node in the tree data structure includes a multidimensional hash table for a portion of a URL. The multidimensional hash table is established and grown in a manner that ensures there are no hash collisions.Type: ApplicationFiled: September 9, 2003Publication date: March 10, 2005Applicant: International Business Machines CorporationInventors: Erik Burckart, Aravind Srinivasan