Patents by Inventor Frederick Allyn Kulack

Frederick Allyn Kulack has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090157606
    Abstract: Embodiments of the invention provide techniques for optimizing the processing of abstract rules included in rule set containers. In one embodiment, a first abstract rule may be identified as having an effect on a second abstract rule of the rule set container. A predicate and an action of the first abstract rule may be used in translating the second abstract rule into an executable rule. The executable rule performs the functionality included in the first and second abstract rules, while only requiring one rule execution in a rule engine. In another embodiment, the first abstract rule may be translated into a rejection query configured to return a rejection set. The second abstract rule may be translated into an executable rule that includes a condition that excludes any records included in the rejection set.
    Type: Application
    Filed: December 12, 2007
    Publication date: June 18, 2009
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack, Shannon Everett Wenzel
  • Patent number: 7542655
    Abstract: A method, apparatus, system, and signal-bearing medium that in an embodiment save presented clips of a program and delete unpresented clips of the program. Meta-data associated with the program or embedded in the program to delineate the presented clips. The meta-data are created in response to commands that cause or end the presentation of the program, such as play, slow motion, skip, fast forward, or rewind commands.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: June 2, 2009
    Assignee: International Business Machines Corporation
    Inventors: Michael Robert Burke, Frederick Allyn Kulack, Kevin Glynn Paterson
  • Publication number: 20090132456
    Abstract: Embodiments of the invention provide techniques for processing abstract rules with limiting criteria. In one embodiment, limiting criteria may specify requirements for characteristics of sets of input or output values of processing abstract rules. For example, limiting criteria may specify requirements for statistical validity of a set of input values, such as a minimum record count. In one aspect, limiting criteria may include input criteria applied to input data prior to being processed in a rule engine. In another aspect, limiting criteria may include output criteria applied to an output of a rule engine. In the event that limiting criteria are not satisfied, the processing of the abstract rule may be terminated.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack, Shannon Everett Wenzel
  • Publication number: 20090125500
    Abstract: Embodiments of the invention provide techniques for optimizing the processing of abstract rules. In general, the results of executing an abstract query may be used as data inputs for processing an abstract rule. In one embodiment, query results may be sorted according to input field values required for processing a deterministic abstract rule. If a record of the sorted query results includes the same input values as a preceding record, then the rule output of the preceding record may be reused, rather than processing the abstract rule again. Accordingly, the demand load placed on a rule engine may be reduced.
    Type: Application
    Filed: November 12, 2007
    Publication date: May 14, 2009
    Inventors: Mitchell Jon Arends, Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20090125468
    Abstract: Embodiments of the invention provide techniques for optimizing the processing of abstract rules. In general, the results of executing an abstract query may be used as data inputs for processing an abstract rule. In one embodiment, query results may be sorted according to input field values required for processing a deterministic abstract rule. If a record of the sorted query results includes the same input values as a preceding record, then the rule output of the preceding record may be reused, rather than processing the abstract rule again. Accordingly, the demand load placed on a rule engine may be reduced.
    Type: Application
    Filed: November 9, 2007
    Publication date: May 14, 2009
    Inventors: Mitchell Jon Arends, Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20090119277
    Abstract: Embodiments of the invention provide a method for creating value constraints and record constraints for entity based conditions, while (at least in some cases) reducing the amount of time and errors associated with manually composing query language statements (e.g., SQL). When composing an abstract query, a query interface may be provided for a user to input value constraints and record set constrains to create entity based conditions. The entity based conditions may specify a condition which is evaluated against all rows of data for an instance of a given model entity, and a record set constraint allows a user to specify a subset of records against which the entity based condition is applied.
    Type: Application
    Filed: November 7, 2007
    Publication date: May 7, 2009
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20090083224
    Abstract: A method, article of manufacture and apparatus for graphically summarizing the data in an initial query result set, including when rows are removed from the result set by applying a data quality standard is disclosed. When a user selects to change the data quality standard, a group of target rows are identified and removed from the user's display. A bitmap is generated to graphically represent the location of each row in the initial result set, including removed rows. A bitmap to summarize the data values for one or more columns in the initial result set may also be created. Thus, a user may quickly obtain an intuitive view of what the data looks like, without the need for complex analysis or graphing packages.
    Type: Application
    Filed: September 25, 2007
    Publication date: March 26, 2009
    Inventors: Richard D. Dettinger, Frederick Allyn Kulack, Kevin Glynn Paterson, Shannon Everett Wenzel
  • Publication number: 20090070307
    Abstract: Embodiments of the invention provide a technique for finding anomalous values for fields with temporal autocorrelation, without resorting to complex query writing. When composing an abstract query a query interface may be provided for a user to input a temporal correlation conditions. The temporal correlation conditions may include a type of change, a delta value, and a time frame within which two data values must occur to be identified as an anomalous value. The time correlation conditions are then passed to a query builder configured to generate and execute a database query configured to identify anomalous values based on the time correlation conditions.
    Type: Application
    Filed: September 11, 2007
    Publication date: March 12, 2009
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20090019000
    Abstract: Embodiments of the invention provide techniques for processing abstract rule sets in a query engine. In general, the functions and Boolean logic incorporated in an abstract rule are analyzed to determine whether the rule may be processed by a query engine. As a result, the abstract rule as a whole may be processed by a query engine, may be processed in a rule engine, or may be processed in two stages in a query engine and a rule engine.
    Type: Application
    Filed: July 12, 2007
    Publication date: January 15, 2009
    Inventors: Mitchell Jon Arends, Michael Todd Breitbach, Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20090019092
    Abstract: Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be subject to unwanted disclosure (either from within or without a given organization). For example, an organization (e.g., a research institution) may allow a database administrator to review log event records to diagnose and correct system performance issues, without being forced to trust the administrator with sensitive medical data (e.g., medical records related to participants in a research study). Thus, the security of sensitive information may be maintained, while at the same time, the database administrator may still access the information needed to maintain a working system.
    Type: Application
    Filed: July 13, 2007
    Publication date: January 15, 2009
    Inventors: Richard Dean Dettinger, Daniel Paul Kolz, Frederick Allyn Kulack, Erik Edward Voldal
  • Publication number: 20080295177
    Abstract: A method, apparatus and program product initiate generation of a metafile at a client computer. The metafile is evaluated at a network server for a potential viral risk. Program code executing at the server may correlate the evaluated potential risk to a risk level stored in a database. The program code may attach a color designator or other assignment indicative of the assessed risk level to the data. A user at the client computer may act on the data based on the attached risk level.
    Type: Application
    Filed: July 9, 2008
    Publication date: November 27, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20080271149
    Abstract: An apparatus and program product initiate generation of a metafile at a client computer. The metafile is evaluated at a network server for a potential viral risk. Program code executing at the server may correlate the evaluated potential risk to a risk level stored in a database. The program code may attach a color designator or other assignment indicative of the assessed risk level to the data. A user at the client computer may act on the data based on the attached risk level.
    Type: Application
    Filed: July 9, 2008
    Publication date: October 30, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Patent number: 7437760
    Abstract: A method, apparatus and program product initiate generation of a metafile at a client computer. The metafile is evaluated at a network server for a potential viral risk. Program code executing at the server may correlate the evaluated potential risk to a risk level stored in a database. The program code may attach a color designator or other assignment indicative of the assessed risk level to the data. A user at the client computer may act on the data based on the attached risk level.
    Type: Grant
    Filed: October 10, 2002
    Date of Patent: October 14, 2008
    Assignee: International Business Machines Corporation
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20080177719
    Abstract: Data standards are defined for data according to various criteria. A data standard may be selected for an abstract query, wherein the data standard identifies a quality of data. A query may be generated based on the abstract query and the selected data standard, wherein the query is configured to retrieve results of the abstract query that are in accordance with the selected data standard.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Inventors: Richard Dean Dettinger, Daniel Paul Kolz, Frederick Allyn Kulack, Shannon Everett Wenzel
  • Publication number: 20080177703
    Abstract: Embodiments of the invention are generally related to data processing, and more specifically to processing data retrieved from a database. A GUI screen displaying query results may provide for the selection of a data standard to be applied to the query results. An analysis routine may identify specific results that comport with a selected data standard and visually identify the specific query results that comport with the selected data standard.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack, Shannon Everett Wenzel
  • Patent number: 7290136
    Abstract: A method, apparatus, and program product for tiered, multi-state intelligent detection and enforcement of security on a pervasive device is provided. The method/apparatus first monitors the pervasive device for the presence of a security identifier, then establishes a current security level chosen from a plurality of security levels for the pervasive device based on the presence of the security identifier.
    Type: Grant
    Filed: September 26, 2006
    Date of Patent: October 30, 2007
    Assignee: International Business Machines Corporation
    Inventors: Frederick Allyn Kulack, Scott Alan Moore
  • Patent number: 7134015
    Abstract: A method, apparatus, and program product for tiered, multi-state intelligent detection and enforcement of security on a pervasive device is provided. The method/apparatus first monitors the pervasive device for the presence of a security identifier, then establishes a current security level chosen from a plurality of security levels for the pervasive device based on the presence of the security identifier.
    Type: Grant
    Filed: January 16, 2003
    Date of Patent: November 7, 2006
    Assignee: International Business Machines Corporation
    Inventors: Frederick Allyn Kulack, Scott Alan Moore
  • Patent number: 6877987
    Abstract: A portable organizer device through which a student may use and maintain a personal calender. Further, a student may use the portable organizer to access assignment records maintained in a master calender used and maintained by an educational institution in a database, and synchronize the personal calendar with the master calender. The portable organizer may be further configured to facilitate the management of student equipment and activities.
    Type: Grant
    Filed: January 2, 2002
    Date of Patent: April 12, 2005
    Assignee: International Business Machines Corporation
    Inventor: Frederick Allyn Kulack
  • Patent number: 6865697
    Abstract: A server which service multiple clients according to a defined interface selectively determines whether to by-pass at least some error checks of client requests. Preferably, the client server interface uses a Java Database Connectivity (JDBC) API, there being a set of error checks associated with each type of request. For at least some error checks, the server selectively by-passes error checking. In the exemplary embodiment, the server by-passes error checking of certain error conditions at the client's request. Alternatively, the server might selectively by-pass error checking on the basis of the client's identity, or current server performance, or on a random or intermittent basis.
    Type: Grant
    Filed: January 18, 2002
    Date of Patent: March 8, 2005
    Assignee: International Business Machines Corporation
    Inventors: Richard Dean Dettinger, Frederick Allyn Kulack
  • Publication number: 20040143750
    Abstract: A method, apparatus, and program product for tiered, multi-state intelligent detection and enforcement of security on a pervasive device is provided. The method/apparatus first monitors the pervasive device for the presence of a security identifier, then establishes a current security level chosen from a plurality of security levels for the pervasive device based on the presence of the security identifier.
    Type: Application
    Filed: January 16, 2003
    Publication date: July 22, 2004
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frederick Allyn Kulack, Scott Alan Moore