Patents by Inventor Gary Denner
Gary Denner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8892657Abstract: Embodiments of the present invention address deficiencies of the art in respect to message response management and provide a method, system and computer program product for motivating and de-motivating message responses. In one embodiment of the invention, a message reply motivation and de-motivation method can be provided. The method can include composing a message, addressing the message to at least one addressee, associating a reply preference specifying whether or not a recipient is to reply to the message, and forwarding the reply preference to the addressee. Upon receipt, the message can be displayed in a message viewer, and any reply preference for the message can be analyzed to determine if the reply preference specifies whether or not to reply to the message. Thereafter, the reply preference can be applied in the message viewer.Type: GrantFiled: November 8, 2006Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Patrick O'Sullivan, Gary Denner, Ruthie D. Lyle, Cynthia E. Barber-Mingo, Carol S. Zimmet
-
Patent number: 8874660Abstract: A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a policy of circumvention rights for circumventing do-not-disturb status in instant messaging. A do-not-disturb status of an instant messaging user is identified, and the do-not-disturb status of the instant messaging user is circumvented based upon the policy of circumvention rights.Type: GrantFiled: September 24, 2007Date of Patent: October 28, 2014Assignee: Internatonal Business Machines CorporationInventors: Gary Denner, Patrick Joseph O'Sullivan, Ruthie D. Lyle, Mary Ellen Zurko, Cynthia E. Barber-Mingo
-
Patent number: 8812406Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: GrantFiled: March 3, 2013Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Publication number: 20140164947Abstract: Embodiments of the present invention address deficiencies of the art in respect to arbitrating polling results and provide a novel and non-obvious method, system and computer program product for collaborative arbitration of polling results in a collaborative environment. In an embodiment of the invention, a method for collaborative arbitration of polling results in a collaborative environment can be provided. The method can include placing a poll within a message and sending the message to a select group of collaborators in the collaborative environment. The method further can include receiving poll results from a collaborator in the select group in a reply to the message, extracting the poll results from the reply and placing the poll within a new message along with the extracted poll results. Thereafter, the new message can be sent to the select group.Type: ApplicationFiled: December 2, 2013Publication date: June 12, 2014Applicant: International Business Machines CorporationInventors: Patrick O'Sullivan, Cynthia E. Barber-Mingo, Gary Denner, Ruthie D. Lyle, Carol S. Zimmet
-
Publication number: 20140156592Abstract: Embodiments of the present invention disclose a computer method, computer program product, and computer system for automatically updating a conference invitation with contact information corresponding to a user's geographical location. A user on a client device accepts an invitation to a conference. The geographical location of the client device is determined and stored in a database. Using the location of the client device, a conference information database is accessed, and location specific conference contact information is determined. The location specific conference contact information is then input into the conference invitation so that the user has location specific conference contact information. In another embodiment, when the user accesses the conference invitation, the location of the client device is determined, and if the location has changed from when the invitation was accepted, a new location is determined.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Applicant: International Business Machines CorporationInventors: Judith H. Bank, Erik S. Bryant, Gary Denner, Patrick J. O'Sullivan
-
Patent number: 8712921Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: GrantFiled: October 3, 2011Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8706648Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.Type: GrantFiled: October 3, 2011Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8645468Abstract: Embodiments of the present invention address deficiencies of the art in respect to arbitrating polling results and provide a novel and non-obvious method, system and computer program product for collaborative arbitration of polling results in a collaborative environment. In an embodiment of the invention, a method for collaborative arbitration of polling results in a collaborative environment can be provided. The method can include placing a poll within a message and sending the message to a select group of collaborators in the collaborative environment. The method further can include receiving poll results from a collaborator in the select group in a reply to the message, extracting the poll results from the reply and placing the poll within a new message along with the extracted poll results. Thereafter, the new message can be sent to the select group.Type: GrantFiled: November 8, 2006Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Patrick O'Sullivan, Cynthia E. Barber-Mingo, Gary Denner, Ruthie D. Lyle, Carol S. Zimmet
-
Publication number: 20130311762Abstract: A method, system and computer program product for providing a user access to specific programs and documents before a booting process is completed. A quick start list is generated containing a list of programs and documents that are to be provided priority in initialization during the booting process. A post-quick start list is generated that includes programs that are to be started after the initialization of the programs and documents listed in the quick start list. The programs and documents listed in the quick start list are initialized as soon as feasibly possible in light of the requirements of the booting process. Upon initializing these programs and documents, such programs and documents may be displayed as icons on the user's computer screen. As a result, the user has access to such programs and documents more quickly without having to wait for the booting process to be completed.Type: ApplicationFiled: May 17, 2012Publication date: November 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Judith H. Bank, Erik S. Bryant, Gary Denner, Patrick J. O'Sullivan
-
INTELLIGENT AUTOMATIC EXPANSION/CONTRACTION OF ABBREVIATIONS IN TEXT-BASED ELECTRONIC COMMUNICATIONS
Publication number: 20130191738Abstract: A method for intelligently handling abbreviations in text-based electronic communications can begin with the compilation of abbreviation usage history data by an intelligent abbreviation handler component of a text-based electronic communications system. The abbreviation usage history data can indicate a presentation preference for abbreviation elements based upon past usage by the user. An abbreviation element can be an abbreviation, an acronym, or an initialism. The abbreviation element can be presented in a condensed format or an expanded format. Abbreviation elements can be identified in a received text-based electronic communication. The presentation preference of each identified abbreviation element can be intelligently determined for each recipient from the abbreviation usage history data. An abbreviation-adjusted text-based electronic communication can be created for each recipient using the received text-based electronic communication and the determined presentation preference.Type: ApplicationFiled: January 25, 2012Publication date: July 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: JUDITH H. BANK, ERIK S. BRYANT, GARY DENNER, PATRICK J. O'SULLIVAN -
INTELLIGENT AUTOMATIC EXPANSION/CONTRACTION OF ABBREVIATIONS IN TEXT-BASED ELECTRONIC COMMUNICATIONS
Publication number: 20130191739Abstract: A method for intelligently handling abbreviations in text-based electronic communications can begin with the compilation of abbreviation usage history data by an intelligent abbreviation handler component of a text-based electronic communications system. The abbreviation usage history data can indicate a presentation preference for abbreviation elements based upon past usage by the user. An abbreviation element can be an abbreviation, an acronym, or an initialism. The abbreviation element can be presented in a condensed format or an expanded format. Abbreviation elements can be identified in a received text-based electronic communication. The presentation preference of each identified abbreviation element can be intelligently determined for each recipient from the abbreviation usage history data. An abbreviation-adjusted text-based electronic communication can be created for each recipient using the received text-based electronic communication and the determined presentation preference.Type: ApplicationFiled: May 30, 2012Publication date: July 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: JUDITH H. BANK, ERIK S. BRYANT, GARY DENNER, PATRICK O'SULLIVAN -
Publication number: 20130185105Abstract: Methods implementing and using techniques for generating sales leads in a sales lead generation engine. The sales lead generation engine receives one or more keywords describing one or more aspects of a product. The sales lead generation engine performs a search using the received one or more keywords in a collection of problem reports to identify matching keywords in the problem reports. A display of a computing device displays matching keyword pairs resulting from the search, along with a context in which the keywords occur. A selection of one or more matching keyword pairs is received from a user of the computing device.Type: ApplicationFiled: February 16, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Judith H. Bank, Erik S. Bryant, Gary Denner, Patrick J. O'Sullivan
-
Publication number: 20130185086Abstract: Methods and apparatus, including computer program products, implementing and using techniques for generating sales leads in a sales lead generation engine. The sales lead generation engine receives one or more keywords describing one or more aspects of a product. The sales lead generation engine performs a search using the received one or more keywords in a collection of problem reports to identify matching keywords in the problem reports. A display of a computing device displays matching keyword pairs resulting from the search, along with a context in which the keywords occur. A selection of one or more matching keyword pairs is received from a user of the computing device.Type: ApplicationFiled: January 12, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Judith H. Bank, Erik S. Bryant, Gary Denner, Patrick J. O'Sullivan
-
Publication number: 20130085953Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Publication number: 20130086254Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Publication number: 20130080350Abstract: Techniques are disclosed for managing development of a model set comprised of one or more object models by a plurality of model developers. Each model developer may be considered an interested party. For example, when a model developer changes an area of the model, that person becomes the most interested party in other changes made to the same area. An automated mechanism is provided to track changes made to the model set and informs interested parties as changes are made or after changes are made to the model based on a weighting system. In one embodiment, the weighting system may be based on a distance from the changed portions and on the amount of time since a party last made a change to the same area.Type: ApplicationFiled: September 14, 2012Publication date: March 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Gary Denner, Paula M. Keohan, Michael J. Loughran, John Meade
-
Publication number: 20130080349Abstract: Techniques are disclosed for managing development of a model set comprised of one or more object models by a plurality of model developers. Each model developer may be considered an interested party. For example, when a model developer changes an area of the model, that person becomes the most interested party in other changes made to the same area. An automated mechanism is provided to track changes made to the model set and informs interested parties as changes are made or after changes are made to the model based on a weighting system. In one embodiment, the weighting system may be based on a distance from the changed portions and on the amount of time since a party last made a change to the same area.Type: ApplicationFiled: September 28, 2011Publication date: March 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Gary Denner, Paula M. Keohan, Michael J. Loughran, John Meade
-
Patent number: 8402043Abstract: A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications.Type: GrantFiled: July 19, 2012Date of Patent: March 19, 2013Assignee: International Business Machines CorporationInventors: Al Chakra, Gary Denner, Mette Hammer, George Kyriacou, Garret M. O'Keeffe, Patrick J. O'Sullivan
-
Patent number: 8402041Abstract: A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications.Type: GrantFiled: July 7, 2010Date of Patent: March 19, 2013Assignee: International Business Machines CorporationInventors: Al Chakra, Gary Denner, Mette Hammer, George Kyriacou, Garret Michael O'Keefe, Patrick Joseph O'Sullivan
-
Patent number: 8386572Abstract: A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a trusted user. A do-not-disturb status of an instant messaging user is identified. The trusted user is allowed to circumvent the do-not-disturb status of the instant messaging user.Type: GrantFiled: December 31, 2008Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: Gary Denner, Cynthia E. Barber-Mingo, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Mary Ellen Zurko