Patents by Inventor Howard M. Hess
Howard M. Hess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150095875Abstract: A compute-implemented method and apparatus for assisting release planning, including steps of: obtaining remaining requirements that are expected to be included in a current release plan; obtaining the release plan, which comprises a set of planned requirements that are already included in the release plan and a set of release constraints; determining that there is a conflict between the release constraints and the planned requirements; rendering, in response to this determination, a proposal to create a modified release plan that is a function of the remaining requirements and of the current release plan; and forecasting, as a function of the remaining requirements and of the modified release plan, whether the addition of another requirement to the release plan would create a conflict with the release constraints.Type: ApplicationFiled: August 7, 2014Publication date: April 2, 2015Inventors: Hao Chen, Claudio Cozzi, Ya B. Dang, Howard M. Hess, Steven M. Kagan, Feng Li, Shao C. Li, Xin Zhou, Jun Zhu
-
Publication number: 20150067635Abstract: A method for impact analysis of change requests of a computing system is provided. The method includes, identifying artifacts and tasks that are impacted by a change request on a target project based on a change request repository, an artifact dependency network and a task-artifact mapping repository. The method further includes, determining an impact analysis priority for each of the identified tasks based on associations among the change request and the identified artifacts and tasks, and a project status tracking repository. The method further includes analyzing an impact of the change request on each of the identified tasks according to the determined impact analysis priority. The method further includes obtaining requirements, requirement dependencies and requirement constraints of the project scope to identifying artifacts and tasks that are impacted by a change request on the target project of the project scope.Type: ApplicationFiled: August 11, 2014Publication date: March 5, 2015Inventors: Hao Chen, Claudio Cozzi, Ya Bin Dang, Howard M. Hess, Steven M. Kagan, Feng Li, Shao Chun Li, Jeffrey L. Robinson, Xin Zhou
-
Publication number: 20150067636Abstract: A method includes generating a test model based on at least one of test group dependencies and test group constraints and generating a resource base. the method includes generating a cost model and generating a resource allocation plan based on the test model, the resource base, and the cost model.Type: ApplicationFiled: October 16, 2014Publication date: March 5, 2015Inventors: Kathryn A. BASSIN, Howard M. HESS, Sheng HUANG, Steven M. KAGAN, Shao C. LI, Zhong J. LI, He H. LIU, Susan E. SMITH, Hua F. TAN, Li WANG, Jun ZHU
-
Patent number: 8893086Abstract: A method includes generating a test model based on at least one of test group dependencies and test group constraints and generating a resource base. The method includes generating a cost model and generating a resource allocation plan based on the test model, the resource base, and the cost model.Type: GrantFiled: September 11, 2009Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Kathryn A. Bassin, Howard M. Hess, Sheng Huang, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Li Wang, Jun Zhu
-
Publication number: 20140317450Abstract: A computer-implemented method comprising: obtaining a description of a test suite which comprises a plurality of tests, wherein each test of the test suite is described by values of functional attributes, wherein at least a portion of the functional attributes are setup-related attributes, wherein a combination of values of the setup-relates attributes potentially indicate a setup activity to be performed prior to executing the test to set up a test environment for the test. Identifying, based on the description of the test suite, a setup activity that is associated with two or more tests, wherein the setup activity is configured to set up a component of the test environment, wherein the identifying is performed by a processor. Providing a first instruction to perform the setup activity prior to executing a first test of the two or more tests.Type: ApplicationFiled: April 3, 2014Publication date: October 23, 2014Applicant: International Business Machines CorporationInventors: Howard M. Hess, Rachel Tzoref-Brill, Aviad Zlotnick
-
Publication number: 20140136277Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project.Type: ApplicationFiled: January 22, 2014Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Kathryn A. BASSIN, Howard M. HESS, Sheng HUANG, Steven KAGAN, Shao C. LI, Zhong J. LI, He H. LIU, Susan E. SKRABANEK, Hua F. TAN, Jun ZHU
-
Patent number: 8689188Abstract: A method includes creating an initial test plan including initial estimates of effort and defect distributions, creating an alternative test plan including alternative estimates of effort and defect distributions, and displaying at least one metric of the initial test plan and the alternative test plan side by side for comparison by a user.Type: GrantFiled: September 11, 2009Date of Patent: April 1, 2014Assignee: International Business Machines CorporationInventors: Kathryn A. Bassin, Howard M. Hess, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Jun Zhu
-
Patent number: 8645921Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project.Type: GrantFiled: May 24, 2013Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Kathryn A. Bassin, Howard M. Hess, Sheng Huang, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Jun Zhu
-
Publication number: 20140032256Abstract: A computer hardware-implemented method, system, and/or computer program product creates an optimized project portfolio. Parameters, which defined constraints on a project portfolio, are established. The project portfolio is populated with a mixture of critical path projects and critical chain projects. The project portfolio is then optimized by: in response to determining that start and finish dates have been committed to project sponsors of in-progress projects within the project portfolio, locking the in-progress projects into place on a portfolio timeline; adjusting expectations for the in-progress projects based on performance to date in order to extend a finish date; combining all other projects, which are not yet committed, in priority order onto the portfolio timeline by mapping each generic timeline onto actual calendar dates; and sliding unanchored projects forward or backward on the portfolio timeline to fill holes and smooth bulges in the portfolio timeline.Type: ApplicationFiled: July 27, 2012Publication date: January 30, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Howard M. HESS, John A. RICKETTS
-
Publication number: 20130339921Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project.Type: ApplicationFiled: May 24, 2013Publication date: December 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kathryn A. BASSIN, Howard M. HESS, Sheng HUANG, Steven KAGAN, Shao C. LI, Zhong J. LI, He H. LIU, Susan E. SKRABANEK, Hua F. TAN, Jun ZHU
-
Patent number: 8495583Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project.Type: GrantFiled: September 11, 2009Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Kathryn A. Bassin, Howard M. Hess, Sheng Huang, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Jun Zhu
-
Publication number: 20130117005Abstract: Systems and methods for constructing a model to test the functionality of a target system are provided. When a first test methodology is used to test the target system, a model is proposed to test the target system based on a second test methodology. A subset of the target system's properties covered by the model is selected according to the second test methodology. It is determined whether the selected subset of the target system's properties, as covered by the second test methodology, is covered by the first test methodology.Type: ApplicationFiled: November 8, 2011Publication date: May 9, 2013Applicant: International Business Machines CorporationInventors: Eitan Farchi, Howard M. Hess, Onn M. Shehory, Aviad Zlotnick
-
Publication number: 20110066490Abstract: A method includes generating a test model based on at least one of test group dependencies and test group constraints and generating a resource base. The method includes generating a cost model and generating a resource allocation plan based on the test model, the resource base, and the cost model.Type: ApplicationFiled: September 11, 2009Publication date: March 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kathryn A. Bassin, Howard M. Hess, Sheng Huang, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Li Wang, Jun Zhu
-
Publication number: 20110067005Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project.Type: ApplicationFiled: September 11, 2009Publication date: March 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kathryn A. Bassin, Howard M. Hess, Sheng Huang, Steven Kagan, Shao C. Li, Zhong J. Li, He H. Liu, Susan E. Skrabanek, Hua F. Tan, Jun Zhu
-
Publication number: 20110066890Abstract: A method includes creating an initial test plan including initial estimates of effort and defect distributions, creating an alternative test plan including alternative estimates of effort and defect distributions, and displaying at least one metric of the initial test plan and the alternative test plan side by side for comparison by a user.Type: ApplicationFiled: September 11, 2009Publication date: March 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kathryn A. BASSIN, Howard M. HESS, Steven KAGAN, Shao C. LI, Zhong J. LI, He H. LIU, Susan E. SKRABANEK, Hua F. TAN, Jun ZHU
-
Patent number: 7693849Abstract: Provided are a method, system, and program for processing a request for an object from a user. Layout information for the requested object is accessed, wherein the layout information delineates fields in the object. A determination is made from access control information as to whether the user is authorized to access the fields indicated in the layout information. The data from the object in one field which the user is not authorized to access is masked. The fields from the object are generated into a formatted object formatted according to the layout information, wherein the masked data is presented unintelligible to the user.Type: GrantFiled: May 19, 2005Date of Patent: April 6, 2010Assignee: International Business Machines CorporationInventor: Howard M. Hess
-
Patent number: 6931630Abstract: Computer program code which is a candidate for Web enablement or stored procedures is identified. Source code corresponding to computer program code is scanned and parsed to determine static information concerning the computer program code. The static information is stored in a database. Dynamic information concerning the computer program code during an execution of the computer program code is also collected and stored in the database. Responsive to the static information and dynamic information stored in the database, relationships and dependencies are then developed and stored in the database. The database may then be queried to produce a set of potential candidates of computer program code meeting a constraint of the query. If insufficient candidates are returned by the query, then the query constraint may be relaxed, and the query repeated.Type: GrantFiled: September 27, 2000Date of Patent: August 16, 2005Assignee: International Business Machines CorporationInventors: Curt L. Cotner, Laurence E. England, Howard J. Glaser, Howard M. Hess