Patents by Inventor Jeffrey S. Holland

Jeffrey S. Holland has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9442770
    Abstract: An apparatus for workload execution timing is disclosed. A method and a computer program product also perform the functions of the apparatus. The apparatus includes a job determination module that determines jobs to be executed by a computer system. The apparatus includes a comparison module that compares an execution profile of each job with a resource of a device of the computer system. The execution profile of each job includes an amount of a resource of a device used by the respective job over time. The apparatus includes a scheduling module that determines a schedule that indicates a time to execute each job on the device based on the comparison. Each job is scheduled to maintain a utilization of the resource of the device of the computer system below a maximum threshold. The apparatus includes an execution module that submits the jobs for execution based on the schedule.
    Type: Grant
    Filed: June 4, 2015
    Date of Patent: September 13, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Gary D. Cudak, Shareef F. Alshinnawi, Jeffrey S. Holland, Pradeep Ramineni
  • Publication number: 20160048665
    Abstract: Unlocking an electronic device includes displaying, by a security module, a plurality of objects including at least one target object and at least one decoy object, where the at least one target object is obtained from a stored history of viewed objects, detecting, by the security module, a user selection from the plurality of objects, and in response to detecting that the user selection is one of the at least one target objects, unlocking, by the security module, the electronic device.
    Type: Application
    Filed: August 12, 2014
    Publication date: February 18, 2016
    Inventors: SHAREEF F. ALSHINNAWI, GARY D. CUDAK, JEFFREY S. HOLLAND, ROBERT B. RAINEY
  • Publication number: 20150248548
    Abstract: A computer program product for controlling access to a resource of an electronic device includes program instructions for executing a method. The method stores a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the last access.
    Type: Application
    Filed: February 28, 2014
    Publication date: September 3, 2015
    Applicant: International Business Machines Corporation
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Jeffrey S. Holland, Robert B. Rainey
  • Publication number: 20150248550
    Abstract: A method includes storing a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the user last accessed the resource.
    Type: Application
    Filed: March 3, 2014
    Publication date: September 3, 2015
    Applicant: International Business Machines Corporation
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Jeffrey S. Holland, Robert B. Rainey