Patents by Inventor Jessica Murillo

Jessica Murillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060031781
    Abstract: A system and method for reversing a windows close action is provided. The system retains data corresponding to a window after the window is closed for some period of time. The parameters by which the closed window data is retained is user-configurable. When a window is closed, data corresponding to the closed window is not reclaimed by the operating system. Instead, the operating system notes that the window is no longer being managed by the operating system so that no new messages, or signals, are sent to or from the closed window. In addition, the visual aspects of the closed window are removed from the user's display so that, from the user's perspective, the closed window appears to have been closed as in a traditional GUI operating system. The system further reclaims memory from inactive windows according to user-configurable parameters.
    Type: Application
    Filed: August 5, 2004
    Publication date: February 9, 2006
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060020615
    Abstract: A method of creating an electronic document by entering data into the electronic document, searching one or more information sets to identify a set entry which matches a portion of the entered data, and inserting a link to information from the set entry into the electronic document, wherein the link is associated with the matched portion of the entered data. Searching occurs automatically as the data is entered, and different information sets can be designated for searching from among a plurality of available information sets, such as database files, file folders, web browser bookmarks, or email address books. The link is inserted in response to selection of the set entry for inclusion in the electronic document, particularly when multiple matches to parenthetical information are found. In the example where the set entry is a separate file and the document is an email message, the link points to the separate file as an attachment to the email message.
    Type: Application
    Filed: July 22, 2004
    Publication date: January 26, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060020895
    Abstract: A method of creating multiple, alternative presentations within a single electronic presentation, by assigning one or more presentation constraint parameters to the electronic slides, and generating a sequence for presenting less than all of the electronic slides based on the presentation constraint parameters. Different sequences can be generated using different presentation constraint parameters that are assigned to the electronic slides. For example, a first electronic slide could be included in a first sequence, and a second electronic slide (or multiple slides) can be substituted for the first electronic slide in a second sequence. A sequence can be generated by adjusting a scalable constraint associated with the presentation constraint parameters to determine which electronic slides to include. The presentation constraint parameters can include a time factor and a content level.
    Type: Application
    Filed: July 22, 2004
    Publication date: January 26, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Patent number: 6983352
    Abstract: A system and method for performing a point in time backup is presented. A backup application initiates a point in time backup whereupon a backup tracker monitors write requests during the point in time backup. The backup tracker logs data block locations that have already been backed up whose content changes in response to a write request. After a first pass of backing up data blocks, the backup application backs up the changed data blocks. During the changed data block backup procedure, the backup application invokes a copy on write command for particular changed data blocks that receive write requests prior to their content being backed up. The copy on write command stores the particular changed data block's content in a temporary storage area in which the backup application retrieves when the backup application is ready to backup the particular changed data blocks.
    Type: Grant
    Filed: June 19, 2003
    Date of Patent: January 3, 2006
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20050276393
    Abstract: A method, system and telephone answering device for processing control scripts attached to voice messages provides a mechanism by which a caller can leave an interactive list of contact information. The scripts provide for control of a display and input responses from a keypad or other input device so that an entry on the contact information list can be activated in response to user input, thus returning the call. The list information displayed may be arbitrary textual associations with the underlying contact number. The contact information may also include e-mail addresses, so that activation of an e-mail list element will activate a text messaging service, if available. For wireless telephone devices, the method implementing the present invention may be operable at the service provider only, so that standard wireless telephones may be programmed to provide the interactive list from a provider-side interpretation of the scripts.
    Type: Application
    Filed: June 10, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susan Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050276406
    Abstract: A system and method for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Application
    Filed: June 10, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050257159
    Abstract: A method, apparatus, and computer instructions for processing email messages in a data processing system. A determination is made as to whether a set of attachments is associated with an email message. If a set of attachments is associated with the email message, an indicator is added to a subject line for the email message for each type of attachment in the set of attachments associated with the email message. The indicator provides an indication of a type of attachment associated with the email message and the indicator is displayed with the subject line in a folder of an email program.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050257263
    Abstract: A system and method for determining a point of immunity of a computing system to a computer virus are provided. A trace of the calls of a process, that processes a data packet which is suspected of having a computer virus, in both an infected computing system and an immune computing system are obtained. Differences in the call traces are used to pinpoint a point in the series of calls at which the processing by the two processes diverge. The process corresponding to this point of divergence is then determined and version information of the version of the corresponding process on the infected computing system and the immune computing system are determined. Differences in the version information are identified and immunization recommendations are made based on the identified differences in the version information.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050256859
    Abstract: A system, apparatus and method of allowing an application program continued access to a frozen file system are provided. An application program that requires continued access to a file system, even when the file system is frozen, may register with the system. Doing so allows the system to identify application program as one that needs continued access to the file system. Hence, the application program may continue to be provided access to the file system while all other application programs are prevented from accessing the file system.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20050246444
    Abstract: Displaying a computer resource through a preferred browser, including invoking a URL that identifies a computer resource; identifying, among a plurality of available browsers, a preferred browser for the resource; and displaying the resource through the preferred browser. Typical embodiments also include storing the URL in association with an identification of the preferred browser. In such embodiments, identifying a preferred browser for the resource also includes identifying the preferred browser in dependence upon the URL. Identifying the preferred browser may include requesting the resource through a default browser and receiving the resource in the default browser, the resource having meta-data comprising an identification of the preferred browser. Such embodiments also typically include storing the URL in association with the identification of the preferred browser.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Koehane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050240777
    Abstract: A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated.
    Type: Application
    Filed: April 22, 2004
    Publication date: October 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050235358
    Abstract: A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
    Type: Application
    Filed: April 15, 2004
    Publication date: October 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050223394
    Abstract: Administration of keyboard input in a computer having a display device supporting a graphical user interface (“GUI”), including storing keyboard input intended by a user for a second widget when keyboard focus is on a first widget, wherein the first widget receives no keyboard input; changing keyboard focus to the second widget; and providing the stored keyboard input to the second widget.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216588
    Abstract: A system, system, and program for managing message storage are provided. A messaging client receives new messages for an intended recipient. The messaging client controls storage of these new messages in a message storage system of fixed capacity. The messaging client monitors the usage percentage of the capacity of the message storage system. When the messaging client receives a new message, the messaging client determines whether the sender identifier of the message and the usage percentage match with a criteria for blocking messages as set by the intended recipient. If the new message sender identifier and the usage percentage match the criteria for blocking, then the messaging client blocks the message from being stored in the message storage system, such that the intended recipient is enabled to specify blocking preferences which are then implemented by the messaging client to avoid overflowing the message storage capacity with less important unread messages.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216908
    Abstract: Assigning computational processes in a computer system to workload management classes that include installing on the computer system an executable file from a software installation package. The software installation package typically includes a specification of workload management properties for the executable file which in turn includes a definition of a workload management class. Typical embodiments also include executing a process in dependence upon the executable file and assigning the process to the workload management class. In typical embodiments, the workload management class definition also includes a class name, a priority ranking, and an inheritance attribute. In typical embodiments, the specification of workload management properties also includes minimum values and maximum values for CPU, memory, and disk I/O shares for the executable file.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216842
    Abstract: A method, computer program product, and a data processing system for a method of managing event schedules is provided. A plurality of acceptance messages associated with a first scheduled event having a scheduled event time are received. Each of the plurality of acceptance messages are associated with a respective user. A schedule conflict of a user associated with an acceptance message of the plurality of acceptance messages is identified. Responsive to identifying the schedule conflict, a probable attendance is calculated from the plurality of acceptance messages.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216733
    Abstract: A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050198153
    Abstract: A system, system, and program for efficient filing of electronic messages in a filing system are provided. At least one filing folder is suggested for filing a particular electronic message. The suggested filing folder is graphically distinguished from the remainder of the folders in the filing system, such that selection of a folder for filing an electronic message is facilitated. In particular, a suggested folder name may be attached to an electronic message before it is sent. Then, when the electronic message is received and to be filed, the suggested folder is the one bearing the name of the suggested folder name attached to the electronic message.
    Type: Application
    Filed: February 12, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050182965
    Abstract: Methods, systems, and products are disclosed for controlling access to a computer resource that include receiving from a requesting entity a request for access to the computer resource; determining that the requesting entity has a proxy permission, where the proxy permission has at least one associated proxy rule; and granting access to the computer resource in dependence upon the proxy rule. In typical embodiments, the proxy rule comprises at least one condition required for granting access to the computer resource. In typical embodiments, the condition has a plurality of possible states.
    Type: Application
    Filed: February 12, 2004
    Publication date: August 18, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20050154837
    Abstract: A method, apparatus, and computer instructions for managing caching of data by a browser. A request is received to retrieve a Web page. The request includes location information for the Web page. A determination is made as to whether a match is present in a data structure for the location information. In response to a match being present, the caching of data for the Web page is prevented or cached on a temporary basis.
    Type: Application
    Filed: January 12, 2004
    Publication date: July 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Johnny Shieh, Shawn Mullen, Jessica Murillo