Patents by Inventor John W. Bell
John W. Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11068485Abstract: Identifying data within a data store satisfying a request. A quantity of the identified data is greater than a threshold. The identified data is analyzed to produce an initial result set with a reduced data quantity including information summarizing the identified data. The analyzing includes visualizing the information summarizing the identified data as one or more graphical displays rendered within a user interface and selectively filtering the identified data based upon a selection of filter factors associated with the identified data to generate an initial result set having a smaller size in relation to the identified data set. Each of one or more succeeding result sets are generated from a corresponding prior result set until a succeeding result set includes a quantity of data satisfying the threshold. The generating of each succeeding result set includes filtering the corresponding prior result set and information summarizing the filtered result set.Type: GrantFiled: March 4, 2019Date of Patent: July 20, 2021Assignee: International Business Machines CorporationInventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Publication number: 20190220465Abstract: Identifying data within a data store satisfying a request. A quantity of the identified data is greater than a threshold. The identified data is analyzed to produce an initial result set with a reduced data quantity including information summarizing the identified data. The analyzing includes visualizing the information summarizing the identified data as one or more graphical displays rendered within a user interface and selectively filtering the identified data based upon a selection of filter factors associated with the identified data to generate an initial result set having a smaller size in relation to the identified data set. Each of one or more succeeding result sets are generated from a corresponding prior result set until a succeeding result set includes a quantity of data satisfying the threshold. The generating of each succeeding result set includes filtering the corresponding prior result set and information summarizing the filtered result set.Type: ApplicationFiled: March 4, 2019Publication date: July 18, 2019Inventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Patent number: 10311059Abstract: A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.Type: GrantFiled: December 30, 2015Date of Patent: June 4, 2019Assignee: International Business Machines CorporationInventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Patent number: 10169606Abstract: A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.Type: GrantFiled: June 29, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: John W. Bell, Robert Haas, James S. Luke, John A. Ricketts
-
Patent number: 9892164Abstract: A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.Type: GrantFiled: January 30, 2015Date of Patent: February 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Patent number: 9892276Abstract: A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.Type: GrantFiled: November 11, 2015Date of Patent: February 13, 2018Assignee: International Business Machines CorporationInventors: John W. Bell, Robert Haas, James S. Luke, John A. Ricketts
-
Publication number: 20170132429Abstract: A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.Type: ApplicationFiled: November 11, 2015Publication date: May 11, 2017Inventors: John W. Bell, Robert Haas, James S. Luke, John A. Ricketts
-
Publication number: 20170132266Abstract: A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.Type: ApplicationFiled: June 29, 2016Publication date: May 11, 2017Inventors: John W. Bell, Robert Haas, James S. Luke, John A. Ricketts
-
Publication number: 20160224629Abstract: A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.Type: ApplicationFiled: December 30, 2015Publication date: August 4, 2016Inventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Publication number: 20160224616Abstract: A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventors: Oliver J. Beacom, John W. Bell, Paul C. Jones, James S. Luke, Luke Morgan, Royston W. Shufflebotham, Mark L. Todd
-
Publication number: 20130185357Abstract: A social networking system electronically assimilates a database of social networking system (SNS) member profiles and associated brand websites on a server connected by a data communications network to a plurality of remote computers. The system utilizes a respective psychographic profile to establish a lifestyle center website on the social networking system server, and the lifestyle center website includes a first set of digital content data related to the psychographic profile. The lifestyle center website displays an anchor tenant website hosted on the SNS server and having a second set of digital content data related to the psychographic profile. The system further identifies social networking system member profiles that match the identified psychographic profile for the lifestyle center website. The system allows SNS members and brand owners to connect within the social networking system for a more efficient online shopping experience.Type: ApplicationFiled: January 14, 2013Publication date: July 18, 2013Inventors: Jeffrey E. Goss, John W. Bell, III
-
Publication number: 20110200571Abstract: Methods and compositions for controlling nematode plant damage using seed and/or soil and foliar treatments are disclosed. Seeds, soil, or both are treated with a nematicidal composition followed later by a foliar treatment by a different nematicidal composition.Type: ApplicationFiled: February 10, 2011Publication date: August 18, 2011Inventors: John W. Bell, Kevin Adam, John Hinz, Jennifer Riggs, Ray Knake
-
Publication number: 20100311801Abstract: The present application relates to the use of tetramic acid derivatives for controlling soil-dwelling nematodes.Type: ApplicationFiled: December 18, 2008Publication date: December 9, 2010Inventors: Reiner Fischer, Robert Steffens, John W. Bell, Manuel Jimenez, Stephen Krueger, John L. Perry, JR.
-
Patent number: 7730057Abstract: Virtual solution architecture for computer data systems. In one aspect, providing an architecture for a computer data system includes creating a virtual solution architecture that includes a plurality of building blocks, each building block characterized by balanced operation, and mapping the virtual solution architecture to a physical solution architecture for the computer data system. Another aspect includes providing at least one balanced configuration unit (BCU) in a computer data system, the BCU including at least one balanced partition unit (BPU) that includes computer resources to provide balanced operation for the BPU.Type: GrantFiled: June 6, 2005Date of Patent: June 1, 2010Assignee: International Business Machines CorporationInventors: John W. Bell, Simon Ashley Field, Jason Michael Gartner, Randall R. Holmes, Nancy A. Kopp, William T. O'Connell, Paulo Roberto Rosa Pereira
-
Patent number: 7681642Abstract: A method for logging a downhole formation in a wellbore. The method comprises drilling a wellbore with a drill bit coupled to a disconnect device. The disconnect device is then actuated to detach the drill bit from a portion of a conveyance. A logging operation is then performed between two portions of the disconnect device. The disconnect device may then be reattached.Type: GrantFiled: August 21, 2007Date of Patent: March 23, 2010Assignee: Weatherford/Lamb, Inc.Inventors: John W. Bell, Larry E. Whitney, Keith Fitzgerald, Thomas M. Redlinger