Patents by Inventor Kevin Wendzel

Kevin Wendzel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140040880
    Abstract: Techniques are disclosed for evaluating an application to determine a processing environment suited for executing the application. A request may be received to execute the application. If execution data identified for the application do not satisfy a first set of criteria, the application is deployed for execution on a first processing environment. If the execution data satisfy the first set of criteria, the application is deployed for execution partially in time on a second processing environment, based on the execution data. The second processing environment provides a higher capability than the first processing environment in terms of at least one resource type.
    Type: Application
    Filed: August 2, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
  • Publication number: 20140040721
    Abstract: Techniques are disclosed for serving a webpage based on a zoom level. The techniques include requesting, by a client device, contents of a webpage. The request may include indications of a zoom level and a viewable area of the webpage as shown on a display of the client device. A server system may determine that the zoom level indicated in the request is less than a threshold value and identify content items within the viewable area which meet predefined criteria for being considered expensive. Further, the server system may serve a modified webpage which includes replacement items in lieu of the expensive content items.
    Type: Application
    Filed: August 2, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
  • Publication number: 20140038154
    Abstract: Method, system, and computer program product for performing an operation for automatic electronic book augmentation. The operation presents an electronic book via a display screen of an electronic device, and identifies user preferences. The operation then determines a current reading position of a user within the electronic book. The operation then identifies, based on the user's current reading position, a context within the electronic book. The operation then identifies, based on the context and the user preferences, sensory effects to enhance the user's experience. The operation then outputs the sensory effects.
    Type: Application
    Filed: August 2, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
  • Patent number: 8578201
    Abstract: Method is described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Grant
    Filed: November 25, 2012
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
  • Patent number: 8578200
    Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
  • Patent number: 8572611
    Abstract: A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict.
    Type: Grant
    Filed: March 3, 2010
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Curtis S. Eide, Aditya Kumar, Steven E. Vaughan, Bradley J. Vette, Kevin Wendzel
  • Patent number: 8527760
    Abstract: In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction.
    Type: Grant
    Filed: January 25, 2011
    Date of Patent: September 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Nathan G. Faiman, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20130198641
    Abstract: Once a computing device receives a request to display a webpage, the device may use criteria to determine the portion of the page that is likely to be the most relevant to the user. The computing device may then zoom in (i.e., adjust the relative size and position of the elements in the webpage) and pan or scroll through the webpage such that the most relevant portion is displayed. Additionally, the computing device may superimpose on the displayed portion of the webpage links that represent other portions of the webpage that are currently not displayed but are relevant to the currently displayed portion. Selecting a link causes the computing device to display the corresponding portion. Furthermore, as the user zooms out, the computing device may also highlight hotspots or points of interests for the new content that is being displayed.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 1, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
  • Patent number: 8464269
    Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.
    Type: Grant
    Filed: December 16, 2010
    Date of Patent: June 11, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel
  • Publication number: 20120330993
    Abstract: Techniques are described for allowing a first user to efficiently send contact information to a second user using a user communication of a messaging application such as email programs, instant messaging programs, social media websites, or chat rooms. The messaging application may maintain a name database that stores names that are relevant to a first user. When the first user then types or speaks a name into a user communication (e.g., an email, instant message, or voice message), the messaging application provides the first user with the names stored in the name database that match the name in the user communication. Additionally, the messaging application may use ranking data associated with each matched name to order the names according to relevance.
    Type: Application
    Filed: June 21, 2011
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan G. Faiman, Michael T. Kalmbach, Brian R. Muras, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20120266010
    Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ADITYA KUMAR, KEVIN WENDZEL, ALWOOD P. WILLIAMS, III
  • Publication number: 20120192251
    Abstract: In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction.
    Type: Application
    Filed: January 25, 2011
    Publication date: July 26, 2012
    Applicant: International Business Machines Corporation
    Inventors: Nathan G. Faiman, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20120159510
    Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.
    Type: Application
    Filed: December 16, 2010
    Publication date: June 21, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aditya Kumar, Kevin Wendzel
  • Publication number: 20110219371
    Abstract: A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict.
    Type: Application
    Filed: March 3, 2010
    Publication date: September 8, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curtis S. Eide, Aditya Kumar, Steven E. Vaughan, Bradley J. Vette, Kevin Wendzel
  • Publication number: 20100228558
    Abstract: Techniques are disclosed selecting a targeted advertisement to present to an individual, based upon the product preference of others and the individual's relationships with others. By analyzing content such as images and text, an individual's interest in a product or an individual's relationship with another person may be determined. Generally, a profile may store the above information and a relational product grid may provide an organized description of the relationships and product interests. The salability of a given product to a particular individual may be determined by analyzing the relational product grid. Based upon the salability, advertisers may decide whether to advertise a product to an individual. Thus, by leveraging personal relationship data, advertisers may expand their targeted advertising campaigns.
    Type: Application
    Filed: March 3, 2009
    Publication date: September 9, 2010
    Applicant: International Business Machines Corporation
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20090328034
    Abstract: A method of establishing a bi-directional grid computing network includes submitting a processing job from a job requester to a central repository, querying nodes associated with the job requester to process the processing job, identifying suitable nodes associated with the job requester to process the processing job, transmitting the processing job from the job requester to at least one of the suitable nodes associated with the job requester, processing the processing job on the at least one suitable node associated with the job requester, and returning results from processing the processing job to the job requester.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Applicant: International Business Machines Corporation
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Eric R. Larese, Jared W. Patterson, Kevin Wendzel
  • Publication number: 20090320134
    Abstract: A method, computer program product or computer system for scanning files in a computer system to detect additional infected files of a computer virus when a first infected file of the computer virus is identified, includes maintaining a friends tree for each file in the computer system, maintaining a search tree using the friends trees for scanning the files, searching the files listed in the search tree for the additional infected files, and quarantining the additional infected files detected in the searching.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Inventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel