Patents by Inventor Kevin Wendzel
Kevin Wendzel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140040880Abstract: Techniques are disclosed for evaluating an application to determine a processing environment suited for executing the application. A request may be received to execute the application. If execution data identified for the application do not satisfy a first set of criteria, the application is deployed for execution on a first processing environment. If the execution data satisfy the first set of criteria, the application is deployed for execution partially in time on a second processing environment, based on the execution data. The second processing environment provides a higher capability than the first processing environment in terms of at least one resource type.Type: ApplicationFiled: August 2, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
-
Publication number: 20140040721Abstract: Techniques are disclosed for serving a webpage based on a zoom level. The techniques include requesting, by a client device, contents of a webpage. The request may include indications of a zoom level and a viewable area of the webpage as shown on a display of the client device. A server system may determine that the zoom level indicated in the request is less than a threshold value and identify content items within the viewable area which meet predefined criteria for being considered expensive. Further, the server system may serve a modified webpage which includes replacement items in lieu of the expensive content items.Type: ApplicationFiled: August 2, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
-
Publication number: 20140038154Abstract: Method, system, and computer program product for performing an operation for automatic electronic book augmentation. The operation presents an electronic book via a display screen of an electronic device, and identifies user preferences. The operation then determines a current reading position of a user within the electronic book. The operation then identifies, based on the user's current reading position, a context within the electronic book. The operation then identifies, based on the context and the user preferences, sensory effects to enhance the user's experience. The operation then outputs the sensory effects.Type: ApplicationFiled: August 2, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
-
Patent number: 8578201Abstract: Method is described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.Type: GrantFiled: November 25, 2012Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
-
Patent number: 8578200Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.Type: GrantFiled: April 14, 2011Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
-
Patent number: 8572611Abstract: A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict.Type: GrantFiled: March 3, 2010Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Curtis S. Eide, Aditya Kumar, Steven E. Vaughan, Bradley J. Vette, Kevin Wendzel
-
Patent number: 8527760Abstract: In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction.Type: GrantFiled: January 25, 2011Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Nathan G. Faiman, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
-
Publication number: 20130198641Abstract: Once a computing device receives a request to display a webpage, the device may use criteria to determine the portion of the page that is likely to be the most relevant to the user. The computing device may then zoom in (i.e., adjust the relative size and position of the elements in the webpage) and pan or scroll through the webpage such that the most relevant portion is displayed. Additionally, the computing device may superimpose on the displayed portion of the webpage links that represent other portions of the webpage that are currently not displayed but are relevant to the currently displayed portion. Selecting a link causes the computing device to display the corresponding portion. Furthermore, as the user zooms out, the computing device may also highlight hotspots or points of interests for the new content that is being displayed.Type: ApplicationFiled: January 30, 2012Publication date: August 1, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean T. Brownlow, Nathan G. Faiman, Michael T. Kalmbach, John E. Petri, Kevin Wendzel
-
Patent number: 8464269Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.Type: GrantFiled: December 16, 2010Date of Patent: June 11, 2013Assignee: International Business Machines CorporationInventors: Aditya Kumar, Kevin Wendzel
-
Publication number: 20120330993Abstract: Techniques are described for allowing a first user to efficiently send contact information to a second user using a user communication of a messaging application such as email programs, instant messaging programs, social media websites, or chat rooms. The messaging application may maintain a name database that stores names that are relevant to a first user. When the first user then types or speaks a name into a user communication (e.g., an email, instant message, or voice message), the messaging application provides the first user with the names stored in the name database that match the name in the user communication. Additionally, the messaging application may use ranking data associated with each matched name to order the names according to relevance.Type: ApplicationFiled: June 21, 2011Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan G. Faiman, Michael T. Kalmbach, Brian R. Muras, Jared W. Patterson, Kevin Wendzel
-
Publication number: 20120266010Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.Type: ApplicationFiled: April 14, 2011Publication date: October 18, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ADITYA KUMAR, KEVIN WENDZEL, ALWOOD P. WILLIAMS, III
-
Publication number: 20120192251Abstract: In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction.Type: ApplicationFiled: January 25, 2011Publication date: July 26, 2012Applicant: International Business Machines CorporationInventors: Nathan G. Faiman, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
-
Publication number: 20120159510Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aditya Kumar, Kevin Wendzel
-
Publication number: 20110219371Abstract: A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict.Type: ApplicationFiled: March 3, 2010Publication date: September 8, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curtis S. Eide, Aditya Kumar, Steven E. Vaughan, Bradley J. Vette, Kevin Wendzel
-
Publication number: 20100228558Abstract: Techniques are disclosed selecting a targeted advertisement to present to an individual, based upon the product preference of others and the individual's relationships with others. By analyzing content such as images and text, an individual's interest in a product or an individual's relationship with another person may be determined. Generally, a profile may store the above information and a relational product grid may provide an organized description of the relationships and product interests. The salability of a given product to a particular individual may be determined by analyzing the relational product grid. Based upon the salability, advertisers may decide whether to advertise a product to an individual. Thus, by leveraging personal relationship data, advertisers may expand their targeted advertising campaigns.Type: ApplicationFiled: March 3, 2009Publication date: September 9, 2010Applicant: International Business Machines CorporationInventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel
-
Publication number: 20090328034Abstract: A method of establishing a bi-directional grid computing network includes submitting a processing job from a job requester to a central repository, querying nodes associated with the job requester to process the processing job, identifying suitable nodes associated with the job requester to process the processing job, transmitting the processing job from the job requester to at least one of the suitable nodes associated with the job requester, processing the processing job on the at least one suitable node associated with the job requester, and returning results from processing the processing job to the job requester.Type: ApplicationFiled: June 25, 2008Publication date: December 31, 2009Applicant: International Business Machines CorporationInventors: Sean D. Corcoran, Michael T. Kalmbach, Eric R. Larese, Jared W. Patterson, Kevin Wendzel
-
Publication number: 20090320134Abstract: A method, computer program product or computer system for scanning files in a computer system to detect additional infected files of a computer virus when a first infected file of the computer virus is identified, includes maintaining a friends tree for each file in the computer system, maintaining a search tree using the friends trees for scanning the files, searching the files listed in the search tree for the additional infected files, and quarantining the additional infected files detected in the searching.Type: ApplicationFiled: June 24, 2008Publication date: December 24, 2009Inventors: Sean D. Corcoran, Michael T. Kalmbach, Jared W. Patterson, Kevin Wendzel