Patents by Inventor Kimberly DaShawn Simon
Kimberly DaShawn Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8386609Abstract: The invention generally relates to electronic collaboration sessions and, more particularly, to systems and methods for providing reconnection to and migration of electronic collaboration sessions. A method for managing a collaboration session includes providing a computer infrastructure structured and arranged to store data regarding a plurality of clients of a collaboration session, and monitor a connection of each of the plurality of clients to a host system. The computer infrastructure is further operable to (i) migrate the plurality of clients to a new host system after determining that a number of the plurality of clients experiencing connection problems with the first host system exceeds a threshold value and/or (ii) present customized summary data to at least one of the plurality of clients after the at least one of the plurality of clients reconnects to the collaboration session after having been disconnected from the collaboration session.Type: GrantFiled: November 9, 2007Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, Linda Jones Scott, Kimberly DaShawn Simon, Terry G. Thomas, Jr.
-
Patent number: 7893830Abstract: An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.Type: GrantFiled: October 6, 2008Date of Patent: February 22, 2011Assignee: International Business Machines CorporationInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, David Robert Safford, Kimberly DaShawn Simon
-
Patent number: 7886277Abstract: A system and method in a data processing system for error checking and resolving failed input/output open calls. A configuration mechanism configures the options, such as the information stored in databases, details of how each error check is performed, and what actions should be taken when improper error checking occurs. Based on data stored in databases, such as an I/O calls database, a rules with syntax database, and an usage calls database, a code analyzer analyzes code in software programs for an error check of a failed input/output open call. A reporting mechanism reports data from the analyzed code to a report file, such as why software programs have proper and improper error-checking instances, sends errors from the analyzed code to an error file, and enables these files to be displayed on a display. Finally, the code analyzer enables resolving an improper error check for the failed input/output open call.Type: GrantFiled: November 4, 2008Date of Patent: February 8, 2011Assignee: International Business Machines CorporationInventors: Joy Marie Latten, Kimberly DaShawn Simon
-
Publication number: 20090125589Abstract: The invention generally relates to electronic collaboration sessions and, more particularly, to systems and methods for providing reconnection to and migration of electronic collaboration sessions. A method for managing a collaboration session includes providing a computer infrastructure structured and arranged to store data regarding a plurality of clients of a collaboration session, and monitor a connection of each of the plurality of clients to a host system. The computer infrastructure is further operable to (i) migrate the plurality of clients to a new host system after determining that a number of the plurality of clients experiencing connection problems with the first host system exceeds a threshold value and/or (ii) present customized summary data to at least one of the plurality of clients after the at least one of the plurality of clients reconnects to the collaboration session after having been disconnected from the collaboration session.Type: ApplicationFiled: November 9, 2007Publication date: May 14, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, Linda Jones Scott, Kimberly DaShawn Simon, Terry G. Thomas, JR.
-
Publication number: 20090063905Abstract: A system and method in a data processing system for error checking and resolving failed input/output open calls. A configuration mechanism configures the options, such as the information stored in databases, details of how each error check is performed, and what actions should be taken when improper error checking occurs. Based on data stored in databases, such as an I/O calls database, a rules with syntax database, and an usage calls database, a code analyzer analyzes code in software programs for an error check of a failed input/output open call. A reporting mechanism reports data from the analyzed code to a report file, such as why software programs have proper and improper error-checking instances, sends errors from the analyzed code to an error file, and enables these files to be displayed on a display. Finally, the code analyzer enables resolving an improper error check for the failed input/output open call.Type: ApplicationFiled: November 4, 2008Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joy Marie Latten, Kimberly DaShawn Simon
-
Publication number: 20090033490Abstract: An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.Type: ApplicationFiled: October 6, 2008Publication date: February 5, 2009Applicant: International Business Machines CorporationInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, David Robert Safford, Kimberly DaShawn Simon
-
Publication number: 20090037098Abstract: A method and system is provided for providing and storing annotations that pertain to travel directions to a particular destination, the annotations generally including ratings of the accuracy of the directions and errors observed in the directions by prior users. Annotations submitted by users are stored in a central repository, for access by those who subsequently become interested in the directions or the particular destination. A useful embodiment of the invention is directed to a method for providing travel directions over a selected network, wherein a request for directions regarding a specified destination is sent from a requester to a Directions Provider. The Provider retrieves the requested directions and furnishes them to the requester. The method further includes generating annotations associated with the furnished directions in accordance with a set of rules resulting from one or more decisions made by the requester, and sending the annotations to the requester.Type: ApplicationFiled: October 7, 2008Publication date: February 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Emily Jane Ratliff, Kimberly DaShawn Simon
-
Patent number: 7464374Abstract: A system and method in a data processing system for error checking and resolving failed input/output open calls. A configuration mechanism configures the options, such as the information stored in databases, details of how each error check is performed, and what actions should be taken when improper error checking occurs. Based on data stored in databases, such as an I/O calls database, a rules with syntax database, and an usage calls database, an error check of a failed input/output open call is performed.Type: GrantFiled: May 26, 2005Date of Patent: December 9, 2008Assignee: International Business Machines CorporationInventors: Joy Marie Latten, Kimberly DaShawn Simon
-
Patent number: 7450005Abstract: An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.Type: GrantFiled: January 18, 2006Date of Patent: November 11, 2008Assignee: International Business Machines CorporationInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, David Robert Safford, Kimberly DaShawn Simon
-
Patent number: 7451045Abstract: A method and system is provided for providing and storing annotations that pertain to travel directions to a particular destination, the annotations generally including ratings of the accuracy of the directions and errors observed in the directions by prior users. Annotations submitted by users are stored in a central repository, for access by those who subsequently become interested in the directions or the particular destination. A useful embodiment of the invention is directed to a method for providing travel directions over a selected network, wherein a request for directions regarding a specified destination is sent from a requester to a Directions Provider. The Provider retrieves the requested directions and furnishes them to the requestor. The method further includes generating annotations associated with the furnished directions in accordance with a set of rules resulting from one or more decisions made by the requester, and sending the annotations to the requester.Type: GrantFiled: January 17, 2006Date of Patent: November 11, 2008Assignee: International Business Machines CorporationInventors: Emily Jane Ratliff, Kimberly DaShawn Simon
-
Publication number: 20080183971Abstract: A memory coherence protocol is provided for using cache line access frequencies to dynamically switch from an invalidation protocol to an update protocol. A frequency access count (FAC) is associated with each line of data in a memory area, such as each cache line in a private cache corresponding to a CPU in a multiprocessor system. Each time the line is accessed, the FAC associated with the line is incremented. When the CPU, or process, receives an invalidate signal for a particular line, the CPU checks the FAC for the line. If the CPU, or process, determines that it is a frequent accessor of a particular line that has been modified by another CPU, or process, the CPU sends an update request in order to obtain the modified data. If the CPU is not a frequent accessor of a line that has been modified, the line is simply invalidated in the CPU's memory area.Type: ApplicationFiled: March 31, 2008Publication date: July 31, 2008Inventors: Vaijayanthiamala K. Anand, Sandra K. Johnson, Kimberly DaShawn Simon
-
Publication number: 20080127180Abstract: Computer implemented method, system and computer usable program code for porting an application intended for a first operating system distribution to a second operating system distribution in a data processing system. A computer implemented method for porting an application intended for a first operating system distribution to a second operating system distribution in a data processing system includes identifying a problem when the application is run on the second operating system distribution. A determination is made if a known solution to the identified problem is available. If a known solution to the identified problem is not available, a search is conducted to identify a solution to the problem. At least one modification to the second operating system distribution is created according to the identified solution, wherein the application is enabled to run on the second operating system distribution.Type: ApplicationFiled: July 31, 2006Publication date: May 29, 2008Inventors: James John Glogowski, Christina Marie Hernandez, Loulwa F. Salem, Kimberly DaShawn Simon
-
Patent number: 7376795Abstract: A memory coherence protocol is provided for using cache line access frequencies to dynamically switch from an invalidation protocol to an update protocol. A frequency access count (FAC) is associated with each line of data in a memory area, such as each cache line in a private cache corresponding to a CPU in a multiprocessor system. Each time the line is accessed, the FAC associated with the line is incremented. When the CPU, or process, receives an invalidate signal for a particular line, the CPU checks the FAC for the line. If the CPU, or process, determines that it is a frequent accessor of a particular line that has been modified by another CPU, or process, the CPU sends an update request in order to obtain the modified data. If the CPU is not a frequent accessor of a line that has been modified, the line is simply invalidated in the CPU's memory area.Type: GrantFiled: October 27, 2005Date of Patent: May 20, 2008Assignee: International Business Machines CorporationInventors: Vaijayanthiamala K. Anand, Sandra K. Johnson, Kimberly DaShawn Simon
-
Patent number: 6917953Abstract: A system and method for verifying database security across multiple platforms is presented. Servers are queried to obtain a user id access list of a particular database, directory, or file. The user id access list is compared with a validated access list. A report file is generated that includes user id's that have access to a database, directory, or file but do not have proper permission. The report file includes a submission of how to correct each security violation.Type: GrantFiled: December 17, 2001Date of Patent: July 12, 2005Assignee: International Business Machines CorporationInventors: Kimberly DaShawn Simon, Jeffrey Wijono
-
Publication number: 20030115446Abstract: A system and method for verifying database security across multiple platforms is presented. Servers are queried to obtain a user id access list of a particular database, directory, or file. The user id access list is compared with a validated access list. A report file is generated that includes user id's that have access to a database, directory, or file but do not have proper permission. The report file includes a submission of how to correct each security violation.Type: ApplicationFiled: December 17, 2001Publication date: June 19, 2003Applicant: International Business Machines CorporationInventors: Kimberly DaShawn Simon, Jeffery Wijono