Patents by Inventor Robert R. Friedlander

Robert R. Friedlander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9697240
    Abstract: A method, system, and/or computer program product associates new contextual state information about a changed data structure with a beneficial target data. Event data, which describes an event that modifies a data structure, is incorporated into the data structure to create a changed data structure state. New contextual state information, which describes the changed data structure state, is generated and transmitted to multiple beneficial target data stores, wherein applying the new contextual state information to a particular beneficial target data affects an activity that utilizes the particular beneficial target data.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Harold L. Ossher, David M. Ungar
  • Publication number: 20170147295
    Abstract: A processor-implemented method, system, and/or computer program product generates and implements intuitively comfortable frames of task appropriate frames of reference for multiple dimensions of context constraints for related sets of objects within an integrated development environment (IDE). One or more processors identify a hierarchical set of context constraints for an object, and depict the hierarchical set of context constraints for the object on an IDE using a visual metaphor selected by a user. The processor(s) receive a zoom-in input for a first context constraint in the hierarchical set of context constraints, and place the IDE in mention mode, such that use of the hierarchical set of context constraints against the object is disabled. In response to the IDE being placed in mention mode, the processor(s) display detail of the first context constraint on the IDE, and receive changes to the first context constraint to create a modified first context constraint.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Robert R. Friedlander, JOHN K. GERKEN, III, JAMES R. KRAEMER, DAVID M. UNGAR
  • Publication number: 20170147254
    Abstract: A method, system, and/or computer program product stores and retrieves payload data using a ternary content addressed memory (TCAM) hybrid memory. TCAM data is transmitted to a context masking device. The TCAM data identifies a type of payload data, and the context masking device masks the TCAM data with a context mask to create a masked TCAM data. One or more processors append the masked TCAM to payload data to create multiple stored units of TCAM-identified payload data in a location addressable store (LAS). The processor(s) receive a request for data. The request includes a masked request TCAM data that identifies a content and context of requested data. An exclusive OR (XOR) chip identifies relevant payload data within the LAS that are within a predefined Hamming distance of the masked request TCAM data. The processor(s) return the relevant payload data within the LAS to the requester.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: SAMUEL S. ADAMS, SUPARNA BHATTACHARYA, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER
  • Patent number: 9646271
    Abstract: A computer implemented method, program product, and/or system allocate human resources to a cohort. At least one attribute held by each member of a group of human resources is identified. A request is received, from a planned cohort, for multiple human resources that collectively possess a set of predefined attributes, wherein no single human resource possesses all of the predefined attributes. The set of human resources that satisfies the request is identified and assigned to the planned cohort.
    Type: Grant
    Filed: August 6, 2010
    Date of Patent: May 9, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, German S. Goldszmidt, James R. Kraemer, Robin Lougee, Kirill M. Osipov
  • Publication number: 20170111376
    Abstract: Methods and systems for event detection include defining a plurality of conditions that represent one or more synthetic events. Data from a plurality of data sources is aggregated across a period of time, multiple attack surfaces, and geographically distinct locations. The aggregated data is matched to the conditions to determine whether a synthetic event has occurred. A response to the synthetic event is formed to resist an attack.
    Type: Application
    Filed: October 20, 2015
    Publication date: April 20, 2017
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb Linton, Christopher M. Poulin
  • Patent number: 9619468
    Abstract: A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document that contains multiple instances of the non-contextual data object. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with a data store in a data structure that contains heterogeneous data stores that hold data of different formats.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: April 11, 2017
    Assignee: International Business Machines Coporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9619580
    Abstract: A processor-implemented method, system, and/or computer program product generates and utilizes synthetic context-based objects. A non-contextual data object is associated with a context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A request for a data store that is associated with the synthetic context-based object results in the return of at least one data store that is associated with the synthetic context-based object.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: April 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer
  • Publication number: 20170092358
    Abstract: A content addressable memory system, method and computer program product is described. The memory system comprises a location addressable store having data identified by location and multiple levels of content addressable stores each holding ternary content words. The content words are associated with references to data in the location addressable store and the content words containing at least one next entry bit for sorting content words in a physical ordered sequence to create content ordered memory. The content store levels might be implemented using different technologies that have different performance, capacity, and cost attributes. The memory system includes a content based cache for improved performance and a content addressable memory management unit for managing memory access operations and virtual memory addressing.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Inventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
  • Publication number: 20170091344
    Abstract: A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Samuel Scott ADAMS, Suparna BHATTACHARYA, Robert R. FRIEDLANDER, James R. KRAEMER
  • Publication number: 20170093853
    Abstract: A computer-implemented method, system, and/or computer program product protects access to hardware devices through use of a secure processor. A security computer receives a request from a requesting computer for access to a hardware device on a network. A secure processor within the security computer encrypts the request to generate an encrypted request, which is generated within a core of the secure processor. The secure processor protects a secure application that is used to process the request from other software on the secure processor. The security computer transmits the encrypted request to the hardware device, and then receives an encrypted acknowledgement of the encrypted request from a processor associated with the hardware device. The security computer then creates a communication session between the requesting computer and the hardware device.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: RICHARD H. BOIVIE, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, JEB R. LINTON
  • Publication number: 20170093804
    Abstract: A computer-implemented method, system, and/or computer program product protects access to resources through use of a secure processor. A resource server receives an encrypted request from a requesting computer for access to a requested resource within the resource server. The requested resource is physically within an isolation area in the resource server that is initially communicatively protected from a network that connects the requesting computer to the resource server. The resource server establishes a communication session between a first secure processor in the resource server and a second processor in the requesting computer to provide secure communication between the requesting computer and the requested resource.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: RICHARD H. BOIVIE, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, JEB R. LINTON
  • Publication number: 20170091639
    Abstract: Automatically create abstractions of large sets of data and then probabilistic inferences based on the abstractions. The probabilistic inference is derived from the logical hierarchy using Bayesian statistics to infer a probabilistic event based upon a characteristic of the data in a hierarchy of synthetic events. The logical hierarchy of a set of a plurality of synthetic events is related by at least one characteristic of data is built by accessing a first set of data. The first set of data is organized based on a first characteristic. A second set of data different than the first set of data is accessed. A second set of data based is organized based on a second characteristic. The first characteristic and the second characteristic are processed to generate a synthetic event. The synthetic event is a third set of data representing a result of a mathematical computation defined by an operation S(p1)==>F(p2).
    Type: Application
    Filed: September 28, 2015
    Publication date: March 30, 2017
    Inventors: Samuel Scott ADAMS, Robert R. FRIEDLANDER, James R. KRAEMER, Kelly Grant LEE
  • Patent number: 9607048
    Abstract: A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document, which contains multiple instances of the non-contextual data object, according to a profile of a particular user. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with a data store in a data structure that contains heterogeneous data stores having different formats.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20170083816
    Abstract: Generating synthetic emotional cognitive states based on generating synthetic events. The synthetic event is based on accessing a first set of data measurements from physical sensors related to a user. The data measurements are processed to generate one or more synthetic events. Each of the synthetic events comprise a second set of data representing a result of a mathematical computation defined by an operation S(p1)==>F(p2). S is the first set of one or more data measurements with probability p1. F is an inferred event with probability p2, and each of the synthetic events is a particular set of data that represents, encodes, or records at least one of a thing or happening. The synthetic events are processed to denote one or more synthetic emotional cognitive states of a user has been reached. The synthetic emotional cognitive states comprise a third set of data representing a result of a mathematical computation defined by an operation S?(p1?)==>F?(p2?).
    Type: Application
    Filed: September 23, 2015
    Publication date: March 23, 2017
    Inventors: Robert R. FRIEDLANDER, James R. KRAEMER
  • Publication number: 20170063785
    Abstract: Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.
    Type: Application
    Filed: June 26, 2015
    Publication date: March 2, 2017
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb Linton
  • Patent number: 9560052
    Abstract: A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9553877
    Abstract: One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. The processor(s) create a virtual machine that controls access to a particular requisite resource by a particular disparate component, and install the virtual machine within at least one of the different communication pathways to control access to the particular requisite resource by the particular disparate component. The processor(s) transmit a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways, and adjust a quantity of virtual machines between the computer application and the particular requisite resource according to a threat level for the particular disparate component.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: January 24, 2017
    Assignee: International Business Machines Corporation
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160381033
    Abstract: A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.
    Type: Application
    Filed: July 7, 2016
    Publication date: December 29, 2016
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160381028
    Abstract: One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. The processor(s) create a virtual machine that controls access to a particular requisite resource by a particular disparate component, and install the virtual machine within at least one of the different communication pathways to control access to the particular requisite resource by the particular disparate component. The processor(s) transmit a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways, and adjust a quantity of virtual machines between the computer application and the particular requisite resource according to a threat level for the particular disparate component.
    Type: Application
    Filed: July 7, 2016
    Publication date: December 29, 2016
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9530112
    Abstract: A processor-implemented method, system, and/or computer program product identifies a cause of a level of success in multiple projects from a set of past projects. Multiple artifacts describe conditions associated with each project from a set of past projects, where a cause for a level of success in the past projects is initially unknown. Logic identifies a set of common artifacts in multiple projects from the set of past projects, where the set of common artifacts describes common conditions that are common to all of the multiple projects. Additional logic identifies a level of success experienced by each of the multiple projects. In response to a particular set of projects having a same level of success, common conditions identified by the set of common artifacts are identified as the cause for the same level of success experienced by all of the projects in the particular set of projects.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: December 27, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Robert R. Friedlander, James R. Kraemer, Elizabeth V. Woodward, Shunguo Yan