Patents by Inventor Scott J. Broussard
Scott J. Broussard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120109987Abstract: Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Scott J. Broussard, Eduardo N. Spring, Shunguo Yan
-
Publication number: 20110282894Abstract: A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep).Type: ApplicationFiled: May 13, 2010Publication date: November 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Steven D. Clay, Eduardo N. Spring, Shunguo Yan
-
Patent number: 8044931Abstract: A presentation authoring tool is used to create presentation data for later projection, to determine a recommended font size for the created presentation data displayed on a display screen of a computer executing the presentation authoring tool. The user interface presents a display screen for receiving input of an expected viewing distance for the later projection of the presentation. The recommended font is determined based upon the expected viewing distance of the later projection having a projected font size viewable by a person, having a certain vision capability, at the expected viewing distance. The expected viewing distance may be a maximum viewing distance or a room depth of a room in which the later projection takes place.Type: GrantFiled: July 29, 2008Date of Patent: October 25, 2011Assignee: International Business Machines CorporationInventor: Scott J. Broussard
-
Patent number: 7926102Abstract: A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.Type: GrantFiled: January 20, 2006Date of Patent: April 12, 2011Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Tony C. Kwong, Jr., Eduardo N. Spring, Anthony W. Wrobel, Jr.
-
Patent number: 7925661Abstract: A method, system, apparatus, and computer program product are presented for a meta-archive information server that provides a set of operations or services for obtaining information from a meta-archive; these operations may include dynamic indexing, searching, comparing, or other operations. A meta-archive is a set of one or more archive files that are logically grouped in (or otherwise associated with) a container object, e.g., a file system folder, a directory, or another archive file. By allowing a user to derive sets of information from an entire meta-archive, a user can maintain more files within archives, thereby reducing file system disorganization. The meta-archive information server can be easily run over a specific meta-archive when necessary, thereby generating information dynamically, even if the archive files within a meta-archive change over time.Type: GrantFiled: June 27, 2002Date of Patent: April 12, 2011Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Ying Liu, Eduardo N. Spring
-
Patent number: 7886312Abstract: A computer program product having code for invoking remote objects in a data processing system including generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.Type: GrantFiled: November 27, 2008Date of Patent: February 8, 2011Assignee: International Business Machines CorporationInventors: Scott J Broussard, Ying Liu, Eduardo N Spring
-
Publication number: 20100293537Abstract: A computer implemented method, a tangible storage medium, and a data processing system build a runtime environment of a system. A profile manager receives a service request containing a profile identifier. The profile identifier specifies a required version of at least one software component. The profile manager identifies a complete installation of the software component, and at least one delta file. The profile manager dynamically constructs a classpath for the required version by preferentially utilizing files from the at least one delta file followed by files from the complete installation. The runtime environment is then built utilizing the classpath.Type: ApplicationFiled: May 13, 2009Publication date: November 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Pralhad Dhruvaraj Galagali, Dhandapani Shanmugam
-
Patent number: 7827217Abstract: A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.Type: GrantFiled: April 6, 2009Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Ying Liu, Eduardo N. Spring
-
Patent number: 7580863Abstract: Operating a publicly accessible purchasing system including receiving, on a receipt date, from a purchaser, in a publicly accessible purchasing system, a deferred purchase request (“DPR”) for an item to be purchased; identifying a vendor; and issuing, in dependence upon the DPR, a purchase order to the vendor on a date subsequent to the receipt date. In some embodiments, a DPR includes an item identification for the item to be purchased, and identifying a vendor further comprises identifying a vendor in dependence upon the item identification. Some embodiments includes selecting a vendor in dependence upon vendor item prices. Some embodiments include selecting a vendor having a lowest vendor item price for the item to be purchased. Embodiments include selecting vendors in dependence upon purchasers' indicated maximum prices, in independence upon information in purchase orders previously issued to vendors, and in dependence upon proximity of a vendor to a purchaser.Type: GrantFiled: July 25, 2002Date of Patent: August 25, 2009Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Joseph Herbert McIntyre, Eduardo N. Spring
-
Patent number: 7571389Abstract: A system and method are disclosed whereby two components within the Swing application program interface (API), JTextField and JPasswordField, are used to emulate the behavior of the TextField component in the abstract windowing toolkit (AWT). This allows legacy Java applications, based on the AWT, to be migrated to the platform-independent Swing API, without modification. In the AWT, a single TextField component could be used for ordinary text entry, as well as for password protected text entry. In the latter case, a prescribed echo character would be displayed as text was entered, to avoid displaying privileged information. According to the system and method disclosed herein, a JPasswordField component may be substituted for a JTextField component, or vice-versa, depending on whether an echo character has been specified. This substitution is performed at runtime, using an enhanced version of the Swing API, as disclosed herein. The enhanced version of Swing is referred to herein as AWTSwing.Type: GrantFiled: May 31, 2001Date of Patent: August 4, 2009Assignee: International Business Machines CorporationInventor: Scott J. Broussard
-
Patent number: 7571388Abstract: A system and method are disclosed for fast text drawing in an enhanced version of the Swing application program interface for Java applications. According to the system and method, two lightweight component peers, JTextFieldPeer and JfastLabelPeer, are created. These peers allow the Swing components, JTextField and JLabel, to define the look and feel of the TextField and Label in the graphical user interface for the application; however, they are not allowed to draw the text. Instead, special fast text drawing code within the peers themselves is used to draw the text. Once the text has been initially drawn, editing functions are handled by the Swing components, as is normal. Furthermore, the special fast text drawing routines are assigned a low event priority, making it possible for text to be updated even after it has been buffered and is waiting to be drawn. These features significantly accelerate text rendering. The enhanced version of Swing is referred to herein as AWTSwing.Type: GrantFiled: May 31, 2001Date of Patent: August 4, 2009Assignee: International Business Machines CorporationInventor: Scott J. Broussard
-
Publication number: 20090193414Abstract: A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.Type: ApplicationFiled: April 6, 2009Publication date: July 30, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott J. Broussard, Ying Liu, Eduardo N. Spring
-
Patent number: 7562306Abstract: A system and method are disclosed whereby a list-based control (e.g., a Listbox or Choice control) in a graphical user interface may share a single copy of a list with the peer component of the control in the application program interface (API) used to display the control. This overcomes a problem in legacy Java applications, based on the abstract windowing toolkit API, wherein the peer component creates a copy of the list when the corresponding list-based control is displayed. In contrast, peer components within the Swing API reference the original version of the list associated with the control, avoiding this redundancy. According to the system and method disclosed herein, an enhanced version of Swing can be used with legacy application programs, allowing them to benefit from this feature of Swing. No modification of the legacy code is necessary. This extension to Swing is referred to herein as AWTSwing.Type: GrantFiled: May 31, 2001Date of Patent: July 14, 2009Assignee: International Business Machines CorporationInventor: Scott J. Broussard
-
Patent number: 7526515Abstract: A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.Type: GrantFiled: January 21, 2004Date of Patent: April 28, 2009Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Ying Liu, Eduardo N. Spring
-
Publication number: 20090083769Abstract: A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.Type: ApplicationFiled: November 27, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SCOTT J. BROUSSARD, YING LIU, EDUARDO N. SPRING
-
Patent number: 7496932Abstract: A method for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, information contained in the second serialized byte stream is used to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.Type: GrantFiled: January 12, 2004Date of Patent: February 24, 2009Assignee: International Business Machines CorporationInventors: Scott J. Broussard, Ying Liu, Eduardo N. Spring
-
Patent number: 7496615Abstract: An analysis tool for specifically identifying the cause and location of critical memory leaks within a large software system is provided. The analysis tool transparently adds multiple processing threads that collaborate to identify sources of potential memory leaks in the software being analyzed. These threads provide notifications of object classes executing in the software that have had excessive instance counts or have exceeded the average lifetime of an object. A stack walkback is performed on objects being monitored as an out-of-memory condition approaches and while there is still sufficient memory available to unwind and store the stack walkback. By saving the stack walkbacks just prior to the out-of-memory failure, the analysis tool operator is thereby provided sufficient information to make a final determination of objects that are possible candidates for memory leaks and subsequently modify the software to reduce or eliminate the memory leaks.Type: GrantFiled: March 11, 2004Date of Patent: February 24, 2009Assignee: International Business Machines CorporationInventor: Scott J. Broussard
-
Publication number: 20090015598Abstract: A presentation authoring tool is used to create presentation data for later projection, to determine a recommended font size for the created presentation data displayed on a display screen of a computer executing the presentation authoring tool. The user interface presents a display screen for receiving input of an expected viewing distance for the later projection of the presentation. The recommended font is determined based upon the expected viewing distance of the later projection having a projected font size viewable by a person, having a certain vision capability, at the expected viewing distance. The expected viewing distance may be a maximum viewing distance or a room depth of a room in which the later projection takes place.Type: ApplicationFiled: July 29, 2008Publication date: January 15, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Scott J. Broussard
-
Publication number: 20080273711Abstract: A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may he situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.Type: ApplicationFiled: May 1, 2007Publication date: November 6, 2008Inventors: Scott J. Broussard, Ying Liu, Ann M. Robinson, Eduardo N. Spring
-
Publication number: 20080235760Abstract: A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages.Type: ApplicationFiled: May 29, 2008Publication date: September 25, 2008Applicant: International Business Machines CorporationInventors: Scott J. Broussard, Tony C. Kwong, Eduardo N. Spring, Anthony W. Wrobel