Patents by Inventor Soobaek Jang
Soobaek Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130346243Abstract: A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations.Type: ApplicationFiled: June 22, 2012Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 8612407Abstract: An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.Type: GrantFiled: July 18, 2012Date of Patent: December 17, 2013Assignee: International Business Machines CorporationInventors: Albert A. DeLucca, Lisa Seacat DeLuca, Soobaek Jang, Troy Michael Volin
-
Patent number: 8605882Abstract: In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat.Type: GrantFiled: May 18, 2012Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20130318447Abstract: A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface.Type: ApplicationFiled: May 24, 2012Publication date: November 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20130318520Abstract: Illustrative embodiments include a method, system, and computer program product for early configuration of an application in a deployment of an enterprise application. A section is located in an enterprise application deployment file of the enterprise application. The section includes configuration information of the application. The configuration information of the application is loaded before completing loading of the enterprise application deployment file such that the application is configurable without waiting for the loading of the enterprise application deployment file to complete. Loading the enterprise application deployment file is continued without waiting for a configuring of the application using the configuration information of the application that is loaded.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Applicant: International Business Machines CorporationInventors: KELLY ABUELSAAD, Kulvir Singh Bhogal, Lisa Seacat Deluca, Soobaek Jang
-
Patent number: 8595353Abstract: Systems, computer storage devices, and methods receive a request from a first user. The first user has at least one instance running within a cloud-computing environment. The systems, computer storage devices, and methods automatically analyze the first user instance to produce first user instance characteristics, and automatically analyze characteristics of other user instances running within the cloud-computing environment. Other users, who are different from the first user, operate the other user instances. The systems, computer storage devices, and methods automatically match the first user instance to instances of the other user instances by determining which of the other user instances have the same characteristics as the first user instance characteristics. The systems, computer storage devices, and methods automatically identify cloud-computing options selected by such other users that operate the matching instances that are related to the request.Type: GrantFiled: June 6, 2011Date of Patent: November 26, 2013Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20130311869Abstract: Group bookmarks are provided. A uniform resource locator (URL) is received and parsed to identify a URL domain, a parameter, and a first parameter value. Multiple bookmarks are examined to determine whether a pattern match is found for a bookmark including the URL domain and the parameter. The bookmark has a second parameter value. The first parameter value is stored with the bookmark as a group bookmark. The group bookmark includes: the URL domain, the parameter, and entries for the first parameter value and the second parameter value.Type: ApplicationFiled: May 15, 2012Publication date: November 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Soobaek Jang
-
Publication number: 20130311497Abstract: Group bookmarks are provided. A uniform resource locator (URL) is received and parsed to identify a URL domain, a parameter, and a first parameter value. Multiple bookmarks are examined to determine whether a pattern match is found for a bookmark including the URL domain and the parameter. The bookmark has a second parameter value. The first parameter value is stored with the bookmark as a group bookmark. The group bookmark includes: the URL domain, the parameter, and entries for the first parameter value and the second parameter value.Type: ApplicationFiled: July 17, 2012Publication date: November 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Soobaek Jang
-
Publication number: 20130308764Abstract: In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat.Type: ApplicationFiled: May 18, 2012Publication date: November 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20130304788Abstract: A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.Type: ApplicationFiled: May 11, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Brian D. Goodman, Soobaek Jang
-
Publication number: 20130275521Abstract: Implementing messaging client-based reminders includes monitoring, via a computer processor, a communication exchange for a communication session and determining an occurrence of an alarm event from contents of the communication exchange in response to the monitoring. Upon determining the occurrence of the alarm event, a reminder is generated and a timer is set indicating a time value corresponding to a time expression in the communication exchange. Upon expiration of the timer, the reminder is transmitted.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Soobaek Jang
-
Publication number: 20130275523Abstract: Implementing messaging client-based reminders includes monitoring, via a computer processor, a communication exchange for a communication session and determining an occurrence of an alarm event from contents of the communication exchange in response to the monitoring. Upon determining the occurrence of the alarm event, a reminder is generated and a timer is set indicating a time value corresponding to a time expression in the communication exchange. Upon expiration of the timer, the reminder is transmitted.Type: ApplicationFiled: August 1, 2012Publication date: October 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Soobaek Jang
-
Publication number: 20130254681Abstract: Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session.Type: ApplicationFiled: March 26, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20130254682Abstract: Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session.Type: ApplicationFiled: July 27, 2012Publication date: September 26, 2013Applicant: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20130251125Abstract: An embodiment of the invention is used with a conference calling system that includes a plurality of client phones, and a conference call center. Passcodes are entered into a list contained in a given client phone, wherein all listed passcodes are associated with a specified phone number that can be used to establish a connection between the given client phone and the conference call center. The specified phone number is used at the given client phone to access the passcode list. A passcode is selected from the list for transmission from the given client phone to the conference call center, over the phone connection established using the specified phone number. In response to receiving the selected passcode at the conference call center, the conference call center is operated to connect the given client phone into a conference call with one or more other client phones.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20130247022Abstract: Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested.Type: ApplicationFiled: March 13, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20130238713Abstract: In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate.Type: ApplicationFiled: March 6, 2012Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Kulvir Singh Bhogal, Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20130227525Abstract: A method for allowing selective delivery of changesets by environment includes selecting at least one value in software code of a software program; specifying at least one environment for the selected at least one value; compiling the software code in each specified at least one environment; delivering the software code to a central repository; determining how the specified at least one environment is defined; and choosing at least one environment to build against, thereby ensuring that only software code for the chosen environment is pulled from the central repository.Type: ApplicationFiled: February 28, 2012Publication date: August 29, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Soobaek Jang
-
Patent number: 8521825Abstract: A tool for preventing incorrect addressing of an electronic message. The tool analyzes incoming and outgoing electronic messages for indications that the user previously sent a message to a recipient mistakenly. The tool flags the recipient as potentially incorrect for future electronic messages. When selecting a recipient from a list, flagged recipient IDs display lower than other recipient IDs. The tool may require verification if a flagged recipient ID is selected.Type: GrantFiled: September 26, 2011Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventor: Soobaek Jang
-
Publication number: 20130218922Abstract: Embodiments of the present invention provide an approach for locating previously communicated electronic messages (e.g., emails, etc.). Specifically, the system will receive a request to locate/retrieve a previously communicated electronic message (“message”). The request can be issued by a sender or a recipient of the message. In any event, the request will include a set (one or more) of characteristics pertaining to the message such as a set of recipients thereof. One or more electronic messaging databases will then be searched based on the set of recipients and the message located. Once located, an alert will be sent to the requester and/or other message parties. The alert will indicate the message that was located. If the alert is validated (e.g., the message was the correct message), the message will be displayed.Type: ApplicationFiled: February 20, 2012Publication date: August 22, 2013Applicant: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Soobaek Jang