Patents by Inventor Thomas H. Gnech

Thomas H. Gnech has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160277317
    Abstract: Predicting future utilization of a resource. The predicting future utilization of a resource may include receiving inquiries for a potential future utilization of the resource for different future points in time, recording time-based patterns of the received inquiries, recording a historic actual utilization value of the resource, and determining a future utilization of the resource using the recorded time-based patterns of the received inquiries, the recorded historic actual utilization value of the resource and a current inquiry pattern of the resource.
    Type: Application
    Filed: March 20, 2015
    Publication date: September 22, 2016
    Inventors: Petra Sabine Buehrer, Thomas H. Gnech, Joachim Rese, Holger J. Scheller
  • Publication number: 20160179827
    Abstract: In an approach for calculating a probability of a consistency violation of a transaction in a database management system, a processor receives a plurality of transactions within a predetermined time period. A processor identifies a first pattern in a first transaction of the plurality of transactions based on at least an isolation level of the transaction. A processor identifies a second pattern, wherein the second pattern is the cooperation between the first transaction and the second transaction. A processor determines that the first pattern of the first transaction substantially matches a preexisting pattern, wherein the preexisting pattern corresponds to values for a mathematical model for estimating a percentage of transactions in violation of consistency criteria. A processor extracts values from the first transaction based on the determined preexisting pattern. A processor calculates the mathematical model using the values from the first transaction and the values from the preexisting pattern.
    Type: Application
    Filed: December 19, 2014
    Publication date: June 23, 2016
    Inventors: Thomas H. Gnech, Steffen Koenig, Philipp A. Tölle
  • Patent number: 9250886
    Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: February 2, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Regina Illner, Steffen Koenig, Oliver Petrik
  • Publication number: 20150278303
    Abstract: One or more processors apply rules to a first query to generate a modified query such that processing of the modified query is improved for a first set of processing conditions. One or more processors measure a degree of latency experienced during processing of the modified query under a second set of processing conditions. One or more processors generate other rules to be applied to queries based, at least in part, on the measured degree of latency.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arnold Beilmann, Thomas H. Gnech, Eric R. Kass, Steffen Koenig, Oliver Petrik
  • Publication number: 20150278305
    Abstract: One or more processors apply rules to a first query to generate a modified query such that processing of the modified query is optimized for a first set of processing conditions. One or more processors measure a degree of latency experienced during processing of the modified query under a second set of processing conditions. One or more processors generate other rules to be applied to queries based, at least in part, on the measured degree of latency.
    Type: Application
    Filed: June 18, 2014
    Publication date: October 1, 2015
    Inventors: Arnold Beilmann, Thomas H. Gnech, Eric R. Kass, Steffen Koenig, Oliver Petrik
  • Publication number: 20150248383
    Abstract: In an approach for optimizing read/write access to a document object model in a web browser, one or more computer processors detect one or more accesses to a first data structure of a document object model. Based on the detected one or more accesses, the one or more computer processors determine whether the first data structure is a highly dynamic part of the document object model. Responsive to determining the first data structure is a highly dynamic part of the document object model, the one or more computer processors trigger a conversion of the first data structure to an access optimized data structure. The one or more computer processors convert the first data structure to an access optimized data structure.
    Type: Application
    Filed: March 3, 2014
    Publication date: September 3, 2015
    Applicant: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Jochen Roehrig
  • Publication number: 20150248499
    Abstract: In an approach for optimizing read/write access to a document object model in a web browser, one or more computer processors detect one or more accesses to a first data structure of a document object model. Based on the detected one or more accesses, the one or more computer processors determine whether the first data structure is a highly dynamic part of the document object model. Responsive to determining the first data structure is a highly dynamic part of the document object model, the one or more computer processors trigger a conversion of the first data structure to an access optimized data structure. The one or more computer processors convert the first data structure to an access optimized data structure.
    Type: Application
    Filed: June 11, 2014
    Publication date: September 3, 2015
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Jochen Roehrig
  • Patent number: 9112864
    Abstract: User access is controlled through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. An Identifier of a user access request of the unauthorized user is checked in the exception list. A One-Time Identifier is created. The One-Time Identifier is assigned to the electronic data resource according to the allowed property relation. The requested resource is delivered to the unauthorized user by using the assigned One-Time Identifier.
    Type: Grant
    Filed: December 26, 2012
    Date of Patent: August 18, 2015
    Assignee: International Business Machines Corporation
    Inventors: Thomas H Gnech, Steffen Koenig, Enrico Mayer
  • Patent number: 9112863
    Abstract: User access for a requested resource is controlled through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. An Identifier of a user access request of the unauthorized user is checked in the exception list. A One-Time Identifier is created. The One-Time Identifier is assigned according to the allowed property relation. The requested resource is delivered to the unauthorized user by using the assigned One-Time Identifier.
    Type: Grant
    Filed: December 3, 2010
    Date of Patent: August 18, 2015
    Assignee: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Steffen Koenig, Enrico Mayer
  • Patent number: 9037467
    Abstract: A method of complementing a spoken text. The method including receiving text data representative of a natural language text, receiving effect control data including at least one effect control record, each effect control record being associated with a respective location in the natural language text, receiving a stream of audio data, analyzing the stream of audio data for natural language utterances that correlate with the natural language text at a respective one of the locations, and outputting, in response to a determination by the analyzing that a natural language utterance in the stream of audio data correlates with a respective one of the locations, at least one effect control signal based on the effect control record associated with the respective location.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: May 19, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik
  • Patent number: 9003323
    Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: April 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Regina Illner, Joachim Rese
  • Patent number: 8959344
    Abstract: A method is provided for handling defined areas within an electronic document, which includes: marking at least one area in an electronic source document as indecomposable area which can be processed as a whole content only; generating signature data for the indecomposable area; assigning the signature data to the indecomposable area to create an indecomposable area object; storing the indecomposable object; encrypting and transmitting the indecomposable area object in response to a request of an enhanced content reader application, where the enhanced content reader application decrypts the indecomposable area object and processes the indecomposable area in an electronic target document; and generating and transmitting a protected version of the indecomposable area in response to a request of a regular content reader application, where the regular content reader application outputs the protected version of the indecomposable area in an electronic target document.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: February 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Steffen Koenig, Enrico Mayer, Oliver Petrik
  • Patent number: 8789152
    Abstract: A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application.
    Type: Grant
    Filed: November 19, 2010
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Rainer Himmelsbach, Oliver Petrik, Heike Schmidt
  • Patent number: 8782148
    Abstract: A computer implemented method and system is provided for managing emails within an email system or email box. At the creation of a new email at the email system, an identification of its content (CID) is calculated, the result of that calculation being stored in a header of that email to be forwarded together with the new email. It is checked at the email system when receiving an email to determine whether the email includes a CID identifying the content of that email. If this is not the case, then a CID of the content of the received email is calculated, the resulting CID being stored in the header of that email together with the email. A comparison between the received email and the already stored emails at the email system is performed by comparing the corresponding CID of the received email with the CID of the stored emails. The email system is reorganized by superseding duplicate emails having the same CID.
    Type: Grant
    Filed: October 22, 2010
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Joachim Rese
  • Publication number: 20140164335
    Abstract: A computer-implemented process provides data protection of an in-memory database. The method may include triggering the securing of data of the in-memory database to a first savepoint; securing data of the in-memory database to the first savepoint; and backing up the data of the first savepoint on a persistent storage medium. The data of the first savepoint may be stored on a first persistent medium and the backup data of the first savepoint are stored on a second persistent storage medium. The availability of two different savepoint data on physically different storage media increases the probability of having always savepoint data ready for recovery purposes dramatically. By using different storage media, even in cases of a hardware damage savepoint data will be available.
    Type: Application
    Filed: November 26, 2013
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Joerg Mueller, Thomas Prause
  • Publication number: 20140129922
    Abstract: Ensuring integrity of a displayed web page in a client-server infrastructure including defining an enhancement for a web page markup for an enhanced web page content including a provided web page content and at least one identified provider added content as prerequisite content for the provided content, implementing a secure web browser document object model (DOM) enhancement and an enhanced document object model (DOM) processing embedding a user-requested content and the at least one corresponding prerequisite content based on the web page markup enhancement so that the requested content and the at least one prerequisite content of the enhanced web page content of an enhanced web page are secured and displayed as entity.
    Type: Application
    Filed: October 23, 2013
    Publication date: May 8, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik
  • Publication number: 20140101109
    Abstract: Backup management of software environments in a distributed network environment includes: Creating a platform specific software environment according to a predefined software environment definition by a user in the network environment; automatically creating a generalized backup of the software environment by extracting platform independent data contents and platform specific transformation rules; automatically calculating enhanced meta data describing the generalized backup; assigning the enhanced metadata with the predefined software environment definition; registering the generalized backup with the enhanced metadata in a backup storage accessible by a plurality of distributed users connected via said network environment, creating a software environment according to a predefined software environment definition by automatically checking the backup storage for an available generalized backup by means of the predefined software environment definition.
    Type: Application
    Filed: October 4, 2013
    Publication date: April 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Petra Wagner
  • Publication number: 20130036306
    Abstract: A method is provided for handling defined areas within an electronic document, which includes: marking at least one area in an electronic source document as indecomposable area which can be processed as a whole content only; generating signature data for the indecomposable area; assigning the signature data to the indecomposable area to create an indecomposable area object; storing the indecomposable object; encrypting and transmitting the indecomposable area object in response to a request of an enhanced content reader application, where the enhanced content reader application decrypts the indecomposable area object and processes the indecomposable area in an electronic target document; and generating and transmitting a protected version of the indecomposable area in response to a request of a regular content reader application, where the regular content reader application outputs the protected version of the indecomposable area in an electronic target document.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 7, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. GNECH, Steffen KOENIG, Enrico MAYER, Oliver PETRIK
  • Publication number: 20130007244
    Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.
    Type: Application
    Filed: June 20, 2012
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. GNECH, Regina ILLNER, Steffen KOENIG, Oliver PETRIK
  • Publication number: 20120297333
    Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.
    Type: Application
    Filed: April 10, 2012
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. GNECH, Regina ILLNER, Joachim RESE