Patents by Inventor Thomas H. Gnech
Thomas H. Gnech has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160277317Abstract: Predicting future utilization of a resource. The predicting future utilization of a resource may include receiving inquiries for a potential future utilization of the resource for different future points in time, recording time-based patterns of the received inquiries, recording a historic actual utilization value of the resource, and determining a future utilization of the resource using the recorded time-based patterns of the received inquiries, the recorded historic actual utilization value of the resource and a current inquiry pattern of the resource.Type: ApplicationFiled: March 20, 2015Publication date: September 22, 2016Inventors: Petra Sabine Buehrer, Thomas H. Gnech, Joachim Rese, Holger J. Scheller
-
Publication number: 20160179827Abstract: In an approach for calculating a probability of a consistency violation of a transaction in a database management system, a processor receives a plurality of transactions within a predetermined time period. A processor identifies a first pattern in a first transaction of the plurality of transactions based on at least an isolation level of the transaction. A processor identifies a second pattern, wherein the second pattern is the cooperation between the first transaction and the second transaction. A processor determines that the first pattern of the first transaction substantially matches a preexisting pattern, wherein the preexisting pattern corresponds to values for a mathematical model for estimating a percentage of transactions in violation of consistency criteria. A processor extracts values from the first transaction based on the determined preexisting pattern. A processor calculates the mathematical model using the values from the first transaction and the values from the preexisting pattern.Type: ApplicationFiled: December 19, 2014Publication date: June 23, 2016Inventors: Thomas H. Gnech, Steffen Koenig, Philipp A. Tölle
-
Patent number: 9250886Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.Type: GrantFiled: June 20, 2012Date of Patent: February 2, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. Gnech, Regina Illner, Steffen Koenig, Oliver Petrik
-
Publication number: 20150278303Abstract: One or more processors apply rules to a first query to generate a modified query such that processing of the modified query is improved for a first set of processing conditions. One or more processors measure a degree of latency experienced during processing of the modified query under a second set of processing conditions. One or more processors generate other rules to be applied to queries based, at least in part, on the measured degree of latency.Type: ApplicationFiled: March 28, 2014Publication date: October 1, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arnold Beilmann, Thomas H. Gnech, Eric R. Kass, Steffen Koenig, Oliver Petrik
-
Publication number: 20150278305Abstract: One or more processors apply rules to a first query to generate a modified query such that processing of the modified query is optimized for a first set of processing conditions. One or more processors measure a degree of latency experienced during processing of the modified query under a second set of processing conditions. One or more processors generate other rules to be applied to queries based, at least in part, on the measured degree of latency.Type: ApplicationFiled: June 18, 2014Publication date: October 1, 2015Inventors: Arnold Beilmann, Thomas H. Gnech, Eric R. Kass, Steffen Koenig, Oliver Petrik
-
Publication number: 20150248383Abstract: In an approach for optimizing read/write access to a document object model in a web browser, one or more computer processors detect one or more accesses to a first data structure of a document object model. Based on the detected one or more accesses, the one or more computer processors determine whether the first data structure is a highly dynamic part of the document object model. Responsive to determining the first data structure is a highly dynamic part of the document object model, the one or more computer processors trigger a conversion of the first data structure to an access optimized data structure. The one or more computer processors convert the first data structure to an access optimized data structure.Type: ApplicationFiled: March 3, 2014Publication date: September 3, 2015Applicant: International Business Machines CorporationInventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Jochen Roehrig
-
Publication number: 20150248499Abstract: In an approach for optimizing read/write access to a document object model in a web browser, one or more computer processors detect one or more accesses to a first data structure of a document object model. Based on the detected one or more accesses, the one or more computer processors determine whether the first data structure is a highly dynamic part of the document object model. Responsive to determining the first data structure is a highly dynamic part of the document object model, the one or more computer processors trigger a conversion of the first data structure to an access optimized data structure. The one or more computer processors convert the first data structure to an access optimized data structure.Type: ApplicationFiled: June 11, 2014Publication date: September 3, 2015Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Jochen Roehrig
-
Patent number: 9112864Abstract: User access is controlled through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. An Identifier of a user access request of the unauthorized user is checked in the exception list. A One-Time Identifier is created. The One-Time Identifier is assigned to the electronic data resource according to the allowed property relation. The requested resource is delivered to the unauthorized user by using the assigned One-Time Identifier.Type: GrantFiled: December 26, 2012Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Thomas H Gnech, Steffen Koenig, Enrico Mayer
-
Patent number: 9112863Abstract: User access for a requested resource is controlled through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. An Identifier of a user access request of the unauthorized user is checked in the exception list. A One-Time Identifier is created. The One-Time Identifier is assigned according to the allowed property relation. The requested resource is delivered to the unauthorized user by using the assigned One-Time Identifier.Type: GrantFiled: December 3, 2010Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Steffen Koenig, Enrico Mayer
-
Patent number: 9037467Abstract: A method of complementing a spoken text. The method including receiving text data representative of a natural language text, receiving effect control data including at least one effect control record, each effect control record being associated with a respective location in the natural language text, receiving a stream of audio data, analyzing the stream of audio data for natural language utterances that correlate with the natural language text at a respective one of the locations, and outputting, in response to a determination by the analyzing that a natural language utterance in the stream of audio data correlates with a respective one of the locations, at least one effect control signal based on the effect control record associated with the respective location.Type: GrantFiled: December 18, 2012Date of Patent: May 19, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik
-
Patent number: 9003323Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.Type: GrantFiled: April 10, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Regina Illner, Joachim Rese
-
Patent number: 8959344Abstract: A method is provided for handling defined areas within an electronic document, which includes: marking at least one area in an electronic source document as indecomposable area which can be processed as a whole content only; generating signature data for the indecomposable area; assigning the signature data to the indecomposable area to create an indecomposable area object; storing the indecomposable object; encrypting and transmitting the indecomposable area object in response to a request of an enhanced content reader application, where the enhanced content reader application decrypts the indecomposable area object and processes the indecomposable area in an electronic target document; and generating and transmitting a protected version of the indecomposable area in response to a request of a regular content reader application, where the regular content reader application outputs the protected version of the indecomposable area in an electronic target document.Type: GrantFiled: August 1, 2012Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Steffen Koenig, Enrico Mayer, Oliver Petrik
-
Patent number: 8789152Abstract: A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application.Type: GrantFiled: November 19, 2010Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Rainer Himmelsbach, Oliver Petrik, Heike Schmidt
-
Patent number: 8782148Abstract: A computer implemented method and system is provided for managing emails within an email system or email box. At the creation of a new email at the email system, an identification of its content (CID) is calculated, the result of that calculation being stored in a header of that email to be forwarded together with the new email. It is checked at the email system when receiving an email to determine whether the email includes a CID identifying the content of that email. If this is not the case, then a CID of the content of the received email is calculated, the resulting CID being stored in the header of that email together with the email. A comparison between the received email and the already stored emails at the email system is performed by comparing the corresponding CID of the received email with the CID of the stored emails. The email system is reorganized by superseding duplicate emails having the same CID.Type: GrantFiled: October 22, 2010Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Joachim Rese
-
Publication number: 20140164335Abstract: A computer-implemented process provides data protection of an in-memory database. The method may include triggering the securing of data of the in-memory database to a first savepoint; securing data of the in-memory database to the first savepoint; and backing up the data of the first savepoint on a persistent storage medium. The data of the first savepoint may be stored on a first persistent medium and the backup data of the first savepoint are stored on a second persistent storage medium. The availability of two different savepoint data on physically different storage media increases the probability of having always savepoint data ready for recovery purposes dramatically. By using different storage media, even in cases of a hardware damage savepoint data will be available.Type: ApplicationFiled: November 26, 2013Publication date: June 12, 2014Applicant: International Business Machines CorporationInventors: Thomas H. Gnech, Joerg Mueller, Thomas Prause
-
Publication number: 20140129922Abstract: Ensuring integrity of a displayed web page in a client-server infrastructure including defining an enhancement for a web page markup for an enhanced web page content including a provided web page content and at least one identified provider added content as prerequisite content for the provided content, implementing a secure web browser document object model (DOM) enhancement and an enhanced document object model (DOM) processing embedding a user-requested content and the at least one corresponding prerequisite content based on the web page markup enhancement so that the requested content and the at least one prerequisite content of the enhanced web page content of an enhanced web page are secured and displayed as entity.Type: ApplicationFiled: October 23, 2013Publication date: May 8, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik
-
Publication number: 20140101109Abstract: Backup management of software environments in a distributed network environment includes: Creating a platform specific software environment according to a predefined software environment definition by a user in the network environment; automatically creating a generalized backup of the software environment by extracting platform independent data contents and platform specific transformation rules; automatically calculating enhanced meta data describing the generalized backup; assigning the enhanced metadata with the predefined software environment definition; registering the generalized backup with the enhanced metadata in a backup storage accessible by a plurality of distributed users connected via said network environment, creating a software environment according to a predefined software environment definition by automatically checking the backup storage for an available generalized backup by means of the predefined software environment definition.Type: ApplicationFiled: October 4, 2013Publication date: April 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Petra Wagner
-
Publication number: 20130036306Abstract: A method is provided for handling defined areas within an electronic document, which includes: marking at least one area in an electronic source document as indecomposable area which can be processed as a whole content only; generating signature data for the indecomposable area; assigning the signature data to the indecomposable area to create an indecomposable area object; storing the indecomposable object; encrypting and transmitting the indecomposable area object in response to a request of an enhanced content reader application, where the enhanced content reader application decrypts the indecomposable area object and processes the indecomposable area in an electronic target document; and generating and transmitting a protected version of the indecomposable area in response to a request of a regular content reader application, where the regular content reader application outputs the protected version of the indecomposable area in an electronic target document.Type: ApplicationFiled: August 1, 2012Publication date: February 7, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. GNECH, Steffen KOENIG, Enrico MAYER, Oliver PETRIK
-
Publication number: 20130007244Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.Type: ApplicationFiled: June 20, 2012Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. GNECH, Regina ILLNER, Steffen KOENIG, Oliver PETRIK
-
Publication number: 20120297333Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.Type: ApplicationFiled: April 10, 2012Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. GNECH, Regina ILLNER, Joachim RESE