Patents by Inventor Wenjian Qiao

Wenjian Qiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140082092
    Abstract: Some embodiments of the inventive subject matter may include a method for sharing one or more data fields from within a contact in a contact list on an electronic computing device. The method can include receiving first user input requesting retrieval of the contact in the contact list. The method can include retrieving the contact in response to the user input. The method can include determining that the contact contains data fields, wherein the data fields include contact information for the contact. The method can include presenting one or more graphical user interface (GUI) controls for selecting at least one of the data fields within the contact. The method can include receiving, via the one or more GUI controls, second user input indicating selection of one or more of the data fields. The method can include sharing the one or more data fields associated with the contact.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Darryl Adderly, Prasad Kashyap, Brian J. Murray, Wenjian Qiao
  • Patent number: 7519572
    Abstract: Systems and methods for efficiently obtaining a summary from and locating data in a log file allow a user to efficiently obtain summary information and locate specific data records even in large log files. The system includes a configuration program, a log writing program, and a log reading program. The configuration program allows the user to control the duration of monitoring and the frequency of summary record creation by the log writing program. The log writing program writes data records, summary records, and summary information to a log file in response to monitored events. The log reading program retrieves summary records and data records from the log file using summary information in response to user requests.
    Type: Grant
    Filed: February 15, 2005
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Joel Peter Meyer, William Augustus Parvin, Dean Merritt West, II, Wenjian Qiao
  • Patent number: 7269652
    Abstract: The invention described is a new and useful process for minimizing the overall rebate a provider disburses to customers when a service level agreement (SLA) breach occurs in a utility computing environment. Specifically, the process compares performance data and resource usage with the SLAs of the customers, and reallocates shared resources to those customers who represent a lesser penalty to the provider in the event of an SLA breach. The process determines which resources, used by customers representing the lesser penalty, are operating below peak capacity. The process then reallocates these under-utilized resources to those customers requiring additional resources to meet SLA thresholds. If all resources are operating at peak capacity, the process reallocates the resources to those customers whose SLAs represent a greater penalty in the event of an SLA breach as compared to those customers whose SLAs provide for a lesser penalty, thereby minimizing the total rebate due upon an SLA breach.
    Type: Grant
    Filed: October 18, 2004
    Date of Patent: September 11, 2007
    Assignee: International Business Machines Corporation
    Inventors: Yen-Fu Chen, Erik Alan Daughtrey, Hari Shankar, Wenjian Qiao
  • Publication number: 20060184498
    Abstract: Systems and methods for efficiently obtaining a summary from and locating data in a log file allow a user to efficiently obtain summary information and locate specific data records even in large log files. The system includes a configuration program, a log writing program, and a log reading program. The configuration program allows the user to control the duration of monitoring and the frequency of summary record creation by the log writing program. The log writing program writes data records, summary records, and summary information to a log file in response to monitored events. The log reading program retrieves summary records and data records from the log file using summary information in response to user requests.
    Type: Application
    Filed: February 15, 2005
    Publication date: August 17, 2006
    Inventors: Joel Meyer, William Parvin, Dean West II, Wenjian Qiao
  • Publication number: 20060168194
    Abstract: A method, apparatus and computer instructions are provided to improve the push/pull workload management model with intelligent routing to effectively collect data from systems that consist of dynamic sub-systems. The invention improves the push/pull model of the referenced invention with intelligent request routing to solve the above problem. An API is exposed in the workload manager enabling its request router to decline requests to route to idle sub-systems. This allows the monitoring agent to avoid sending a pull request to an idle sub-system. Each sub-system will push the data to the agent as it enters the idle state. The agent caches the data it receives from idle sub-systems and combines it with data it pulls from active and stopped sub-systems.
    Type: Application
    Filed: December 6, 2004
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: John Lake, Wenjian Qiao, Srinivasan Rangaswamy, Christopher Vignola
  • Publication number: 20060085536
    Abstract: A system and method for sharing data polling and buffering for multiple requesters are provided. With the present invention, a user/computing device may register with a data polling system whose purpose is to periodically poll computer system resources for data. This data is stored in a common storage buffer with pointers to the data being stored in index data structures for a plurality of users. More than one user index data structure may have a pointer to the same data location in the common storage buffer. In addition, a mechanism for aligning data pollings among a plurality of users/computing devices is provided so as to increase the amount of sharing of data stored in the common storage buffer.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Joel Meyer, William Parvin, Wenjian Qiao, Dean West
  • Publication number: 20060085544
    Abstract: The invention described is a new and useful process for minimizing the overall rebate a provider disburses to customers when a service level agreement (SLA) breach occurs in a utility computing environment. Specifically, the process compares performance data and resource usage with the SLAs of the customers, and reallocates shared resources to those customers who represent a lesser penalty to the provider in the event of an SLA breach. The process determines which resources, used by customers representing the lesser penalty, are operating below peak capacity. The process then reallocates these under-utilized resources to those customers requiring additional resources to meet SLA thresholds. If all resources are operating at peak capacity, the process reallocates the resources to those customers whose SLAs represent a greater penalty in the event of an SLA breach as compared to those customers whose SLAs provide for a lesser penalty, thereby minimizing the total rebate due upon an SLA breach.
    Type: Application
    Filed: October 18, 2004
    Publication date: April 20, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yen-Fu Chen, Erik Daughtrey, Hari Shankar, Wenjian Qiao