Abstract: A software program (12) is configured to initiate, process, and terminate user sessions (22, 26). A resource deallocation module (50) is linked to the software program (12) to deallocate allocated external resources of each object of a user session responsive to an impending termination of said user session. An automatic memory management module (40) is invoked by the software program with respect to said user session subsequent to the deallocation performed by the resource deallocation module (50) and prior to the termination of said user session.
Type:
Application
Filed:
July 28, 2003
Publication date:
February 3, 2005
Inventors:
Naga Ayachitula, JoAnn Brereton, Shu-Ping Chang, Michael Schwartz
Abstract: A method, system and computer-usable medium are disclosed for understanding and discovering relationships within infrastructure systems via an infrastructure management system. In certain embodiments, the infrastructure systems comprise water and/or transportation systems. Such an infrastructure management system enables accidents to be prevented, traffic to flow normally, water to be conserved, cleaned and delivered safely.
Type:
Application
Filed:
September 5, 2013
Publication date:
March 5, 2015
Applicant:
International Business Machines Corporation
Abstract: An abstraction layer (50) is provided for facilitating accessing a database (10) containing database records each including a plurality of fields stored in one or more tables (12, 14). The abstraction layer (50) includes a control table (52) containing control records corresponding to database fields. Each control record contains metadata associated with the corresponding database field. The abstraction layer (50) also includes at least one additional table (54, 56, 58, 60, 62, 64, 66, 70, 72, 74, 80) containing additional metadata. Each database field is selectively associated with one or more selected portions of the additional metadata through metadata contained in the control record corresponding to the database field. A user database application (30) accesses the database (10) using metadata obtained from the abstraction layer (50).
Type:
Application
Filed:
July 24, 2003
Publication date:
January 27, 2005
Inventors:
Naga Ayachitula, JoAnn Brereton, Adarsh Gupta, Michael Schwartz
Abstract: A method, system and computer-usable medium are disclosed for understanding and discovering relationships within infrastructure systems via an infrastructure management system. In certain embodiments, the infrastructure systems comprise water and/or transportation systems. Such an infrastructure management system enables accidents to be prevented, traffic to flow normally, water to be conserved, cleaned and delivered safely.
Type:
Application
Filed:
November 15, 2013
Publication date:
March 5, 2015
Applicant:
International Business Machines Corporation
Abstract: A method, system and computer-usable medium are disclosed for understanding and discovering relationships within infrastructure systems via an infrastructure management system. In certain embodiments, the infrastructure systems comprise water and/or transportation systems. Such an infrastructure management system enables accidents to be prevented, traffic to flow normally, water to be conserved, cleaned and delivered safely.
Type:
Grant
Filed:
September 5, 2013
Date of Patent:
July 9, 2019
Assignee:
International Business Machines Corporation
Abstract: A method, system and computer-usable medium are disclosed for understanding and discovering relationships within infrastructure systems via an infrastructure management system. In certain embodiments, the infrastructure systems comprise water and/or transportation systems. Such an infrastructure management system enables accidents to be prevented, traffic to flow normally, water to be conserved, cleaned and delivered safely.
Type:
Grant
Filed:
November 15, 2013
Date of Patent:
July 9, 2019
Assignee:
International Business Machines Corporation
Abstract: Embodiments relate to analytics driven assessment of transactional risk daily limits (TRDLs). Customer data that includes historical transaction data and customer profile data associated with a customer is accessed by a processor. Economic data from an external data source is accessed via a network. A TRDL assessment model is applied, by a processor, to the customer data and the economic data to generate a TRDL for the customer.
Type:
Application
Filed:
January 16, 2014
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to analytics driven assessment of transactional risk daily limits (TRDLs). Customer data that includes historical transaction data and customer profile data associated with a customer is accessed by a processor. Economic data from an external data source is accessed via a network. A TRDL assessment model is applied, by a processor, to the customer data and the economic data to generate a TRDL for the customer.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: In some example embodiments, a computer-implemented method includes receiving, for each of a number of user interface controls, selections by a user of at least one of exactly one value, a subset of values, all values, and no values. The selections by the user define non-chart-related settings, The method includes inferring intent of the user of at least one attribute of a chart based on the selections by the user via the number of user interface controls. The method includes defining at least one characteristic of the chart for displaying the chart based on the intent.
Type:
Application
Filed:
August 2, 2012
Publication date:
February 6, 2014
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Curtis H. Brobst, Tricia Y. Garrett, Carolyn Hyink, Alan Mikulan
Abstract: Embodiments relate to analytics-driven automated reconciliation of financial transactions. External information is correlated with a plurality of financial transaction reconciliation exceptions associated with a sequence of financial transactions over a period of time. A plurality of causal factors is identified from the external information associated with a pattern of the financial transaction reconciliation exceptions. A plurality of more recent financial transactions is monitored for the causal factors. An exception prediction alert is issued based on identifying the causal factors in the more recent financial transactions prior to detecting a new financial transaction reconciliation exception associated with the more recent financial transactions.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: An aspect of customer selection processes includes classifying, by a computer processor, customers of an entity into groups based on commonly shared, predefined characteristics among the customers. For each of the groups: services rendered for corresponding customers are identified; for each of the services rendered, a risk relationship and a reward relationship between each of the corresponding customers and the service is determined; and for each of the services rendered, a score that defines a combination of the risk relationship and the reward relationship is calculated. For each of the services rendered by the entity, the corresponding score is applied to a candidate customer having a set of characteristics matching the characteristics of one of the groups, and the service is offered to the candidate customer as a function of the score.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to analytics-driven automated reconciliation of financial transactions. External information is correlated with a plurality of financial transaction reconciliation exceptions associated with a sequence of financial transactions over a period of time. A plurality of causal factors is identified from the external information associated with a pattern of the financial transaction reconciliation exceptions. A plurality of more recent financial transactions is monitored for the causal factors. An exception prediction alert is issued based on identifying the causal factors in the more recent financial transactions prior to detecting a new financial transaction reconciliation exception associated with the more recent financial transactions.
Type:
Application
Filed:
January 15, 2014
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: An aspect of customer selection processes includes classifying, by a computer processor, customers of an entity into groups based on commonly shared, predefined characteristics among the customers. For each of the groups: services rendered for corresponding customers are identified; for each of the services rendered, a risk relationship and a reward relationship between each of the corresponding customers and the service is determined; and for each of the services rendered, a score that defines a combination of the risk relationship and the reward relationship is calculated. For each of the services rendered by the entity, the corresponding score is applied to a candidate customer having a set of characteristics matching the characteristics of one of the groups, and the service is offered to the candidate customer as a function of the score.
Type:
Application
Filed:
January 31, 2014
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: A software program (12) is configured to initiate, process, and terminate user sessions (22, 26). A resource deallocation module (50) is linked to the software program (12) to deallocate allocated external resources of each object of a user session responsive to an impending termination of said user session. An automatic memory management module (40) is invoked by the software program with respect to said user session subsequent to the deallocation performed by the resource deallocation module (50) and prior to the termination of said user session.
Type:
Grant
Filed:
July 28, 2003
Date of Patent:
December 30, 2008
Assignee:
International Business Machines Corporation
Inventors:
Naga A. Ayachitula, JoAnn Piersa Brereton, Shu-Ping Chang, Michael Stephen Schwartz
Abstract: An aspect of product pricing includes classifying customers into groups based on shared, predefined characteristics and financial transactions, and identifying services rendered and available but not rendered. For each customer, a risk associated with a service is estimated; availability and prices of the service by third parties are determined; a price for the service set by the entity is compared with the prices set by the third parties; and a demand for the service of the entity is estimated as a function of the availability and prices of the service by the third parties. For each customer, a probability that the customer will purchase the service is estimated based on the demand, and a price for the service that is customized for the customer is calculated, as a function of the risk, the demand, and the probability of purchase, and in view of a target profit and/or target revenue.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: An aspect of product pricing includes classifying customers into groups based on shared, predefined characteristics and financial transactions, and identifying services rendered and available but not rendered. For each customer, a risk associated with a service is estimated; availability and prices of the service by third parties are determined; a price for the service set by the entity is compared with the prices set by the third parties; and a demand for the service of the entity is estimated as a function of the availability and prices of the service by the third parties. For each customer, a probability that the customer will purchase the service is estimated based on the demand, and a price for the service that is customized for the customer is calculated, as a function of the risk, the demand, and the probability of purchase, and in view of a target profit and/or target revenue.
Type:
Application
Filed:
January 31, 2014
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to analytics driven assessment of transactional risk daily limit (TRDL) exceptions. A transaction that includes a request to make a payment from an account associated with a customer is received and it is determined that processing the payment will result in exceeding a TRDL. Customer data including historical transaction data and customer profile data associated with the customer is accessed by a processor. Economic data from an external data source is accessed via a network from an external data source. A TRDL exception assessment model is applied, by the processor, to the transaction, the customer data, and the economic data to generate an approval recommendation for the request and a confidence level associated with the approval recommendation.
Type:
Application
Filed:
January 16, 2014
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to analytics driven assessment of transactional risk daily limit (TRDL) exceptions. A transaction that includes a request to make a payment from an account associated with a customer is received and it is determined that processing the payment will result in exceeding a TRDL. Customer data including historical transaction data and customer profile data associated with the customer is accessed by a processor. Economic data from an external data source is accessed via a network from an external data source. A TRDL exception assessment model is applied, by the processor, to the transaction, the customer data, and the economic data to generate an approval recommendation for the request and a confidence level associated with the approval recommendation.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to privacy preserving content analysis. A recoverable hash operation is performed on text information to produce hashed text information in a business-to-business system. The business-to-business system includes a business-to-business transaction gateway coupled to a plurality of enterprise computer systems. A non-recoverable hash operation is performed on numerical information to produce hashed numerical information in the business-to-business system. The hashed text information and the hashed numerical information are provided from the business-to-business transaction gateway to an analytics engine to perform encrypted content analysis. The text information and the numerical information are provided from one of the enterprise computer systems as a producer system to another of the enterprise computer systems as a consumer system through the business-to-business transaction gateway.
Type:
Application
Filed:
January 15, 2014
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian
Abstract: Embodiments relate to privacy preserving content analysis. A recoverable hash operation is performed on text information to produce hashed text information in a business-to-business system. The business-to-business system includes a business-to-business transaction gateway coupled to a plurality of enterprise computer systems. A non-recoverable hash operation is performed on numerical information to produce hashed numerical information in the business-to-business system. The hashed text information and the hashed numerical information are provided from the business-to-business transaction gateway to an analytics engine to perform encrypted content analysis. The text information and the numerical information are provided from one of the enterprise computer systems as a producer system to another of the enterprise computer systems as a consumer system through the business-to-business transaction gateway.
Type:
Application
Filed:
September 16, 2013
Publication date:
March 19, 2015
Applicant:
International Business Machines Corporation
Inventors:
JoAnn P. Brereton, Arun Hampapur, Hongfei Li, Robin Lougee, Buyue Qian