1
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based data gravity wells. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, December 16, 2014: US08914413 (9 worldwide citation)

A processor-implemented method, system, and/or computer program product defines multiple context-based data gravity wells on a context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-b ...


2
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Conformed dimensional and context-based data gravity wells. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, March 17, 2015: US08983981 (4 worldwide citation)

A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tu ...


3
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Security filter for context-based data gravity wells. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, October 7, 2014: US08856946 (2 worldwide citation)

A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-base ...


4
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based security screening for accessing data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, January 6, 2015: US08931109 (2 worldwide citation)

A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of p ...


5
Jeb R Linton: System for access to direct broadcast satellite services. Lockheed Martin Corporation, Marsh Fischmann & Breyfogle, December 30, 2008: US07472409 (11 worldwide citation)

A system for receiving direct broadcast satellite signals in a mobile craft is disclosed. Generally, the system includes an orientation system for determining the first orientation of the mobile craft, a controller or processor for determining first position control data, and an electronically-point ...


6
Rajiv Augu, Steven A Bade, Jeb R Linton, Dimitrios Pendarakis, George C Wilson, Lee Hardy Wilson: Virtual machine images encryption using trusted computing group sealing. International Business Machines Corporation, David Mims, Robert C Rolnik, April 8, 2014: US08694786 (4 worldwide citation)

A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from ...


7
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Data processing work allocation. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, June 21, 2016: US09372732 (3 worldwide citation)

A method, system, and/or computer program product allocates computer processing work. One or more processors identify: an input data that is stored in a first computer for processing by a computer program; a virtual machine, stored in a second computer, that is capable of executing the computer prog ...


8
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Data processing work allocation. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, August 18, 2015: US09110722 (3 worldwide citation)

A processor-implemented method, system, and/or computer program product allocates computer processing work. Input data, which has been deemed to be in need of processing, is stored in a first computer. A virtual machine that is capable of processing the input data is stored on a second computer. A f ...


9
Timothy Durniak, Robert R Friedlander, James R Kraemer, Jeb R Linton: Installing virtual machines within different communication pathways to access protected resources. International Business Machines Corporation, Law Office of Jim Boice, October 4, 2016: US09459912 (2 worldwide citation)

A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communic ...


10
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based security screening for accessing data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, November 7, 2017: US09811683 (1 worldwide citation)

A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstanti ...