Articles by Lin
Activity
-
#KubeCon + #CloudNativeCon Atlanta 2025 was more than just a conference for me — it was a chance to pause and celebrate the incredible mentors…
#KubeCon + #CloudNativeCon Atlanta 2025 was more than just a conference for me — it was a chance to pause and celebrate the incredible mentors…
Liked by Lin Sun
-
We at solo.io are looking for OSS community manger to join us and work with the amazing communities of kgateway, kagent, agentgateway, Istio and…
We at solo.io are looking for OSS community manger to join us and work with the amazing communities of kgateway, kagent, agentgateway, Istio and…
Liked by Lin Sun
-
I’m being a little bit naughty on the train! Having read about adversarial poetry I decided to give it a go myself. The challenge: Can I get my…
I’m being a little bit naughty on the train! Having read about adversarial poetry I decided to give it a go myself. The challenge: Can I get my…
Liked by Lin Sun
Licenses & Certifications
Volunteer Experience
-
IBM Cloud Master Inventor Review Committee Chair
IBM
- 1 year 10 months
Science and Technology
I serve as IBM Cloud Master Inventor (MI) review committee chair, working with review committee members to select IBM Cloud MIs for the year.
-
Social media, website, mentor
IBM RTP CoderDojo Cordoba
- 2 years 2 months
Science and Technology
Helped out as a mentor for IBM RTP Coder Dojo, also helped to create social media and website.
-
social media specialist, greeter
Volunteer for eWIT@IBM event 2016
- 1 month
Science and Technology
-
Panelist for mid career professional
Volunteer for eWIT@IBM event 2015
- 1 month
Science and Technology
https://www.linkedin.com/pulse/ibm-sponsored-conference-female-college-students-raleigh-mitchell?trk
-
Mysterious reader, literacy and math helper
Morrisville Elementary School
- 6 years 10 months
Children
Assist in kids' class as mysterious reader or literacy and math helper as time permits.
-
Parent Association Vice Chair for Durham Campus
North Carolina School of Science and Mathematics
- 11 months
Education
As an executive member of the parent association committee, I organize volunteer signups, help ensure parent association events run successfully.
Publications
-
Active E-reader Data Capture - Using Emoticons during Content Consumption
ip.com
Disclosed is an electronic book reader with the additional novel function of including a display that offers a set of emoticons from which the user can make a selection while reading, and a user interface (UI) for capturing the user’s responses. The invention includes a network interface for forming a communication connection between the electronic book reader manufacturers for one or more user accounts associated with the E-reader.
Other authorsSee publication -
Create and customize virtual application patterns
IBM Developerworks
Platform as a Service virtual application patterns are realized by supporting a combination of application-centric deployment models, virtual applications (consisting of individual components and policies), the infrastructure and middleware they employ, and workload-specific content — extensions or "plug-ins" that define components, links, and policies used to describe and deploy virtual application patterns, such as those usable on both the IBM® SmartCloud Enterprise cloud and IBM…
Platform as a Service virtual application patterns are realized by supporting a combination of application-centric deployment models, virtual applications (consisting of individual components and policies), the infrastructure and middleware they employ, and workload-specific content — extensions or "plug-ins" that define components, links, and policies used to describe and deploy virtual application patterns, such as those usable on both the IBM® SmartCloud Enterprise cloud and IBM PureSystems™. This article explains how to get started with the IBM Workload Plug-in Development Kit and on your way to creating and customizing virtual application patterns. The companion article, Using the IBM Workload Plug-in Development Kit demonstrates some basic toolkit operations.
Other authors -
-
Using the IBM Workload Plug-in Development Kit
IBM Developerworks
Learn to set up the samples environment in Eclipse, create new projects from the command line, build a single plug-in and pattern type with command-line tools, and develop a plug-in with the Eclipse framework. This article provides some basic toolkit operations. The companion article, Create and customize virtual application patterns, describes how to get started with the IBM Workload Plug-in Development Kit (PDK).
Other authors -
-
Using the Eclipse Plug-in for WebSphere Application Server Community Edition
IBM Developerworks
See publicationWith the Eclipse plug-in for IBM® WebSphere® Application Server Community Edition V1.0.1.1, developers can develop, deploy, and debug their J2EE™ applications to a Community Edition server. This article steps you through everything you need to deploy and test your J2EE applications quickly to Community Edition using the Eclipse framework, from setting up your environment to deploying and debugging your applications.
-
Kick-start your J2EE applications using DB2 9 with pureXML and WebSphere Community Edition
IBM Developerworks
New features in the latest version of the IBM® DB2® database make it possible to access and manipulate XML data just as you would data in a standard relational database. In this tutorial, you'll learn to set up a DB2 9 database and WebSphere® Application Server Community Edition on a Windows™ or Linux® environment, then write and deploy a Java™ applications that takes advantage of DB2 9's XML capabilities.
Other authors -
-
Get started with WebSphere Application Server Community Edition
IBM WebSphere Developer Technical Journal
IBM® WebSphere® Application Server Community Edition is an open source Java™ 2 Platform, Enterprise Edition (J2EE™) application server based on Apache Geronimo. This article will help you understand why you might want to use this new product, when it might be the best choice for your project, and then walks you through what you need to know to get up and running quickly with WebSphere Application Server Community Edition, from setting up your environment and choosing the right download package…
IBM® WebSphere® Application Server Community Edition is an open source Java™ 2 Platform, Enterprise Edition (J2EE™) application server based on Apache Geronimo. This article will help you understand why you might want to use this new product, when it might be the best choice for your project, and then walks you through what you need to know to get up and running quickly with WebSphere Application Server Community Edition, from setting up your environment and choosing the right download package to deploying applications. Updated for V1.0.1.1.
Other authorsSee publication -
WebSphere Application Server Community Edition V1 system administration
IBM WebSphere Developer Technical Journal
-
WebSphere Application Server Community Edition V1 system administration -- Part 2
IBM WebSphere Developer Technical Journal
Patents
-
CONTEXTUALLY AND TONALLY ENHANCED CHANNEL MESSAGING
Issued US 9715494
A message being constructed for posting on a messaging platform is analyzed to extract a set of message characteristics. A past period is computed for a channel on the messaging platform. A set of channel characteristics is extracted from a past period data posted in the channel during the past period. When a threshold degree of match exists between the set of message characteristics and the set of channel characteristics, a characteristic is determined that is different in the message…
A message being constructed for posting on a messaging platform is analyzed to extract a set of message characteristics. A past period is computed for a channel on the messaging platform. A set of channel characteristics is extracted from a past period data posted in the channel during the past period. When a threshold degree of match exists between the set of message characteristics and the set of channel characteristics, a characteristic is determined that is different in the message characteristics and the channel characteristics, and which is desirable in the channel. A recommendation is constructed to include (i) a channel identifier of the channel to suggest posting the message in the channel, and (ii) a change to the message according to the corresponding characteristic in the set of channel characteristics, wherein the change to the message increases a degree of acceptability of the message in the channel.
Other inventorsSee patent -
ENFORCING E-MEETING ATTENDEE GUIDELINES
Issued US 9697502
A method, computer program product, and system for enforcing eMeeting guidelines is described. An indication of one or more use restriction guidelines is received. The one or more use restriction guidelines is associated with an electronic communication session. The one or more use restriction guidelines is provided to a computing device associated with an invitee associated with the electronic communication session. An indication is received that the invitee has accepted a portion of the one…
A method, computer program product, and system for enforcing eMeeting guidelines is described. An indication of one or more use restriction guidelines is received. The one or more use restriction guidelines is associated with an electronic communication session. The one or more use restriction guidelines is provided to a computing device associated with an invitee associated with the electronic communication session. An indication is received that the invitee has accepted a portion of the one or more use restriction guidelines. The portion of the one or more use restriction guidelines is enforced with respect to one or more devices associated with the invitee.
Other inventorsSee patent -
INTELLIGENTLY DETECTING THE LEADER OF A CO-BROWSING SESSION
Issued US 9686366
Managing a co-browsing session of multiple users where there are multiple roles that each user may have, and each respective user has a role. Software manages a computer system to: (i) monitor the co-browsing session to detect a condition; and (ii) responsive to detection of the condition, change the role(s) of at least one user. The change of role(s) is made automatically and without human intervention.
Other inventorsSee patent -
AUTONOMIC COLLABORATIVE WORKSPACE CREATION
Issued US 9667677
Systems and methods provide for autonomic collaborative workspace creation. Patterns of artifact usage for a plurality of workspaces over a plurality of collaborative interactions may be determined. Some of the multitude of collaborative interactions may be between a subset of the plurality of workspaces. A workspace may be initialized with artifacts for a scheduled collaboration based on the patterns of artifact usage.
Other inventorsSee patent -
PROTECTING MOBILE DEVICES FROM MALWARE
Issued US 9654982
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received…
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.
Other inventorsSee patent -
MOBILE DEVICE DATA ALLOCATION SYSTEM
Issued US 9635188
A mobile device data allocation system includes a plurality of mobile devices that exchange data with a data service provider via a communication network. The data exchanged by each mobile device during a time period defines a total amount of exchanged data. An electronic shared-account device module is configured to determine a maximum amount of data at which the mobile devices are authorized to exchange during the time period. The shared-account device module further generates a…
A mobile device data allocation system includes a plurality of mobile devices that exchange data with a data service provider via a communication network. The data exchanged by each mobile device during a time period defines a total amount of exchanged data. An electronic shared-account device module is configured to determine a maximum amount of data at which the mobile devices are authorized to exchange during the time period. The shared-account device module further generates a control signal that regulates data exchange of the at least one mobile device in response to determining an upcoming event indicating the total amount of exchanged data will exceed the maximum amount of data.
Other inventorsSee patent -
CODE REVIEWER SELECTION IN A DISTRIBUTED SOFTWARE DEVELOPMENT ENVIRONMENT
Issued US 9595009
Embodiments of the present provide a method, system and computer program product for reviewer selection during distributed software development. In an embodiment of the invention, a method for reviewer selection during distributed software development can include receiving a request to review a module of source code stored in a source code repository and managed by an IDE executing in memory of a computer. The method also can include retrieving meta-data for the module of source code…
Embodiments of the present provide a method, system and computer program product for reviewer selection during distributed software development. In an embodiment of the invention, a method for reviewer selection during distributed software development can include receiving a request to review a module of source code stored in a source code repository and managed by an IDE executing in memory of a computer. The method also can include retrieving meta-data for the module of source code referencing different collaborators previously accessing the module of source code in the IDE. The method yet further can include ranking the collaborators according to at least one user centric characteristic of the module of source code. Finally, the method can include selecting a highest ranked one of the collaborators to review the module of source code.
Other inventorsSee patent -
STREAMLINED CALL MANAGEMENT AND ROUTING SYSTEM
Issued US 9571653
A system for managing and routing calls involves a switch, multiple endpoints, an IVR system; and storage including a data structure associating individual unique keys with ANI information and one of the endpoints. In response to receipt of a call, identified by a specific ANI, the IVR will allow the user to input a routing key. If the user does not provide the routing key, it will follow the user's interaction to one of the endpoints, and I) generate a unique key, II) store the unique key, the…
A system for managing and routing calls involves a switch, multiple endpoints, an IVR system; and storage including a data structure associating individual unique keys with ANI information and one of the endpoints. In response to receipt of a call, identified by a specific ANI, the IVR will allow the user to input a routing key. If the user does not provide the routing key, it will follow the user's interaction to one of the endpoints, and I) generate a unique key, II) store the unique key, the specific ANI and an identifier of the one of the endpoints, and III) make the unique key available so that, the user can provide the unique key as the routing key on a subsequent call. If the user does provide the routing key, the specific ANI will be verified and the user's call routed to the endpoint associated with the routing key.
Other inventorsSee patent -
PATTERN DESIGN FOR HETEROGENEOUS ENVIRONMENTS
Issued US 9569249
A method is provided for designing and optimizing a pattern by considering heterogeneous cloud environments. Building blocks within the pattern can be deployed into different cloud environments and different cloud providers, depending on where the pattern fits users need best. Further, building block configuration within the pattern can be optimized by target environments, along with runtime bursting among multiple environments.
Other inventorsSee patent -
CONCURRENT WORKLOAD DEPLOYMENT TO SYNCHRONIZE ACTIVITY IN A DESIGN PALETTE
Issued US 9563472
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the…
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the comparing of the stability metric to the acceptance threshold.
Other inventorsSee patent -
CONCURRENT WORKLOAD DEPLOYMENT TO SYNCHRONIZE ACTIVITY IN A DESIGN PALETTE
Issued US 9563473
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the…
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the comparing of the stability metric to the acceptance threshold.
Other inventorsSee patent -
IDENTIFYING THE LINES OF CODE THAT CAUSED THE ERROR AS IDENTIFIED IN THE STACK TRACE IN A SOURCE CODE VERSION THAT GENERATED THE STACK TRACE THAT DOES NOT RESIDE ON THE USERS COMPUTING DEVICE
Issued US 9535819
A method, system and computer program product for identifying lines of code that caused an error as identified in a stack trace in a source code version that generated the stack trace. The line(s) of code in the source code version that generated the stack trace that are identified in the stack trace as causing the error are identified. If there are differences in the line(s) of code that are associated with the cause of the error between the source code version that generated the stack trace…
A method, system and computer program product for identifying lines of code that caused an error as identified in a stack trace in a source code version that generated the stack trace. The line(s) of code in the source code version that generated the stack trace that are identified in the stack trace as causing the error are identified. If there are differences in the line(s) of code that are associated with the cause of the error between the source code version that generated the stack trace and the source code version being utilized by the user, such as a developer, then an annotated version of the source code version that generated the stack trace of the line(s) of code that caused the error is displayed to the user with highlighted differences with respect to the source code version being utilized by the user.
Other inventorsSee patent -
INFERRING DEVICE THEFT BASED ON HISTORICAL LOCATION DATA
Issued US 9538335
A set of mobile devices are designated as a related set of mobile devices for loss indication purposes. Machine logic rules are developed to indicate loss of a mobile device. Under these rules, a determination of probable loss (for example, theft, inadvertent leaving behind) of one of the mobile devices depends, at least in part, upon the activities and/or status of other mobile devices in the set. For example, if a first mobile device in the set is expected, under the machine logic rules, to…
A set of mobile devices are designated as a related set of mobile devices for loss indication purposes. Machine logic rules are developed to indicate loss of a mobile device. Under these rules, a determination of probable loss (for example, theft, inadvertent leaving behind) of one of the mobile devices depends, at least in part, upon the activities and/or status of other mobile devices in the set. For example, if a first mobile device in the set is expected, under the machine logic rules, to always be near a second mobile device in the set, then a determination that the second mobile device is located far away from the first mobile device may trigger a warning, or other mitigating action, that the first mobile device has probably been lost.
Other inventorsSee patent -
INFERRING DEVICE THEFT BASED ON HISTORICAL LOCATION DATA
Issued US 9538335
-
GUIDING A DESIRED OUTCOME FOR AN ELECTRONICALLY HOSTED CONFERENCE
Issued US 9462224
-
METHOD TO REDUCE THE FREQUENT NEED TO MINIMIZE/MAXIMIZE IM WINDOWS
Issued CN ZL201080056914.X
-
METHOD TO REDUCE THE FREQUENT NEED TO MINIMIZE/MAXIMIZE IM WINDOWS
Issued TW I530857
-
INTELLIGENTLY DETECTING THE LEADER OF A CO-BROWSING SESSION
Issued US 9313282
-
CONTEXT DRIVEN ARRANGEMENT OF PORTLETS IN A PORTAL
Issued US 9223883
-
TRANSMISSION OF INSTANT MESSAGES ACCORDING TO AVAILABILITY
Issued US 9166822
-
GUIDING A DESIRED OUTCOME FOR AN ELECTRONICALLY HOSTED CONFERENCE
Issued US 9113035
-
SYSTEM TO FACILITATE SHARING USING CONTINGENCY ORDERING
Issued US 9070147
-
ORCHESTRATION OF ELECTRONIC MEETINGS
Issued US 9641573
A computer-implemented method, computer program product, and computing system is provided for orchestrating presentations within an electronic meeting. In an implementation, a method may include receiving one or more social scoring inputs associated with a plurality of presentations included within an electronic meeting. The method may also include defining a social score for a first presentation of the plurality of presentations based on, at least in part, the one or more social scoring…
A computer-implemented method, computer program product, and computing system is provided for orchestrating presentations within an electronic meeting. In an implementation, a method may include receiving one or more social scoring inputs associated with a plurality of presentations included within an electronic meeting. The method may also include defining a social score for a first presentation of the plurality of presentations based on, at least in part, the one or more social scoring inputs. The method may further include establishing at least one attribute of the first presentation for the electronic meeting based on the social score for the first presentation.
Other inventorsSee patent -
NOTIFYING ELECTRONIC MEETING PARTICIPANTS OF INTERESTING INFORMATION
Issued US 9002938
-
LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM
Issued US 8800000
-
INDIVIDUAL INFORMATION ELEMENT ACCESS FOR UNOPENED OBJECTS
Issued US 8756520
-
LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM
Issued US 8635668
-
Electronic calendar collaboration
Issued US 8484745
Meeting originators grant permission to update (i.e., add, change, and/or delete) a field or fields of a meeting invitation that corresponds to a calendar entry on an electronic calendar, enabling a meeting invitee to update a meeting invitation and to thereby communicate updates that can be reflected in the corresponding electronic calendar entries of other people who are invited to the meeting. Update permission may be granted to one meeting invitee, to all meeting invitees, or to a selected…
Meeting originators grant permission to update (i.e., add, change, and/or delete) a field or fields of a meeting invitation that corresponds to a calendar entry on an electronic calendar, enabling a meeting invitee to update a meeting invitation and to thereby communicate updates that can be reflected in the corresponding electronic calendar entries of other people who are invited to the meeting. Update permission may be granted to one meeting invitee, to all meeting invitees, or to a selected subset of the meeting invitees. Update permissions are associated with the particular meeting invitation, and preferably expire once the meeting time and date have passed. For recurring meetings, a particular update permission may be granted for a single instance of the meeting, or to all instances, and this permission preferably expires after the last instance of the recurring meeting has ended.
Other inventorsSee patent -
Self-healing failover using a repository and dependency management system
Issued US 8448014
Systems, devices, methods, and articles of manufacture employing repair modules are provided. The modules may be automatically deployed in conjunction with dependency mechanisms upon identifying a malfunctioning application. The modules may be specifically tailored for certain diagnosis or repair and may be selected for deployment to a second application using information regarding the malfunction of a first application.
Other inventorsSee patent -
Enhancing source code debugging and readability using visual symbols
Issued US 8434062
The present invention provides the ability to enable a special view of source code in which the textual name of classes, variables, methods and object instances can be replaced with graphical symbols. A method of displaying computer source code according to the present invention comprises assigning unique graphical symbols to a plurality of corresponding textual names of source code classes, methods, and variables, replacing the plurality of textual names of the classes, methods, and variables…
The present invention provides the ability to enable a special view of source code in which the textual name of classes, variables, methods and object instances can be replaced with graphical symbols. A method of displaying computer source code according to the present invention comprises assigning unique graphical symbols to a plurality of corresponding textual names of source code classes, methods, and variables, replacing the plurality of textual names of the classes, methods, and variables with the corresponding assigned unique graphical symbols, and displaying the source code with the unique graphical symbols in place of the corresponding textual names of the classes, methods, and variables.
Other inventorsSee patent -
Repositioning of hyperlinks for common functions
Issued US 8375287
In one embodiment, common functions of hyperlinks are listed and associated with alternative terms, which may be words and phrases that are commonly used to identify hyperlinks in web pages and other documents. A common icon is associated with each common function, and a predetermined position on a display screen is assigned to each common icon. The alternative terms for each common function are compared to each of the hyperlinks in a source document. If a hyperlink matches an alternative term…
In one embodiment, common functions of hyperlinks are listed and associated with alternative terms, which may be words and phrases that are commonly used to identify hyperlinks in web pages and other documents. A common icon is associated with each common function, and a predetermined position on a display screen is assigned to each common icon. The alternative terms for each common function are compared to each of the hyperlinks in a source document. If a hyperlink matches an alternative term of a common function, the target resource locator from that hyperlink, which points to a target document, is associated with that common function. The corresponding common icon is displayed at its predetermined position on a display screen in the form of a common function hyperlink, which includes the target resource locator. Activating the common function hyperlink redirects the application to the target document.
Other inventorsSee patent -
Optimizing the handling of source code requests between a software configuration management (SCM) system and a software integrated development environment (IDE) using projected ancillary data
Issued US 8266589
The present invention can include a solution for optimizing the handling of source code requests by a software configuration management (SCM) system by using projected ancillary data. When a SCM system receives a request for a source code file from a software integrated development environment (IDE), ancillary data can be projected for the requested source code file. Ancillary data can represent supplementary source code files and/or a revision update for an existing source code file. The…
The present invention can include a solution for optimizing the handling of source code requests by a software configuration management (SCM) system by using projected ancillary data. When a SCM system receives a request for a source code file from a software integrated development environment (IDE), ancillary data can be projected for the requested source code file. Ancillary data can represent supplementary source code files and/or a revision update for an existing source code file. The projected ancillary data can be appended to a response message that already contains the requested source code file. The response message can then be sent to the software IDE.
Other inventorsSee patent -
Management of user events scheduled during a user absence period
Issued US 8255256
A solution for improved management of user events scheduled during a user absence period a determination module configured to determine a user absence period having a start date and an end date. A detection module configured to detect a new user event scheduled during the user absence period. A reporting module configured to report statistics on the new user events. A response module configured to automatically respond to the new user event scheduled during the user absence period, the new user…
A solution for improved management of user events scheduled during a user absence period a determination module configured to determine a user absence period having a start date and an end date. A detection module configured to detect a new user event scheduled during the user absence period. A reporting module configured to report statistics on the new user events. A response module configured to automatically respond to the new user event scheduled during the user absence period, the new user event scheduled after the user absence period is defined. A definition module configured to define the user absence period having a start date and an end date. A search module configured to search two or more calendaring repositories for a scheduled user event having a start/end date during the user absence period, and a presentation module configured to present to the user the scheduled user event.
Other inventorsSee patent -
SYSTEM, METHOD, AND APPARATUS FOR ELECTRONIC COMMUNICATION INITIATION CONTINGENT ON BUSYNESS
Issued US 8219624
An apparatus, system, and method for electronic communication initiation contingent on busyness. The method includes receiving a request from a requester to contact a user. The requested contact includes a request to engage in electronic communication. The method also includes determining a busyness of the user. The busyness is determined by accessing a quantity of active contact related tasks for the user. The method also includes comparing the busyness of the user to a condition. The…
An apparatus, system, and method for electronic communication initiation contingent on busyness. The method includes receiving a request from a requester to contact a user. The requested contact includes a request to engage in electronic communication. The method also includes determining a busyness of the user. The busyness is determined by accessing a quantity of active contact related tasks for the user. The method also includes comparing the busyness of the user to a condition. The condition is a complex condition having threshold levels for a plurality of contact related tasks. The method also includes contacting the user in response to satisfaction of the condition.
Other inventorsSee patent -
Marking email as partially reviewed based on scrolling extent
Issued US 8219629
An extent to which a user has reviewed an email is estimated, and a review value is assigned to the email based upon the estimated extent of review. A visual indicator associated with the email is displayed, wherein the appearance of the visual indicator is determined at least by the review value. In an exemplary embodiment, the email contains one or more recipient email addresses, wherein each recipient email address is associated with a recipient review value. In the exemplary embodiment, a…
An extent to which a user has reviewed an email is estimated, and a review value is assigned to the email based upon the estimated extent of review. A visual indicator associated with the email is displayed, wherein the appearance of the visual indicator is determined at least by the review value. In an exemplary embodiment, the email contains one or more recipient email addresses, wherein each recipient email address is associated with a recipient review value. In the exemplary embodiment, a visual indicator is displayed corresponding to the recipient review value associated with each recipient email address.
Other inventorsSee patent -
Enforcing conformance in email content
Issued US 8140628
In an email message method and system, an email server receives at least one user-defined constraint for a first email message, where the user-defined constraint comprises at least one of an expected format and expected content of a reply email message. The email server associates the at least one user-defined constraint with the first email message and sends the first email message to a recipient. In response to receiving the reply email message, the email server validates the reply email…
In an email message method and system, an email server receives at least one user-defined constraint for a first email message, where the user-defined constraint comprises at least one of an expected format and expected content of a reply email message. The email server associates the at least one user-defined constraint with the first email message and sends the first email message to a recipient. In response to receiving the reply email message, the email server validates the reply email message against the at least one user-defined constraint.
Other inventorsSee patent -
Displaying comment statistics information
Issued US 8132154
A system, method and program product for statistically analyzing comments in one or more program code listings. A system is disclosed that includes a process for associating comments to blocks of code at different programmatic levels in a code listing; a process for assigning weights to different code blocks, and a process for generating a statistical analysis at the different programmatic levels of the comments in the code listing.
Other inventorsSee patent -
Software documentation manager
Issued US 8,122,433
A computer-implementable method and system for managing software code documentation is disclosed. The method receives computer software code and documentation selected by a user and inserts one or more association keys in the selected code and one or more association keys in the selected documentation. The association keys are used to identify a portion of computer software documentation that corresponds with the computer software code. When the user wants to see documentation for a section of…
A computer-implementable method and system for managing software code documentation is disclosed. The method receives computer software code and documentation selected by a user and inserts one or more association keys in the selected code and one or more association keys in the selected documentation. The association keys are used to identify a portion of computer software documentation that corresponds with the computer software code. When the user wants to see documentation for a section of code, or code that corresponds to a section of documentation, the user selects the relevant text. The method receives the selected text, retrieves the association keys inserted in the selected text, determines whether the selected text is code or documentation, searches for documentation or code with matching association keys and alters the display of the matching documentation or code.
Other inventorsSee patent -
Analyzing email content to determine potential intended recipients
Issued US 8103726
Described herein are processes and devices for analyzing email content to determine potential intended email recipients. One of the devices described is an email content analyzer device. The email content analyzer device can analyze content in a part of an email message that is not an email address recipient field. The email content analyzer device can obtain identifying information about a potential intended recipient of the email message, such as by looking for possible names of intended…
Described herein are processes and devices for analyzing email content to determine potential intended email recipients. One of the devices described is an email content analyzer device. The email content analyzer device can analyze content in a part of an email message that is not an email address recipient field. The email content analyzer device can obtain identifying information about a potential intended recipient of the email message, such as by looking for possible names of intended recipients within the body of the email message. The email content analyzer device can analyze the context of the identifying information in the content to determine the identity of the potential intended recipient. For example, the email content analyzer device can compare the identity of the potential intended recipient to an email addresses in an email address recipient field on the email message. The email content analyzer device can also determine whether the email message was intended for the potential intended recipient.
Other inventorsSee patent -
User-configured management of IM availability status
Issued US 8103958
Communicating an Instant Messaging (IM) user's availability status message is managed by a user-defined shortcut command, which is used to generate a user-drafted status response. When the user receives an instant message at an inopportune time, the user inputs the user-defined shortcut command, which results in the user-drafted status response being automatically transmitted to a sender of the instant message that was received at the inopportune time.
Other inventorsSee patent -
User-configured management of IM availability status
Issued US 8,103,958
Communicating an Instant Messaging (IM) user's availability status message is managed by a user-defined shortcut command, which is used to generate a user-drafted status response. When the user receives an instant message at an inopportune time, the user inputs the user-defined shortcut command, which results in the user-drafted status response being automatically transmitted to a sender of the instant message that was received at the inopportune time.
Other inventorsSee patent -
Selectively marking email as partially reviewed
Issued US 8005907
An extent to which a user has reviewed an email is estimated, and a review value is assigned to the email based upon the estimated extent of review. A visual indicator associated with the email is displayed, wherein the appearance of the visual indicator is determined at least by the review value. In an exemplary embodiment, the email contains one or more recipient email addresses, wherein each recipient email address is associated with a recipient review value. In the exemplary embodiment, a…
An extent to which a user has reviewed an email is estimated, and a review value is assigned to the email based upon the estimated extent of review. A visual indicator associated with the email is displayed, wherein the appearance of the visual indicator is determined at least by the review value. In an exemplary embodiment, the email contains one or more recipient email addresses, wherein each recipient email address is associated with a recipient review value. In the exemplary embodiment, a visual indicator is displayed corresponding to the recipient review value associated with each recipient email address.
Other inventorsSee patent -
Customizing email subjects for subscription generated email messages
Issued US 7962850
The present invention discloses a solution for permitting users to customize subject headings of email subscriptions. The customizations can be applied on a per subscription basis and/or on a per sender basis. Further, the customizations can be performed by a software program that changes an original email heading established by a subscription providing source. Specifically, the solution recognizes that most, if not all, subscription emails are automatically generated in consistent fashion and…
The present invention discloses a solution for permitting users to customize subject headings of email subscriptions. The customizations can be applied on a per subscription basis and/or on a per sender basis. Further, the customizations can be performed by a software program that changes an original email heading established by a subscription providing source. Specifically, the solution recognizes that most, if not all, subscription emails are automatically generated in consistent fashion and inherently have a repeating structure. The disclosed solution permits a user to identity portions of these repeating structures, which are to be used to generate replacement subject headings designed to be meaningful to the user. The solution can optionally maintain the original subject heading, which can be used in many situations, such as for use when replying or forwarding an email.
Other inventorsSee patent -
Management of email threads
Issued US 7930356
A method and system are provided for managing email threads. The method includes receiving a plurality of separate email threads. The method further includes generating associations between at least two email threads of the plurality of separate email threads. The method further includes displaying the associations of the at least two email threads. As a result, users can conveniently view the associated email threads and perform operations on particular email threads.
Other inventorsSee patent -
Conditional reminders for conveyed electronic messages
Issued US 7895277
The present invention discloses a solution for providing conditional reminders for electronic messages. The solution can identify an electronic message conveyed from a sender to a recipient, wherein the electronic message is an email message or text exchange message. A software program can determine a response time and a response condition for the electronic message. When the response time expires and when the response condition is unsatisfied, a software program can present a reminder to the…
The present invention discloses a solution for providing conditional reminders for electronic messages. The solution can identify an electronic message conveyed from a sender to a recipient, wherein the electronic message is an email message or text exchange message. A software program can determine a response time and a response condition for the electronic message. When the response time expires and when the response condition is unsatisfied, a software program can present a reminder to the sender and/or the recipient, where the reminder indicates that a response is due. When a software program detects a recipient action that satisfies the response condition before the response time expires, no reminder will be presented to either the sender or the recipient.
Other inventorsSee patent -
METHOD AND SYSTEM FOR PROVIDING ENHANCED USER CONTROL OF COMPUTER CHAT
Issued US 7890595
A method of and system for providing enhanced user control of computer chat minimize a chat window in response to user input and then restore the chat window in response to receipt of a message from a sender, in which the message has a predetermined characteristic. The user input may include activation of an intelligent or smart minimize function. An example of a predetermined characteristic that may cause the chat window to be restored in the intelligent minimized mode is the presence of the…
A method of and system for providing enhanced user control of computer chat minimize a chat window in response to user input and then restore the chat window in response to receipt of a message from a sender, in which the message has a predetermined characteristic. The user input may include activation of an intelligent or smart minimize function. An example of a predetermined characteristic that may cause the chat window to be restored in the intelligent minimized mode is the presence of the user's name in a chat message. Other examples of predetermined characteristics that may cause the chat window to be restored include the text of the message being in a bold font or otherwise marked as being urgent, the sender of the message being on an exception list or occupying a management position with respect to the recipient. Embodiments may include a shout function by which a sender can override the intelligent mode. Embodiments include informing the other chat participants when a participant is in intelligent minimize mode.
Other inventorsSee patent -
METHOD AND SYSTEM FOR COMMUNICATION CONFIRMATION WARNING
Issued US 7860223
A method to provide a confirmation warning to a target sender of an electronic communication is disclosed. The confirmation warning is provided prior to transmitting the electronic communication from the target sender to a target recipient, there being an established pattern of communication between the target sender and the target recipient. In response to determining that specified details about the electronic communication are not consistent with details about the established pattern of…
A method to provide a confirmation warning to a target sender of an electronic communication is disclosed. The confirmation warning is provided prior to transmitting the electronic communication from the target sender to a target recipient, there being an established pattern of communication between the target sender and the target recipient. In response to determining that specified details about the electronic communication are not consistent with details about the established pattern of electronic communication, setting a pattern warning flag and saving those details of the electronic communication determined to be not consistent. In response to detecting the presence of at least one of the pattern warning flag and a sensitive message flag, making available to the target sender a confirmation warning, and, in response to the target sender confirming acceptability of the target recipient to receive the electronic communication, transmitting the electronic communication to the target recipient.
Other inventors -
PRIORITIZING ELECTRONIC MESSAGES BASED ON COMMUNITY VALUES
Filed US 20130346525
Embodiments of the present invention provide a system, method, and program product to prioritize a plurality of electronic messages. In an exemplary embodiment, a computer receives at least one vote, from at least one first user of a plurality of user, for each of the plurality of electronic messages. The at least one vote indicates which of the plurality of user is required to respond to each of the plurality of electronic messages. In the exemplary embodiment, the computer creates a community…
Embodiments of the present invention provide a system, method, and program product to prioritize a plurality of electronic messages. In an exemplary embodiment, a computer receives at least one vote, from at least one first user of a plurality of user, for each of the plurality of electronic messages. The at least one vote indicates which of the plurality of user is required to respond to each of the plurality of electronic messages. In the exemplary embodiment, the computer creates a community value for each of the plurality of electronic messages based, at least in part, on the at least one vote. The computer prioritizes the plurality of electronic messages based, at least in part, on the community value. In the exemplary embodiment, the at least one vote is received from at least one of a sender or an addressee of the plurality of electronic messages.
Other inventorsSee patent -
PRIORITIZING ELECTRONIC MESSAGES BASED ON COMMUNITY VALUES
Filed US 20130346525
Embodiments of the present invention provide a system, method, and program product to prioritize a plurality of electronic messages. In an exemplary embodiment, a computer receives at least one vote, from at least one first user of a plurality of user, for each of the plurality of electronic messages. The at least one vote indicates which of the plurality of user is required to respond to each of the plurality of electronic messages. In the exemplary embodiment, the computer creates a community…
Embodiments of the present invention provide a system, method, and program product to prioritize a plurality of electronic messages. In an exemplary embodiment, a computer receives at least one vote, from at least one first user of a plurality of user, for each of the plurality of electronic messages. The at least one vote indicates which of the plurality of user is required to respond to each of the plurality of electronic messages. In the exemplary embodiment, the computer creates a community value for each of the plurality of electronic messages based, at least in part, on the at least one vote. The computer prioritizes the plurality of electronic messages based, at least in part, on the community value. In the exemplary embodiment, the at least one vote is received from at least one of a sender or an addressee of the plurality of electronic messages.
Other inventorsSee patent -
PRIORITIZING CALENDER EVENTS
Filed US 20130262173
Prioritizing events in electronic calendars, in one aspect, may automatically prioritize meetings based on the positions within an organization of the individuals attending, as well as the relationship among each of the individual meeting invitees.
Other inventorsSee patent
Projects
-
IBM PureApplication System
-
IBM PureApplication System W1500 (PureApplication System) is an expert integrated system. It combines the flexibility of a general-purpose system and the simplicity of an appliance. Integrated expertise throughout the system help fundamentally change the economics of IT. The PureApplication System comes integrated from the IBM factory, designed by IBM experts.
This integration helps remove the need for expensive and time-consuming interaction between multiple teams in a traditional IT…IBM PureApplication System W1500 (PureApplication System) is an expert integrated system. It combines the flexibility of a general-purpose system and the simplicity of an appliance. Integrated expertise throughout the system help fundamentally change the economics of IT. The PureApplication System comes integrated from the IBM factory, designed by IBM experts.
This integration helps remove the need for expensive and time-consuming interaction between multiple teams in a traditional IT organization.
Designing, developing, and deploying a web or database application, or an application environment, often requires expertise to manually architect, install, configure, integrate, optimize, and scale the components of a multi-server deployment. With PureApplication System, this process is as simple as logging into a self-service console. The availability of self-service deployment access raises a challenge for administrators to ensure that resources are used efficiently, responsibly, and fairly. To address this, PureApplication System allows administrators to control user access to hardware, software patterns, and licenses. Administrators can also set limits on usage, track usage for chargeback, and manage licenses through the PureApplication System console.Other creatorsSee project -
IBM PureApplication System Version 1.0
-
IBM PureApplication System W1500 (PureApplication System) is an expert integrated system. It combines the flexibility of a general-purpose system and the simplicity of an appliance. Integrated expertise throughout the system help fundamentally change the economics of IT. The PureApplication System comes integrated from the IBM factory, designed by IBM experts.
This integration helps remove the need for expensive and time-consuming interaction between multiple teams in a traditional IT…IBM PureApplication System W1500 (PureApplication System) is an expert integrated system. It combines the flexibility of a general-purpose system and the simplicity of an appliance. Integrated expertise throughout the system help fundamentally change the economics of IT. The PureApplication System comes integrated from the IBM factory, designed by IBM experts.
This integration helps remove the need for expensive and time-consuming interaction between multiple teams in a traditional IT organization.
Designing, developing, and deploying a web or database application, or an application environment, often requires expertise to manually architect, install, configure, integrate, optimize, and scale the components of a multi-server deployment. With PureApplication System, this process is as simple as logging into a self-service console. The availability of self-service deployment access raises a challenge for administrators to ensure that resources are used efficiently, responsibly, and fairly. To address this, PureApplication System allows administrators to control user access to hardware, software patterns, and licenses. Administrators can also set limits on usage, track usage for chargeback, and manage licenses through the PureApplication System console.Other creatorsSee project
Honors & Awards
-
Corporate Test Excellence Award
IBM
-
Eminence and Excellence Award
IBM
-
Employee Retention Awards
IBM
Key contributor and recognized leader for Pure App Pattern Engine and WebSphere Feature pack
-
Many Bravo Awards
IBM
-
Many Patent Awards
IBM
Many Patent Awards, including:
54 patent plateau awards
high patent value awards
100+ patent filing awards
many patent issue awards
Languages
-
English, Chinese
-
Organizations
-
Society of Women Engineering
member
- Present
More activity by Lin
-
Perfect timing! 🎯 This Kubernetes v1.35 sneak peek comes in handy as I'll be speaking with many Amazon EKS customers next week at AWS re:Invent The…
Perfect timing! 🎯 This Kubernetes v1.35 sneak peek comes in handy as I'll be speaking with many Amazon EKS customers next week at AWS re:Invent The…
Liked by Lin Sun
-
Come see me! Let’s talk observability, Fluent Bit and OpenSearch!!
Come see me! Let’s talk observability, Fluent Bit and OpenSearch!!
Liked by Lin Sun
-
This is super exciting. I think it's amazing what the team and community has done !!! 🎉
This is super exciting. I think it's amazing what the team and community has done !!! 🎉
Liked by Lin Sun
-
I am feeling proud that I represented #Harri in #CNCF #IstioDay #KubeConNA. I want to thank Harri for supporting me, Lin Sun for being a great…
I am feeling proud that I represented #Harri in #CNCF #IstioDay #KubeConNA. I want to thank Harri for supporting me, Lin Sun for being a great…
Liked by Lin Sun
-
View my verified achievement from Solo.io. A Special thanks to Lin Sun and Christian Posta for the excellent "MCP: Zero to Production" workshop…
View my verified achievement from Solo.io. A Special thanks to Lin Sun and Christian Posta for the excellent "MCP: Zero to Production" workshop…
Liked by Lin Sun
-
We’ve forgotten about how important networking is. Until now with the need to route AI traffic. Networking has always obviously been the most…
We’ve forgotten about how important networking is. Until now with the need to route AI traffic. Networking has always obviously been the most…
Liked by Lin Sun
-
Last week I attended KubeCon NA for the first time and it was in my hometown too. I met some incredible people and learned so much from the…
Last week I attended KubeCon NA for the first time and it was in my hometown too. I met some incredible people and learned so much from the…
Liked by Lin Sun
-
🚀 Excited to share my latest blog post on the AWS Containers Blog! Introducing the 𝐟𝐮𝐥𝐥𝐲 𝐦𝐚𝐧𝐚𝐠𝐞𝐝 𝐀𝐦𝐚𝐳𝐨𝐧 𝐄𝐊𝐒 𝐌𝐂𝐏…
🚀 Excited to share my latest blog post on the AWS Containers Blog! Introducing the 𝐟𝐮𝐥𝐥𝐲 𝐦𝐚𝐧𝐚𝐠𝐞𝐝 𝐀𝐦𝐚𝐳𝐨𝐧 𝐄𝐊𝐒 𝐌𝐂𝐏…
Liked by Lin Sun
Other similar profiles
-
Christopher Ferris
Christopher Ferris
-
Priyesh Lakar
Priyesh Lakar
-
Navaneeth Krishnan
Navaneeth Krishnan
-
William F. Gilreath
William F. Gilreath
-
Ricardo Rossi
Ricardo Rossi
-
Eduardo Patrocinio
Eduardo Patrocinio
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content