Presler-Marshall
Martin Presler-Marshall, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20090094675 | SYSTEM AND PROGRAM PRODUCT FOR AUTOMATICALLY MANAGING INFORMATION PRIVACY - A request including a call for the information in a bean and a purpose for the call is received. Upon receipt, the purpose is compared to a privacy control policy that is packaged with the bean. If the purpose complies with the privacy control policy, the requested access and/or use of the information is permitted. | 04-09-2009 |
Martin J. Presler-Marshall, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20090055811 | REDUCING THE RUN-TIME COST OFINVOKING A SERVER PAGE - The present invention is a method, system and apparatus for reducing the run-time cost of invoking a server page. The system can include a server page translation unit configured to translate a server page document into program code. The system also can include a program code compiler configured to compile the program code into a program object. Finally, the system can include an optimization processor programmed to modify the program code to permit direct invocation of the program object by external program objects bypassing a server engine typically used to invoke the server page. Notably, in a preferred aspect of the invention the server page can be a JSP. Similarly, the program code can be Java source code and the program object can be a Java class. Finally, the external program objects can be servlets. | 02-26-2009 |
Martin J.c. Presler-Marshall, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20140169545 | UNIFIED COMMUNICATIONS USING CALLED PARTY LOCATION - Call processing can include receiving a call directed to a first destination device associated with a called party, determining, using a processor, an attribute of the call, and determining a location of the called party. A call processing rule can be selected that matches the attribute of the call and the location of the called party. The call can be redirected to a second and different destination device according to the matched call processing rule. | 06-19-2014 |
Martin J. C. Presler-Marshall, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20100050162 | AUTOMATICALLY DETECTING NON-MODIFYING TRANSFORMS WHEN PROFILING SOURCE CODE - A code profiler can be digitally encoded in a storage medium that is configured to automatically detect an existence of non-modifying transforms within monitored programmatic code using hash codes of arguments of the monitored programmatic code. | 02-25-2010 |
20140171050 | UNIFIED COMMUNICATIONS USING CALLED PARTY LOCATION - Call processing can include receiving a call directed to a first destination device associated with a called party, determining, using a processor, an attribute of the call, and determining a location of the called party. A call processing rule can be selected that matches the attribute of the call and the location of the called party. The call can be redirected to a second and different destination device according to the matched call processing rule. | 06-19-2014 |
Martin J. C. Presler-Marshall, Research Triangle Park, NC US
Patent application number | Description | Published |
---|---|---|
20140019944 | Automated Identification of Redundant Method Calls - Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running. The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold. | 01-16-2014 |
20150089482 | Automated Identification of Redundant Method Calls - Embodiments of the invention may provide for collecting specified data each time that a call to a given method occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process may further include storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running The collected data may be selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold. | 03-26-2015 |
Martin Joseph Clayton Presler-Marshall, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20100107144 | AUTOMATED IDENTIFICATION OF REDUNDANT METHOD CALLS - Embodiments of the invention use an automated procedure to detect the occurrence of redundant or duplicate method calls in a running program. Software developers may then be notified of the redundant calls, and correct the redundancies if necessary. One embodiment, directed to a process or inventive method, is associated with a program disposed to run on a data processing system, wherein the program is provided with one or more methods that can be selectively called when the program is running. The process includes the step of collecting specified data each time that a call to a given one of the methods occurs, wherein a given call to the given method is associated with a set of arguments comprising one or more particular argument values for the given method, and the collected data includes an element uniquely identifying each of the particular argument values. The process further includes storing the collected data at a selected location, and selecting a call threshold for the given method, wherein the call threshold comprises a specified number of occurrences of the given call to the given method, when the program is running. The collected data is selectively analyzed at the storage location, to determine whether an occurrence of the given call to the given method has exceeded the call threshold. | 04-29-2010 |