Li Ge - Austin TX, US Hui Jiang - Austin TX, US Yu Tang - Round Rock TX, US Ping Wang - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709219
Abstract:
Accessing a digital file from a database which includes the steps of determining a first set of data entry protocols for enabling a user to access i. e. preview at least one portion of the digital file, enabling a user to access the one or more portions by entering the first set of protocols, determining a second set of data entry protocols for enabling a user to access the entire digital file from the database, and enabling a user to access the entire digital file by entering the second set of data entry protocols in response to the user accessing the one portion or some threshold of a predetermined number of such portions.
Accessing Of Portions Of An Initial Digital File Preliminary To The Access Of Another Digital File
Li Ge - Austin TX, US Hui Jiang - Austin TX, US Yu Tang - Round Rock TX, US Ping Wang - Austin TX, US
International Classification:
G06F 15/173
US Classification:
709225
Abstract:
Predetermining a first set of data entry protocols for enabling a user to access one or more portions of an initial digital file. Predetermining a second set of data entry protocols for enabling a user to access another digital file by entering this second set of data entry protocols in response to the user accessing a threshold of a predetermined number of such portions. The first set of data entry protocols may include an acceptance by the user to pay a first fee for each accessed portion. In addition, under such circumstances, the access to the another digital file may be offered free of any fee as a reward for the user paying fees for the portions of the initial digital file accessed reaching a predetermined threshold level.
Identification Of A Cause Of An Allocation Failure In A Java Virtual Machine
Li Ge - Austin TX, US Hui Jiang - Austin TX, US Yu Tang - Round Rock TX, US Ping Wang - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707206
Abstract:
A method of identifying a cause of an allocation failure in a Java virtual machine is presented. The method includes getting a stack trace of a thread that triggers an allocation failure. In response to the allocation failure that meets specified criteria, including the stack trace in the Verbose garbage collector output resulting from the garbage collection cycle. The method further includes identifying a cause of the allocation failure from the Verbose garbage collector output that includes the stack trace and taking corrective action to avoid repeating the allocation failure.
Sending And Receiving Electronic Mail Using Group Headers
Li Ge - Austin TX, US Hui Jiang - Austin TX, US Yu Tang - Round Rock TX, US Ping Wang - Austin TX, US
International Classification:
G06F 15/16
US Classification:
709206
Abstract:
A computer implemented method and apparatus for sending and receiving electronic mail messages. A group header is defined using simple mail transmission protocol. The group header provides information about a set of members of a group. The set of members of the group are one or more recipients of the electronic mail message. The group header is placed in the electronic mail message to form a completed electronic mail message addressed to the group. The completed electronic mail is sent to the group.
- San Jose CA, US Bryant Genepang Luk - Round Rock TX, US Yu Tang - Round Rock TX, US Christopher Diebold O'Toole - Cedar Park TX, US Rober He - Pflugerville TX, US
International Classification:
H04N 21/2668 H04N 21/24
Abstract:
A system and method includes a first device with one or more processors coupled to a memory that executes instructions from the memory to perform the steps of receiving a request to begin a videogame; streaming video of the videogame to an audience; determine a popularity of the streaming video; and changing the videogame mechanics based on the popularity of the streaming video.
- San Jose CA, US Bryant Genepang Luk - Round Rock TX, US Robert He - Pflugerville TX, US Ananya Das - Austin TX, US Christopher Diebold O'Toole - Cedar Park TX, US Yu Tang - Round Rock TX, US Richard Chapman Bates - Austin TX, US Jason Ziaja - Cedar Park TX, US
In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
- San Jose CA, US Robert He - Pflugerville TX, US Christopher Diebold O'Toole - Cedar Park TX, US Jennifer T. Robertson - Cedar Park TX, US Yu Tang - Round Rock TX, US
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
- San Jose CA, US Bryant Genepang Luk - Round Rock TX, US Robert He - Pflugerville TX, US Richard Chapman Bates - Austin TX, US Jennifer T. Brenner - Austin TX, US Yu Tang - Round Rock TX, US
International Classification:
G07C 9/00
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Employees Retirement System of Texas Jun 2014 - May 2020
Senior Quantitative Investment Analyst
Purdue University 2012 - 2013
Grader at Quantitative Methods Department
Hsbc Jun 2012 - Aug 2012
Payment Intern
Education:
University of Washington 2013 - 2014
Master of Science, Masters, Management, Applied Mathematics, Finance
Purdue University 2009 - 2013
Bachelors, Bachelor of Science, Management, Information Systems, Finance
Skills:
Financial Modeling R Microsoft Excel Java Accounting Data Analysis Php Information Systems Financial Reporting Oracle Sql Developer @Risk Html Microsoft Project Ibm Rational Tools