Patent application number | Description | Published |
20140215353 | CONTROLLING WHICH USERS FROM AN ORGANIZATION ARE TO BE PART OF A COMMUNITY SPACE IN AN EASY AND ERROR-FREE MANNER - A method, system and computer program product for controlling which users from an organization are to be part of a community space. A community collaboration mechanism provides a list of organizations authorized to collaborate with the organization of the user. The mechanism then receives from the user a selection of organizations from this list of organizations. Upon receiving indication(s) (e.g., e-mail addresses) of users to be added to the community space, the mechanism provides a list of users who are members of the user selected organizations to engage in a collaborative activity with the user based on these indication(s). The mechanism then receives a selection of users from this list of users and adds those users to the community space. In this manner, the user can control which users from an organization are to be part of a community space in an easy and error-free manner. | 07-31-2014 |
20140215354 | INDICATING ORGANIZATION OF VISITOR ON USER INTERFACE OF USER ENGAGED IN COLLABORATIVE ACTIVITY WITH VISITOR - A method, system and computer program product for indicating an organization of a visitor on a user interface of a user engaged in collaborative activity with the visitor. The visitor attempting to engage in a collaborative action (e.g., participating in an online meeting, sharing files) with a user from a different organization is authenticated to confirm that the visitor has the right to engage in collaborative activity with the user from the different organization. The identification of the organization of the visitor is extracted from the information used to authenticate the visitor. The identification of the organization of the visitor is then displayed on the user interface of the user engaging in the collaborative action with the visitor. In this manner, the organization of the visitor is easily discoverable by the user without requiring the user to perform a time consuming search to determine the organization of the visitor. | 07-31-2014 |
20140215357 | CONTROLLING WHICH USERS FROM AN ORGANIZATION ARE TO BE PART OF A COMMUNITY SPACE IN AN EASY AND ERROR-FREE MANNER - A method, system and computer program product for controlling which users from an organization are to be part of a community space. A community collaboration mechanism provides a list of organizations authorized to collaborate with the organization of the user. The mechanism then receives from the user a selection of organizations from this list of organizations. Upon receiving indication(s) (e.g., e-mail addresses) of users to be added to the community space, the mechanism provides a list of users who are members of the user selected organizations to engage in a collaborative activity with the user based on these indication(s). The mechanism then receives a selection of users from this list of users and adds those users to the community space. In this manner, the user can control which users from an organization are to be part of a community space in an easy and error-free manner. | 07-31-2014 |
20140215564 | INDICATING ORGANIZATION OF VISITOR ON USER INTERFACE OF USER ENGAGED IN COLLABORATIVE ACTIVITY WITH VISITOR - A method, system and computer program product for indicating an organization of a visitor on a user interface of a user engaged in collaborative activity with the visitor. The visitor attempting to engage in a collaborative action (e.g., participating in an online meeting, sharing files) with a user from a different organization is authenticated to confirm that the visitor has the right to engage in collaborative activity with the user from the different organization. The identification of the organization of the visitor is extracted from the information used to authenticate the visitor. The identification of the organization of the visitor is then displayed on the user interface of the user engaging in the collaborative action with the visitor. In this manner, the organization of the visitor is easily discoverable by the user without requiring the user to perform a time consuming search to determine the organization of the visitor. | 07-31-2014 |
20140237040 | SOCIAL NETWORK PRUNING - A social networking service is provided, the social networking service having a user with a social connection to a first contact within a social network of the user and a social connection to a second contact with the social network of the user, wherein the first contact has a separate social connection to the second contact within a social network of the first contact. A computer system determines that the first contact has lowered a strength of the social connection to the second contact within the social network of the first contact. Based, at least in part, on the lowering of the strength of the social connection to the second contact within the social network of the first contact, the computer system recommends, to the user, to lower a strength of the social connection to the second contact within the social network of the user. | 08-21-2014 |
20140237046 | SOCIAL NETWORK PRUNING - A social networking service is provided, the social networking service having a user with a social connection to a first contact within a social network of the user and a social connection to a second contact with the social network of the user, wherein the first contact has a separate social connection to the second contact within a social network of the first contact. A computer system determines that the first contact has lowered a strength of the social connection to the second contact within the social network of the first contact. Based, at least in part, on the lowering of the strength of the social connection to the second contact within the social network of the first contact, the computer system recommends, to the user, to lower a strength of the social connection to the second contact within the social network of the user. | 08-21-2014 |
20140297633 | CALCULATING LISTS OF EVENTS IN ACTIVITY STREAMS - A method for calculating lists of events in activity streams includes calculating a list of activity events for a user's activity stream based on weights assigned to implicit actions and explicit actions; and prioritizing the list of the activity events in the user's activity stream based on the weights. | 10-02-2014 |
20140297634 | CALCULATING LISTS OF EVENTS IN ACTIVITY STREAMS - A method for calculating lists of events in activity streams includes calculating a list of activity events for a user's activity stream based on weights assigned to implicit actions and explicit actions; and prioritizing the list of the activity events in the user's activity stream based on the weights. | 10-02-2014 |
20140310357 | DIRECTED MESSAGE NOTIFICATION IN CHAT SESSIONS - Embodiments of the present invention disclose a method, computer program product, and system for managing messages in an instant messaging chat session. A computer receives a directed message in the instant messaging chat session, wherein the directed message includes an identification of one or more accounts associated with individuals in the instant messaging chat session. The computer determines accounts associated with individuals in the instant messaging chat session that correspond to the directed message, wherein the accounts associated with individuals that correspond to the directed message include an account associated with an individual that sent the directed message, and the one or more accounts associated with individuals identified in the directed message. The computer displays directed message notifications to the determined accounts associated with individuals that correspond to the directed message. In another embodiment, the computer receives a response to a directed message, and updates the directed message notifications. | 10-16-2014 |
20140337334 | ALTERING RELEVANCY OF A DOCUMENT AND/OR A SEARCH QUERY - Various embodiments provide for altering relevancy of a document by adding (e.g., to an index associated with the document) one or more term relationships (which may result, for example, in adding one or more non-obvious terms). Other embodiments provide for altering relevancy of a search query by adding to the search query one or more terms based upon one or more determined term relationships (in one example, the added term(s) may be one or more non-obvious terms). | 11-13-2014 |
20150052199 | UPDATING TIME-RELATED INFORMATION IN POST TO MAKE IT MORE RELEVANT FOR THE REQUESTER ON SUBSEQUENT RETRIEVAL OF POST - A method, system and computer program product for updating the time-related information in a post to make it more relevant for the requester on a subsequent retrieval of the post. A post with a reference to an event or activity (e.g., “leaving for Florida in 3 days”) is identified using natural language processing. Upon receiving a request from a requester to retrieve the post prior to the expiration of the event/activity, the post is updated by substituting a time countdown in the post with an up-to-date time countdown or with a current status of the referenced event/activity. If, however, the request is received after the expiration of the event/activity, then the post is removed or updated with an indication that the referenced event/activity has expired. In this manner, the requester will be receiving more accurate and relevant time-related information concerning the event or activity referenced in the post. | 02-19-2015 |
20150052201 | UPDATING TIME-RELATED INFORMATION IN POST TO MAKE IT MORE RELEVANT FOR THE REQUESTER ON SUBSEQUENT RETRIEVAL OF POST - A method, system and computer program product for updating the time-related information in a post to make it more relevant for the requester on a subsequent retrieval of the post. A post with a reference to an event or activity (e.g., “leaving for Florida in 3 days”) is identified using natural language processing. Upon receiving a request from a requester to retrieve the post prior to the expiration of the event/activity, the post is updated by substituting a time countdown in the post with an up-to-date time countdown or with a current status of the referenced event/activity. If, however, the request is received after the expiration of the event/activity, then the post is removed or updated with an indication that the referenced event/activity has expired. In this manner, the requester will be receiving more accurate and relevant time-related information concerning the event or activity referenced in the post. | 02-19-2015 |
20150073776 | CHECKING DOCUMENTS FOR SPELLING AND/OR GRAMMATICAL ERRORS AND/OR PROVIDING RECOMMENDED WORDS OR PHRASES BASED ON PATTERNS OF COLLOQUIALISMS USED AMONG USERS IN A SOCIAL NETWORK - A method, system and computer program product for checking documents using colloquialisms. Colloquialisms used in messages by users in a social network are tracked. The relationships (e.g., co-worker) between the senders and recipients of these messages are identified. A social graph is then generated to depict the relations between the users in the social network based on these identified relationships. Furthermore, usage patterns of colloquialisms (e.g., a particular colloquialism is used only with close friends as opposed to co-workers) are formulated. A rule set is generated using the social graph and formulated usage patterns. By using the rule set to check documents, documents may be more accurately checked for spelling and/or grammatical errors by taking into consideration the appropriate usage of colloquialisms based on the context (e.g., communicating with a friend). Furthermore, alternative words or phrases may be appropriately recommended based on the context using such a rule set. | 03-12-2015 |
20150074172 | CHECKING DOCUMENTS FOR SPELLING AND/OR GRAMMATICAL ERRORS AND/OR PROVIDING RECOMMENDED WORDS OR PHRASES BASED ON PATTERNS OF COLLOQUIALISMS USED AMONG USERS IN A SOCIAL NETWORK - A method, system and computer program product for checking documents using colloquialisms. Colloquialisms used in messages by users in a social network are tracked. The relationships (e.g., co-worker) between the senders and recipients of these messages are identified. A social graph is then generated to depict the relations between the users in the social network based on these identified relationships. Furthermore, usage patterns of colloquialisms (e.g., a particular colloquialism is used only with close friends as opposed to co-workers) are formulated. A rule set is generated using the social graph and formulated usage patterns. By using the rule set to check documents, documents may be more accurately checked for spelling and/or grammatical errors by taking into consideration the appropriate usage of colloquialisms based on the context (e.g., communicating with a friend). Furthermore, alternative words or phrases may be appropriately recommended based on the context using such a rule set. | 03-12-2015 |
20150074207 | MANAGING EMAIL CONTENT IN AN ACTIVITY STREAM - Managing email content in an activity stream includes receiving a selection of a number of criteria that indicate content to be presented in an activity stream, retrieving email content based on the number of criteria, and displaying the email content in an activity stream by referencing email data related to the metadata. | 03-12-2015 |
20150074547 | MANAGING EMAIL CONTENT IN AN ACTIVITY STREAM - Managing email content in an activity stream includes receiving a selection of a number of criteria that indicate content to be presented in an activity stream, retrieving email content based on the number of criteria, and displaying the email content in an activity stream by referencing email data related to the metadata. | 03-12-2015 |
20150193890 | ALLOWING A USER TO VIEW NETWORK CONTACTS OF OTHER USERS WHEN VISITING AN ENVIRONMENT OF A DIFFERENT ORGANIZATION - A method, system and computer program product for allowing a user to view network contacts of other users when visiting an environment of a different organization. A visitor requests to view a profile of a user while the visitor is visiting the environment or tenant space of a different organization. The organization of the visitor is obtained. Furthermore, the organization and network contacts of the user whose profile is requested to be viewed are obtained in response to validating the visitor's organization. The requested profile is then displayed to the visitor containing the accessible network contacts (if any) of the user based on whether the user and the visitor belong to the same organization. | 07-09-2015 |
20150195312 | ALLOWING A USER TO VIEW NETWORK CONTACTS OF OTHER USERS WHEN VISITING AN ENVIRONMENT OF A DIFFERENT ORGANIZATION - A method, system and computer program product for allowing a user to view network contacts of other users when visiting an environment of a different organization. A visitor requests to view a profile of a user while the visitor is visiting the environment or tenant space of a different organization. The organization of the visitor is obtained. Furthermore, the organization and network contacts of the user whose profile is requested to be viewed are obtained in response to validating the visitor's organization. The requested profile is then displayed to the visitor containing the accessible network contacts (if any) of the user based on whether the user and the visitor belong to the same organization. | 07-09-2015 |
20150213083 | ROLE-RELATIVE SOCIAL NETWORKING - A role-based social network follow request that identifies a specified user role to follow within a social network is received from a social network user. A social network role-based query, derived from the specified user role identified within the role-based social network follow request, is executed. In response to executing the social network role-based query, role-based information of social network users within the social network is retrieved. Another social network user that matches the specified user role is identified based upon the retrieved role-based information of the social network users. Role-based social network following of the matching other social network user is configured for the requesting social network user. | 07-30-2015 |
20150213085 | ROLE-RELATIVE SOCIAL NETWORKING - A role-based social network follow request that identifies a specified user role to follow within a social network is received from a social network user. A social network role-based query, derived from the specified user role identified within the role-based social network follow request, is executed. In response to executing the social network role-based query, role-based information of social network users within the social network is retrieved. Another social network user that matches the specified user role is identified based upon the retrieved role-based information of the social network users. Role-based social network following of the matching other social network user is configured for the requesting social network user. | 07-30-2015 |
20150220651 | CAPTURING AND MANAGING KNOWLEDGE FROM SOCIAL NETWORKING INTERACTIONS - Presenting a marking element in a social networking interaction where the marking element includes a question specifier and an answer specifier, creating a knowledge element in response to a user activating the marking element on the social networking interaction or a portion thereof, and presenting a knowledge element indicator in the social networking interaction. | 08-06-2015 |
20150220834 | CAPTURING AND MANAGING KNOWLEDGE FROM SOCIAL NETWORKING INTERACTIONS - Presenting a marking element in a social networking interaction where the marking element includes a question specifier and an answer specifier, creating a knowledge element in response to a user activating the marking element on the social networking interaction or a portion thereof, and presenting a knowledge element indicator in the social networking interaction. | 08-06-2015 |
20150222566 | MODIFYING AN ACTIVITY STREAM TO DISPLAY RECENT EVENTS OF A RESOURCE - Modifying an activity stream to display recent events of a resource includes checking-in a user to a resource to provide context about the resource, specifying a time duration for which the user is checked-in to the resource, and modifying, based on the time duration, an activity stream of the user to display recent events of the resource. | 08-06-2015 |
20150222718 | MODIFYING AN ACTIVITY STREAM TO DISPLAY RECENT EVENTS OF A RESOURCE - Modifying an activity stream to display recent events of a resource includes checking-in a user to a resource to provide context about the resource, specifying a time duration for which the user is checked-in to the resource, and modifying, based on the time duration, an activity stream of the user to display recent events of the resource. | 08-06-2015 |
20150312286 | SOCIAL SHARING OF CONTACTS INFORMATION - Sharing contact information among one or more communities or individuals in a social media environment, in one aspect, may comprise creating contact information associated with contact as social media content based on input from a first user. At least a portion of the contact information may be shared with a plurality of second users via a social media like application. | 10-29-2015 |
20150312328 | SOCIAL SHARING OF CONTACTS INFORMATION - Sharing contact information among one or more communities or individuals in a social media environment, in one aspect, may comprise creating contact information associated with contact as social media content based on input from a first user. At least a portion of the contact information may be shared with a plurality of second users via a social media like application. | 10-29-2015 |
20150379031 | IDENTIFYING CONTENT UNDER ACCESS CONTROL - A search query is received from a first user through one or more input devices. A set of results is determined from content stored on a computer system based on the search query. The set of results includes a first subset of results not accessible to the first user due to access control. A list of results is provided to the first user. The list excludes the first subset of results. A target result is identified from the first subset of results. An owner is identified with control over access to the target result. The owner is notified that the target result is not accessible to at least one user. | 12-31-2015 |
Patent application number | Description | Published |
20110041823 | TOY DART MAGAZINE APPARATUS - A toy dart magazine apparatus that includes a housing divided into a drum portion and a clip portion, and a wheel structure rotatably mounted to the drum portion. The wheel has four portions, two spaced apart portions having peripheral recesses for receiving the darts and storing them until they are “fired” by a launcher to which the dart magazine apparatus is mounted. A third portion having a smooth circumference and a smaller diameter than the two recess bearing portions wherein the third portion separates the two spaced apart portions. The fourth portion of the wheel has a larger diameter than the two recess bearing portions and is positioned adjoining one of the two recess bearing portions for aligning the darts relative to the wheel. The wheel also includes an opening in the third portion leading to a chamber in a hollow support of the wheel. A spring-biased knob is mounted on a shaft that also mounts the wheel. Both the knob and the wheel have axially align protrusions that may engage each other to allow the wheel to be rotationally adjusted to correct any jam or misalignment of the darts stored on the wheel. A flexible arm and a pusher structure are also included with the magazine apparatus and are connected to a constant force spring, where the flexible arm and a portion of the constant force spring are lodged in the chamber of the hollow support during a dart loading process of the wheel, and the constant force spring uncoils when the wheel is rotated during the loading process. The constant force spring biases the wheel to feed the darts from both the drum and the clip to a firing position at the end of the clip located in the launcher, but the constant force spring is insufficient to discharge the darts when the magazine is not connected to the launcher. | 02-24-2011 |
20120125304 | TOY LAUNCHER APPARATUS WITH FIXED LOADABLE MAGAZINE - A toy launcher apparatus for discharging soft foam projectiles, the apparatus having a housing, a projectile launching assembly including a launching tube and a launching spring, a trigger and a cocking assembly. The apparatus also includes a magazine container for storing a stack of projectiles and having a projectile receiving opening to enable loading of projectiles into the magazine container without removing the magazine container from the housing. This is accomplished by the apparatus having a horizontal panel operatively connected to the magazine container's upper portion and movable between a first position where the panel is retracted and does not block the projectile receiving opening and a second position where the panel blocks the projectile receiving opening during a cocking cycle of the cocking assembly. The apparatus also includes a vertical panel movable between first and second positions, where in the first position the panel blocks a breech of the apparatus to prevent jamming of projectiles, and when in the second position the breech is unblocked or opened for loading. The apparatus further includes a projectile loader that is also movable between first and second positions, such that when moving from the first position to the second position the projectile loader inserts a projectile into the open breech. During a cocking cycle, when the launching spring is compressed and captured, the horizontal panel, the vertical panel and the projectile loader move between their two positions. At all other times of play a user is allowed to load the magazine at any time a user desires without removing the magazine from the remainder of the apparatus. | 05-24-2012 |
20130074818 | TOY PROJECTILE LAUNCHER APPARATUS - Several variations of a toy projectile launcher apparatus for discharging EVA balls. The apparatus includes a housing, a barrel portion, a grip portion, a trigger, a ram movable in the housing, a carriage also movable in the housing, a negator spring, handles for cocking the apparatus, and a lever pivotally mounted to a shaft in the housing just behind a ball to be discharged. In operation, a user pulls a handle rearward to move the ram and carriage and extend the spring. Pulling the trigger disengages the ram to impact the lever causing the lever to slap the ball to cause discharge of the ball. The lever and the shaft may be moved from side to side to cause the ball to be discharged straight ahead or curved to the left or right. | 03-28-2013 |
20130102223 | SPINNING TOY APPARATUS - A toy apparatus having a lower base, an upper base and a doll cover for the upper base where the lower base and the upper base attach and detach with an easy twisting motion. The lower base encloses a flywheel on a shaft, and a passageway for a rack and includes a cover with an outside screw thread. The upper base is either empty or encloses three switches, a sound generator, a light source, a controller printed circuit board, and a battery chamber and includes a cover with an inside screw thread that mates with the screw thread of the lower base. The toy apparatus has two primary play modes, a first mode where the lower base, the upper base and the cover are connected and a user uses the rack to spin the flywheel. | 04-25-2013 |
Patent application number | Description | Published |
20130345863 | USER INTERFACES FOR ROBOT TRAINING - In accordance with various embodiments, a user interface embedded into a robot facilitates robot training via direct and intuitive physical interactions. In some embodiments, the user interface includes a wrist cuff that, when grasped by the user, switches the robot into zero-force gravity-compensated mode. | 12-26-2013 |
20130345869 | USER INTERFACES FOR ROBOT TRAINING - In accordance with various embodiments, a user-guidable robot appendage provides haptic feedback to the user. | 12-26-2013 |
20130345872 | USER INTERFACES FOR ROBOT TRAINING - In accordance with various embodiments, a user interface embedded into a robot facilitates robot training via direct and intuitive physical interactions. | 12-26-2013 |
20130345873 | TRAINING AND OPERATING INDUSTRIAL ROBOTS - Robots may manipulate objects based on sensor input about the objects and/or the environment in conjunction with data structures representing primitive tasks and, in some embodiments, objects and/or locations associated therewith. The data structures may be created by instantiating respective prototypes during training by a human trainer. | 12-26-2013 |
20130345874 | TRAINING AND OPERATING INDUSTRIAL ROBOTS - Robots may manipulate objects based on sensor input about the objects and/or the environment in conjunction with data structures representing primitive tasks and, in some embodiments, objects and/or locations associated therewith. The data structures may be created by instantiating respective prototypes during training by a human trainer. | 12-26-2013 |
20130345875 | TRAINING AND OPERATING INDUSTRIAL ROBOTS - Robots may manipulate objects based on sensor input about the objects and/or the environment in conjunction with data structures representing primitive tasks and, in some embodiments, objects and/or locations associated therewith. The data structures may be created by instantiating respective prototypes during training by a human trainer. | 12-26-2013 |
20140067121 | SYSTEMS AND METHODS FOR SAFE ROBOT OPERATION - In various embodiments, safe collaboration between a robot and humans is achieved by operating the robot continuously at or below a first threshold speed at which any collisions with a person's arms do not cause harm, and, upon detection of the person's torso or head within a danger zone around the robot, reducing the speed to or below a second threshold at which any collisions with the person's torso or head do not cause harm. | 03-06-2014 |
20150105908 | ROBOTIC PLACEMENT AND MANIPULATION WITH ENHANCED ACCURACY - Systems and methods for providing precise robotic operations without the need for special or task-specific components utilize, in one implementation, a spatial adjustment system, physically separate from the robotic manipulator, supports the target workpiece and works in concert with the robotic manipulator to perform tasks with high spatial precision. | 04-16-2015 |
Patent application number | Description | Published |
20140130127 | Risk Adjusted, Multifactor Authentication - A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource; applying weights to the values for the authentication factors; and determining, based on a comparison of the weighted values to the adjusted authentication standard, whether the user is authorized to access the resource. | 05-08-2014 |
20140331293 | Risk Adjusted, Multifactor Authentication - A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource; applying weights to the values for the authentication factors; and determining, based on a comparison of the weighted values to the adjusted authentication standard, whether the user is authorized to access the resource. | 11-06-2014 |
20140379544 | METHODS AND SYSTEMS FOR EXPEDITED TRADING ACCOUNT FUNDING - A computer-implemented method is provided for opening an expedited account for a user. The method includes receiving a request from the user to make a trade associated with at least one financial instrument, in the absence of an account being opened for the user. The method includes determining a plurality of factors in response to the request, the plurality of factors including 1) a credit worthiness score of the user; 2) a source of capital identified by the user to cover the trade; and 3) a type of the at least one financial instrument associated with the trade. The method also includes opening the expedited account for the user with limited trading privileges, in which an amount of fund for trading is advanced to the user based on the plurality of factors. The method further includes allowing the user to make a trade up to the amount of fund advanced. | 12-25-2014 |
20150262573 | Interpretation of Natural Communication - A computer-implemented method, including receiving by one or more computer systems input information that represents a multi-dimensional communication; detecting, based on contents of the input information, a plurality of communication inputs; applying one or more weighted values to one or more of the communication inputs; assigning, based on application of the one or more weighted values, confidence levels to the communications inputs; determining which of the confidence levels are below a confidence threshold; executing one or more disambiguation rules to disambiguate the communication inputs with confidence levels below the confidence threshold; and generating a communication instruction to perform an action that is specified by the multi-dimensional communication. | 09-17-2015 |