Patent application number | Description | Published |
20090271448 | System, Method, and Computer Readable Media for Identifying a User-Initiated Log File Record in a Log File - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 10-29-2009 |
20090292742 | System, Method, and Computer Readable Media for Identifying a Log File Record in a Log File - A system, a method, and a computer readable media for identifying a log file record in a log file are provided. The log file has a plurality of log file records therein. The plurality of log file records has a repeating pattern of log file records. The method includes displaying a first graphical user interface on a display device. The method further includes selecting the log file utilizing the first graphical user interface. The method further includes analyzing the log file to determine the repeating pattern of log file records. The method further includes selecting a first command button on the first graphical user interface that executes an algorithm to analyze additional log file records that were automatically added to the log file by a software program. The additional log file records are associated with the repeating pattern of log file records. The method further includes storing the first log file record in a memory device if a first log file record in the additional log file records has at least one command-related attribute that does not correspond to command-related attributes in the repeating pattern of log file records. | 11-26-2009 |
20090307267 | REAL-TIME DYNAMIC AND SYNCHRONIZED CAPTIONING SYSTEM AND METHOD FOR USE IN THE STREAMING OF MULTIMEDIA DATA - A dynamic and synchronized real-time captioning system and method for streaming media. A streaming encoder module can provide a code injection to marry textual data and audio/video (AV) data in order to form a text and/or audio stream. A streaming control module can allow an end-user to specify font format utilized to embed into an AV stream. A delay enhancement tool can be adapted to adjust speed of the text and/or audio stream, which allows the end-user to receive the text and/or audio stream at a proper speed. A customized graphical user interface (CGUI) can be adapted to assist with streaming administration to provide an encoding option, caption source location, delay control and slide control. Therefore, the captioning system can be able to synchronize and deliver the textual data and the AV data for live media streaming at an end-user's system. | 12-10-2009 |
20100070584 | METHOD AND SYSTEM FOR DYNAMIC E-MAIL VIEW CONVERSION - A method and system for dynamic e-mail view conversion. An e-mail inbox capable of displaying one or more e-mail messages associated with a particular thread can be dynamically consolidated. Next, the e-mail messages associated with the particular thread can be converted into a forum-like list. Thereafter, varying viewing options are provided with respect to the e-mail inbox in order to optimize user interaction with the e-mail inbox through the use of the forum-like list. | 03-18-2010 |
20100250478 | Demo Verification Provisioning - A method, system, and computer program product for issuing an alert when a method of a live demonstration deviates from demonstration simulation actions. A computer receives a command to commence a demonstration simulation. During the demonstration simulation, capture logic of a computer is initialized. The capture logic records events of the demonstration simulation. When a live demonstration subsequently initiated, demonstration verification logic of the computer continually monitors, in real-time, events of the live demonstration and compares the events to the previously recorded events captured during the demonstration simulation. In response to detecting that a live demonstration has deviated from the recorded demonstration simulation method, the demonstration verification logic issues a non-invasive alert. The non-invasive alert may be issued using visual, audible, or vibration feedback cues in such manner that an audience observing the live demonstration is un-aware of the non-invasive alert. | 09-30-2010 |
20110066687 | IMAGE RESCALE BASED ON DEFINED CHARACTERISTICS - A system and method automatically rescales an electronic message having one or more associated content. When the electronic message is generated and the associated content connected to the message, an agent of the electronic message application checks predefined settings/configurations of the message client. The sender's e-mail client checks a plurality of conditions, such as, the condition of the network, the type of network, the status or capacity of the receiving inbox of an intended recipient client, and the geographic destination of the message. Based on these dynamic content rescale settings, the sender's client dynamically and optimally rescales the associated content before forwarding the electronic message with the rescaled content to the recipient client. Rescaling of the associated content may be performed by the message exchange server or the recipient client. The recipient client may later request and receive a copy of the associated content without rescaling. | 03-17-2011 |
20120209882 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIA FOR IDENTIFYING A USER-INITIATED LOG FILE RECORD IN A LOG FILE - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 08-16-2012 |
20130298048 | MULTI-SOURCE, MULTI-DESTINATION DATA TRANSFERS - Methods, systems, and products are disclosed for multi-source, multi-destination data transfers that include identifying a plurality of destination points having destination contexts in one or more destination objects; selecting source content for transfer; displaying destination contexts for the destination points; and directing source content to at least one destination point in dependence upon the displayed destination contexts. In typical embodiments, identifying destination points includes recording each identified destination point and storing in association with each recorded destination point a copy of a destination context for each recorded destination point. | 11-07-2013 |
20130305030 | TESTING A CONFIGURATION CHANGE - An approach is presented for testing a change (i.e., configuration change) in a configuration of a computing environment. A user identifier (ID) of a user is received from an administrative user having an administrative user ID. First configurable attributes of the user ID are determined. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is received. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation is performed by tracking data record modifications made by the TSID and based on the configuration change. The user ID and administrative user ID are unaffected by the configuration change. After completing the simulation, the data record modifications are undone. | 11-14-2013 |
20140214777 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIA FOR IDENTIFYING A USER-INITIATED LOG FILE RECORD IN A LOG FILE - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 07-31-2014 |
20140317153 | PROCESSING DATA LOADS - A method and system for processing a data load. A request is received for a data load to load data into a database in accordance with a data template that includes data to be loaded into the database. The template includes columns and rows. The request specifies a request type characterized by at least one column that collectively includes unique data for each row. The columns include N sets of columns (N≧1) in addition to the at least one column. The data load is split into multiple loads of data. The multiple loads include one load and N additional loads. The one load is associated with the at least one column. The N additional loads are respectively associated with the N sets of columns and are configured to generate or modify one or more rows in each table of N respective additional tables in the database. | 10-23-2014 |