Patent application number | Description | Published |
20080209047 | METHOD AND APPARATUS FOR DISTRIBUTED POLICY EVALUATION - In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to at least a second autonomic manager and receiving at least partial evaluation results for the policy from at least the second autonomic manager. | 08-28-2008 |
20080240158 | METHOD AND APPARATUS FOR SCALABLE STORAGE FOR DATA STREAM PROCESSING SYSTEMS - In one embodiment, the invention is a method and apparatus for scalable storage for data stream processing systems. One embodiment of a system for processing a data stream, includes a first set of processing elements configured for processing of at least the lightweight portion of an information unit and a second set of processing units configured for storage of the heavyweight portion of the information unit. | 10-02-2008 |
20080244420 | METHOD AND APPARATUS FOR DOCUMENT BROWSING - A method, system and program storage device for browsing hyperlinked documents are provided. A method in one aspect may include enabling navigating from a document having a plurality of hyperlinks to a document associated with one of said plurality of hyperlinks; and enabling navigating directly from said document associated with one of said plurality of hyperlinks to another document associated with another one of said plurality of hyperlinks using one or more of a plurality of defined elements. System and program storage device for performing the above methods are also provided. | 10-02-2008 |
20080259789 | METHOD AND APPARATUS FOR RE-ESTABLISHING ANONYMOUS DATA TRANSFERS - One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint. The neighbor node's repair server is contacted for a repair node associated with the neighbor node, and a connection to the repair node is made such that the path is established in a manner that maintains anonymity of the first endpoint and the second endpoint relative to each other. | 10-23-2008 |
20080259940 | METHOD AND APPARATUS FOR PEER-TO-PEER CONNECTION ASSISTANCE - One embodiment of the present method and apparatus for assisting a peer-to-peer connection between a first node and a second node includes receiving, at a third node, a request for connection assistance from one of the first and second nodes. The third node then connects to both the first node and the second node, receives the data from the first node and delivers the data to the second node. In this manner, data may be transferred between the first and second nodes even if the first and second nodes are unable to directly connect to each other (e.g., due to permanent or temporary limitations). | 10-23-2008 |
20080263030 | METHOD AND APPARATUS FOR MANAGING PEER-TO-PEER SEARCH RESULTS - One embodiment of the present method and apparatus for processing a search request message received over a network includes computing a threshold value in accordance with the search request message and returning at least one search result to a user in response to the search request message, if a rank of the at least one search result at least meets the threshold value. | 10-23-2008 |
20080263031 | METHOD AND APPARATUS FOR CREATING SEARCHES IN PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for creating searches in peer-to-peer networks includes forming clusters comprising data from a user's media library and formulating at least one search request message in accordance with the clusters. Formation of the clusters may be guided at least in part by data attributes that the user indicates are important. In this way, the user's media library may be “mined” for information that will aid in creating searches for data that the user may be interested in, but may not necessarily know how to search for or may not necessarily know exists. | 10-23-2008 |
20080263202 | METHOD AND APPARATUS FOR REDUCING SPAM ON PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content). | 10-23-2008 |
20090132939 | METHOD AND APPARATUS FOR A FLOATING ISLAND FOR USER NAVIGATION IN AN INTERACTIVE ENVIRONMENT - This invention provides a method for dynamically calculating and presenting a graphical user interface (GUI) within the display device in a computing system including a display device and an input device. The method includes creating a shared icon space within the GUI, automatically populating the shared icon space with GUI icons including stacking and clustering the GUI icons in the shared icon space based on current context, and potential user needs in view of the current user context and modifying the shared icon space in response to a detected change in current context. | 05-21-2009 |
20090150807 | METHOD AND APPARATUS FOR AN IN-CONTEXT AUTO-ARRANGABLE USER INTERFACE - A method for dynamically re-calculating and presenting a graphical user interface (GUI) that includes interface icons based on user context, includes, for a current user, determining a change in user context associated with the GUI. The method then modifies one of a state, appearance and spatial placement of the user interface icons within the GUI automatically, in accordance with a determined change in user context. The step of determining a change in user context may further include analyzing a set of contextual attributes associated with the user. For that matter, the step of determining is preferably automatically triggered by at least one factor from a group of factors, the group of factors including a) a creation date of a data item associated with the current user, b) a modification date of a data item associated with the current user, c) a last-accessed date of a data item associated with the current user, d) a type of a data item associated with the current user, e) a location of a data item associated with the current user, f) a category of a data item's content, the data item associated with the current user, g) a size of a data item, the data item associated with the current user, h) a source of a data item associated with the current user and i) a completeness of a data item associated with the current user. | 06-11-2009 |
20090177597 | SYSTEMS, METHODS AND COMPUTER PRODUCTS FOR PROFILE BASED IDENTITY VERIFICATION OVER THE INTERNET - Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a system including an activity classifier configured to receive Internet activity input including email, chat, browser and voice over Internet Protocol (VoIP) logs/streams, an email profiler, a chat, a browser profiler, a voice over Internet Protocol (VoIP) logs/streams profiler, wherein the profilers are configured to extract values from the Internet Activity input attributes from the data set, a score calculator configured to receive the attributes and calculate the score of the data set, a categorization engine configured to receive the score from the score calculator and map the data set to an individual or class of individuals based on the value of the score and on a database of activity-specific attributes and an application configured to place weights on the activity specific and generic attributes to define a score function from the score. | 07-09-2009 |
20090222561 | Method, Apparatus and Computer Program Product Implementing Session-Specific URLs and Resources - Methods, apparatus and computer program products implement session-specific URIs for allocating network resources by receiving a request from a user for at least one network resource; assigning a session-specific URI to the at least one network resource for use in identifying the at least one network resource and controlling access to the at least one network resource; updating a network directory service with the session-specific URI; and communicating the session-specific URI to the user. The user communicates the session-specific URI to other participants in the session during which the at least one network resource will be used. After a pre-determined time, the session ends and the at least one network resource is de-allocated by, for example, changing the URI of the at least one network resource. Frequent changes of URIs hinder efforts by unauthorized individuals to gain access to network resources. | 09-03-2009 |
20090222727 | Method, Apparatus and Computer Program Product for Capturing and Viewing Stored Web Resource Interactions - Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control. | 09-03-2009 |
20090249188 | METHOD FOR ADAPTIVE TRANSCRIPTION OF WEB PAGES - A web page is adaptively transcribed and rendered at a client endpoint. A request for a web page is received, and full page content of the web page is obtained from a remote web server, including assembly of previously cached parts of the web page. The web page is transcribed according to prescribed rules. The prescribed rules are selected according to user preferences, the environmental factors and information learned from prior handling of the web page. The transcribed web page is rendered. | 10-01-2009 |
20100005402 | System and Apparatus for Whispering in Group Chats - A method, system and program storage device are provided for allowing chat room participants to communicate with other participants privately without requiring general chat “friends” or “buddies” pre-authorization. All chatting dialog including private and public chats are consolidated into a unified group chat dialog window that requires no special handling by a user to see public and private chats. The private and public chat messages are displayed chronologically in a single chat message log within the chat group window. | 01-07-2010 |
20120102543 | Audit Management System - A computer implemented method and system for managing an audit of one or more network layer devices is provided. An audit management system accessible by a user via a graphical user interface acquires network layer device information of the network layer devices and a configuration file comprising configuration file commands. The audit management system allows creation and/or selection of one or more audit policies for the network layer devices. The audit policies comprise one or more audit rules that define functioning of the network layer devices for one or more compliance policies. The audit management system executes the audit policies for performing the audit of the network layer devices by comparing the configuration file commands of the configuration file with the audit rules of the audit policies, and generates a report comprising information about security and compliance of the network layer devices with the compliance policies based on the audit. | 04-26-2012 |