Patent application number | Description | Published |
20080297488 | METHOD AND SYSTEM FOR PROVIDING DIRECTIONS FOR DRIVING - A system and method of providing information (such as directions) to a driver of a vehicle while driving the vehicle without requiring that the driver remove his eyes from looking out the windshield at the road ahead. A positioning device is associated with the vehicle and determines the present location of the vehicle which is compared to a desired location (e.g., the location of a desired turn at an intersection) necessary to reach a preset destination which has been stored. When the vehicle is in a predetermined location (e.g., 500 feet or 10 second before the intersection), an advisory message to the driver is projected onto the windshield using a heads-up display projector so that the driver can prepare for and make the necessary movement (e.g., turning the correct way at the desired intersection). An optional auditory signal can provide a message indicating the necessary action, either in general or specifically (through a speech synthesizer), with optionally different sound indicators, depending on the urgency of the action. A wireless receiver used with the present invention can display other information such as road conditions, traffic and weather information, as well as advertising and e-mail. The present invention contemplates that images of intersections (live pictures, photos or sketches) may be displayed to indicate the proper turn and provide landmark information to assist in determining the appropriate turn. | 12-04-2008 |
20080319774 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster. | 12-25-2008 |
20080319842 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement. | 12-25-2008 |
20080320125 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page. | 12-25-2008 |
20090024460 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where the movement of a cursor on a web page is tracked prior to an advertisement on the web page being clicked by a controller of the cursor. The tracking is performed by client code on a client device displaying the web page. A path taken by the movement of the cursor is mapped to at least one vector associated with the path by the client code. The at least one vector is useable to detect a click fraud. | 01-22-2009 |
20090024461 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where data related to at least one vector associated with a path taken by movement of a cursor on a web page prior to an advertisement on the web page being clicked by a controller of the cursor is received. Click fraud is detected based on an analysis of the received data. A pattern in the at least one vector is analyzed to determine if the cursor movement is human-like and a click fraud detected if the cursor movement is not human-like. In another embodiment, the at least one vector associated with the path is stored and compared with previously stored vectors associated with the path and a click fraud detected if the stored at least one vector is analogous to at least one of the previously stored vectors associated with the path. | 01-22-2009 |
20090024971 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where data is received corresponding to a tracking of movement of a cursor on a web page. The movement of the cursor is associated with at least one vector. The at least one vector represents at least a portion of the cursor movement. A confidence level useable in the determination of click fraud is determined. The confidence level is responsive to analysis of the at least one vector representing at least a portion of the cursor movement. | 01-22-2009 |
20090049135 | SYSTEM AND METHOD FOR MANAGING AN INSTANT MESSAGING COMMUNITY - A system and method exploits organizational distances associated with an organizational hierarchy in a directed acyclic graph to both affect behavior in instant messaging systems, as well as to modify behavior (presence, IM, availability, who can get to the IM user) based on the reporting relationships that exist in an organization. One part of the invention is in exploiting a directed acyclic graph for the purposes of controlling instant messaging behavior for an individual, a team or a community. This is accommodated by abstracting organizational reporting relationships. The reporting relationships that exist in LDAP are used to enforce top-down rules which determine actions that motivate a change in behavior for instant messaging users across the organization. Such actions are not possible to motivate in conventional art. Conventional art relies on rules that a specific user manually builds, and do not consider capabilities around hierarchical imposition, not a reporting team/group/organizational. The present invention may force a change in behavior for a plurality of instant messaging users based on reporting relationships. | 02-19-2009 |
20090055554 | PROVIDING KIOSK SERVICE OFFERINGS IN A PERSONAL AREA NETWORK - A method for delivering electronic services in a personal area network (PAN) can include providing a kiosk in a publicly traversable area. The kiosk can be configured to deliver electronic services over short-range radio communications links to wireless devices in a personal area network (PAN). The kiosk also can be configured to communicate over an existing physical communications link medium. A PAN can be established in the publicly traversable area. Electronic services can be selectably retrieved through the existing physical communications link medium into the kiosk. Finally, the retrieved selected electronic services can be delivered to wireless devices in the PAN over the short-range radio communications link. Notably, the step of establishing a PAN in the publicly traversable area can include establishing a BLUETOOTH-based PAN with wireless devices in the publicly traversable area. In addition, the step of providing a kiosk first can include retrofitting an existing kiosk both with a short-range radio frequency communications system, and with a host computing device for selectively retrieving electronic services over the existing physical communications link medium, and for delivering selected electronic services to the wireless devices in the PAN. Second, the retrofitted kiosk can be activated in the publicly traversable area. | 02-26-2009 |
20090055654 | SECURE ENTRY OF A USER-IDENTIFIER IN A PUBLICLY POSITIONED DEVICE - A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface. | 02-26-2009 |
20090099880 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context. | 04-16-2009 |
20090100052 | ENABLING COLLABORATIVE NETWORKS - A system and method for providing collaborative resources to a user. A search expression is received from a user. One more keywords are determined from the search expression. One or more resources are determined responsive to the keywords and based on information related to the user, and the at least one resource is provided to the user. The one or more resources may be determined responsive to and prioritized to at least one of, for example, information in email of the user, an organization of the user, a search history of the user, an organizational position of the user, a level of experience of the user, a geographical location of the user, a geographical location of the resource, a language preference of the user, or a keyword match confidence. The resource may include at least one person and presence information associated with the at least one person. | 04-16-2009 |
20090100431 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance. | 04-16-2009 |
20090112725 | ERRATA NOTIFICATION FOR PRINTED MATERIAL - Embodiments of the present invention address deficiencies of the art in respect to errata sheet management for published documents and provide a novel and non-obvious method, system and computer program product for errata sheet notification aggregation. In one embodiment of the invention, a method for errata sheet handling in an e-commerce system can be provided. The method can include registering a customer for errata sheet notification for a publication externally to a publisher of the publication and also externally to a publisher of errata sheets for the publication. The method further can include providing a notification to the customer of the publication of the errata sheet in response to determining the publication of an errata sheet for the publication by the publisher of errata sheets for the publication. | 04-30-2009 |
20090116630 | INHIBITION OF TELEPHONY BASED PHISHING - Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate. | 05-07-2009 |
20090144254 | AGGREGATE SCORING OF TAGGED CONTENT ACROSS SOCIAL BOOKMARKING SYSTEMS - Embodiments of the present invention address deficiencies of the art in respect to social bookmarking and provide a method, system and computer program product for aggregating scoring of tagged content across social bookmarking systems. In an embodiment of the invention, a method for aggregating scoring of tagged content across social bookmarking systems can be provided. The method can include combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score and applying the single aggregate tag score to the tag in the content. In this regard, combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score can include computing either a simple or a weighted average of the tag scores for the tag to produce the single aggregate score. | 06-04-2009 |
20090192970 | CONTENT AND CONTEXT BASED HANDLING OF INSTANT MESSAGES - Instant message systems are enhanced by establishing at least one handling rule that is evaluated in an instant messaging environment, each established handling rule defining a condition based upon at least one of identified content or identified context, and a corresponding event handling action to be performed within the instant message environment. Upon identifying an instant message conversation within the instant message environment between a user and a correspondent, each handling rule is evaluated and the event handling action of an associated handling rule is performed if it is determined that the condition of handling rule is satisfied. Further, an indication that the corresponding event action was performed is conveyed to a corresponding user. | 07-30-2009 |
20090214016 | HIERARCHAL CONTROL OF TELECONFERENCES - A teleconference between at least two participants is evaluated by monitoring the teleconference and detecting a triggering event if more than one participant desires to speak at the same time. Upon detecting a triggering event, e.g., detecting an attempt of one or more participants to interrupt another participant, or detecting a request initiated by one or more participants to interrupt another participant, a dominant source is selected from among the ones of the participants attempting/requesting to speak based at least in part upon a determined hierarchal order of those participants attempting/requesting to speak. A participant is then selected from the participants to have the role of the dominant participant based upon the selected dominant source and only the speech of the dominant participant is conveyed to each participant through the teleconference system. | 08-27-2009 |
20090259693 | SERVICE FOR RECEIVING OBSOLETE WEB PAGE COPIES - The state of network-accessible information is preserved by recognizing a reference to a uniform resource locator contained within an electronic file where the uniform resource locator provides an address for content to be preserved. A copy of at least a portion of the information associated with the recognized uniform resource locator is obtained defining relevant content for preservation. A determination is also made as to whether the relevant content of the recognized uniform resource locator has changed since obtaining the copy of the relevant content. If a change is detected, an indication of the change is conveyed, e.g., to a corresponding user. | 10-15-2009 |
20090323916 | NOTIFICATION TO ABSENT TELECONFERENCE INVITEES - A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and attendance of the teleconference meeting, determining from the indication whether to issue a notification to an absent invitee of the teleconference meeting, and selectively issuing the notification to the absent invitee. | 12-31-2009 |
20100037225 | WORKLOAD ROUTING BASED ON GREENNESS CONDITIONS - Workload requests are routed in response to server greenness conditions. A workload request is received for a remotely invocable computing service executing separately in different remotely and geographically dispersed host computing servers. Greenness conditions pertaining to production or conservation of energy based upon external factors for each of the different remotely and geographically dispersed host computing servers are determined. The workload request is routed to one of the different remotely and geographically dispersed host computing servers based upon the determined greenness conditions. | 02-11-2010 |
20100057505 | BUSINESS PROCESS COMMUNITY INPUT - A community input method can be provided. The method can include receiving from an end user a request to access a portion of a workflow in a business process instance, prompting the end user to provide community input to community documentation for the portion of the workflow, and rendering the community documentation accessible by other end users accessing the portion of the workflow. Optionally, an interval (whether fixed or random) of a number of end users requesting access to the portion of the workflow in the business process instance can be determined, and the end user can be programmatically prompted to provide community input only if the request from the end user is received on the determined interval. | 03-04-2010 |
20100057856 | MANAGING URGENCY INDICATORS IN ELECTRONIC MESSAGING - A rating is applied in connection with a sender of an electronic message and a use of an urgency indicator for the electronic message. A different electronic message is received from the sender, and an urgency indicator established for the different electronic message is modified responsive to the applied rating. | 03-04-2010 |
20100088012 | OPTIMIZATION OF TRAVEL ROUTING - Travel routes for a vehicle from a first location of the vehicle to a second location are generated. Different alternative travel routes are calculated from a first location to a second location selected by a user for a specific vehicle in a navigation system. For each of the different alternative travel routes, both estimated emissions of the specific vehicle and also estimated fuel consumption of the specific vehicle when following each of the different alternative travel routes are computed. Subsequently, each of the different alternative travel routes are presented to a user in the navigation system in connection with corresponding estimated emissions and fuel consumption for each of the different alternative travel routes. | 04-08-2010 |
20100094837 | RELATIONSHIP MANAGEMENT FOR CONTACT STALENESS - A contact management data processing system can be provided. The system can include a contact manager coupled to a list of contacts and stored staleness criteria stored in connection with the list of contacts. The system also can include stale contact management logic. The logic can include program code enabled to apply the stored staleness criteria to a selected contact to identify a stale contact, and to manage the stale contact in the list of contacts. In aspects of the embodiment, the list of contacts can be stored in a personal computer, in a server remotely disposed from the contact manager, in a telephone such as a cellular telephone or voice over Internet protocol (VoIP) telephone, or in a personal digital assistant to name but a few. | 04-15-2010 |
20100174931 | MANAGING ELECTRIC POWER CONSUMPTION BY CONFIGURING ELEMENTS OF A DISTRIBUTED COMPUTING SYSTEM - A method and system for managing electric power consumption by elements of a distributed computing system comprises: determining one or more system metrics that relate to electric power usage as consumed by elements of a configured distributed environment; determining a system value in response to the one or more system metrics, the value determined according to one or more value criteria; and, while in-progress applications are being run in the computing environment, evaluating one or more potential changes in the distributed computing environment and determining an alternate system value based on the changes; and, re-configuring elements of the distributed computing environment dynamically while the computing environment is operating, in accordance with a determined alternate system value. The re-configuring elements step is in accordance with a potential change operative to alter electric power consumption. | 07-08-2010 |
20100174997 | COLLABORATIVE DOCUMENTS EXPOSING OR OTHERWISE UTILIZING BONA FIDES OF CONTENT CONTRIBUTORS - Content to be included within an electronic document associated with a content author can be determined. Bona fide information of the content author can also be determined. A request for the electronic document can be received from at least one content consumer. Responsive to the request, a copy of the requested electronic document can be provided to the content consumer. The content consumer can be provided with an indication of the bona fide information related to at least one content author associated with the electronic document. | 07-08-2010 |
20100192060 | AUTOMATIC GENERATION OF ASSENT INDICATION IN A DOCUMENT APPROVAL FUNCTION FOR COLLABORATIVE DOCUMENT EDITING - A method for generating an assent indication in a document approval and review function can include loading a document for editing in a document editor and determining a set of authors for the document. The method also can include modifying a title of the document to include an identity of at least one of the authors in the set. Finally, the method can include changing a visual appearance in the title of an identity of the assenting author responsive to one of the authors in the set assenting to a publication of the document. | 07-29-2010 |
20100299554 | DATA CONSISTENCY IN LONG-RUNNING PROCESSES - Long running computer implemented processes are dynamically adapted to improve data consistency. A range of process steps in a long running computer implemented process is specified. Additionally, each of the computer-implemented process partners that are associated with the execution of the long running process are identified within the range of specified process steps. Monitoring information is also collected with regard to at least one identified process partner. An automatic determination is made as to whether each monitored process partner is available before initiating execution of the specified range of process steps in an instance of the long running computer implemented process and a flow of the long running computer implemented process is transformed based at least in part upon the determination as to whether each monitored process partner is available. | 11-25-2010 |
20100332278 | PROJECT MANAGEMENT VIA COLLABORATIVE CALENDARING - An apparatus and method for collaborative calendaring of event management that includes receiving data of a desired calendar event, receiving data of a desired objective related to the desired calendar event, and providing an indication of at least one other calendar event responsive to receiving the indication of the desired objective. The indication of the at least one other calendar event may be provided based on a template associated with the desired objective. The template may define best practices events related to the objective. | 12-30-2010 |
20110019804 | Selectable Audio and Mixed Background Sound for Voice Messaging System - Methods, systems, computer program products, and methods of doing business by selectably mixing one or more sound files with a telephone caller's voice message, either as background for that message or embedded within the message. Or, the mixing may occur within a telephone conversation between parties. The disclosed techniques enable alleviating some of the problems that result from distance communication (as contrasted to face-to-face communication). In particular, context information (such as emotional context) can be provided through appropriate use of background sound and/or embedded audio files. The disclosed techniques may also make communication through voice mail exchange more enjoyable and/or increase its productivity. | 01-27-2011 |
20110061089 | DIFFERENTIAL SECURITY POLICIES IN EMAIL SYSTEMS - A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user. | 03-10-2011 |
20110087740 | LEVERAGING POINT-IN-TIME KNOWLEDGE TO RESPOND TO E-MAIL - Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message. | 04-14-2011 |
20110087741 | COST MANAGEMENT FOR MESSAGES - Messages are managed for cost. A processing device includes receiving a message designating a recipient and determining a cost associated with the message. | 04-14-2011 |
20110087745 | GROUP VOTING ACCESS CONTROL FOR MULTI-PARTY FORUMS - Group access control for a multi-party forum that includes receiving by a server a request from a party to access a multi-party forum, forwarding by the server the request to an approval group comprising at least two people, and approving or a denying the request by the server based on receiving votes from at least two persons of the approval group. | 04-14-2011 |
20110093538 | COLLABORATIVE CALENDAR AND WORKFLOW MANAGEMENT - Collaborative calendar and workflow management that includes receiving, by a processing device, a workflow of a user comprising workflow tasks, accessing a calendar of the user by the processing device, and inserting, by the processing device, calendar entries of the user and the workflow tasks together in the calendar of the user. | 04-21-2011 |
20110119191 | LICENSE OPTIMIZATION IN A VIRTUALIZED ENVIRONMENT - License optimization using a virtualized environment that includes receiving, by a processing device, a system requirement, analyzing, by the processing device, a use of a software component installed in a system in view of a license associated with the software component, and generating, by the processing device, an indication for placement of a virtualization of the software component to satisfy the system requirement responsive to the analysis. The optimization optimizing cost comprising at least a charge for the license. | 05-19-2011 |
20110154506 | Federation of email - A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria. | 06-23-2011 |
20110320275 | ADVERTISING PROXIMITY ROUTE SELECTION - A request for route information to a destination is received by a route processing module. Available routes to the destination are determined in response to receiving the request. It is determined, for at least one available route to the destination, whether the available route provides proximity to at least one targeted advertisement. At least one available route to the destination is provided upon determining that the available route provides the proximity to the targeted advertisement. | 12-29-2011 |
20120008917 | USER CONTROLLED MULTI-DEVICE MEDIA-ON-DEMAND SYSTEM - A method for providing configurable access to media in a media-on-demand system also can include delivering the media to a first client device in a format compatible with the first client device; interrupting the delivery of the media; recording a bookmark specifying a position in the media where the interruption occurred; and resuming delivery of the media to a second client device, the resumed delivery beginning at a position in the media specified by the recorded bookmark. The method further can include identifying device properties for each of the first and second client devices; delivering the media to the first client device in a format compatible with the identified device properties for the first client device; and, delivering the media to the second client device in a format compatible with the identified device properties for the second client device. | 01-12-2012 |
20120011226 | USER CONTROLLED MULTI-DEVICE MEDIA-ON-DEMAND SYSTEM - A method for providing configurable access to media in a media-on-demand system also can include delivering the media to a first client device in a format compatible with the first client device; interrupting the delivery of the media; recording a bookmark specifying a position in the media where the interruption occurred; and resuming delivery of the media to a second client device, the resumed delivery beginning at a position in the media specified by the recorded bookmark. The method further can include identifying device properties for each of the first and second client devices; delivering the media to the first client device in a format compatible with the identified device properties for the first client device; and, delivering the media to the second client device in a format compatible with the identified device properties for the second client device. | 01-12-2012 |
20120047166 | USER CONTROLLED MULTI-DEVICE MEDIA-ON-DEMAND SYSTEM - A method for providing configurable access to media in a media-on-demand system also can include delivering the media to a first client device in a format compatible with the first client device; interrupting the delivery of the media; recording a bookmark specifying a position in the media where the interruption occurred; and resuming delivery of the media to a second client device, the resumed delivery beginning at a position in the media specified by the recorded bookmark. The method further can include identifying device properties for each of the first and second client devices; delivering the media to the first client device in a format compatible with the identified device properties for the first client device; and, delivering the media to the second client device in a format compatible with the identified device properties for the second client device. | 02-23-2012 |
20120170734 | NOTIFICATION TO ABSENT TELECONFERENCE INVITEES - A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and a further indication of current attendance at the teleconference;
| 07-05-2012 |
20120185587 | DATA CONSISTENCY IN LONG-RUNNING PROCESSES - Long running computer implemented processes are dynamically adapted to improve data consistency. A range of process steps in a long running computer implemented process is specified. Additionally, each of the computer-implemented process partners that are associated with the execution of the long running process are identified within the range of specified process steps. Monitoring information is also collected with regard to at least one identified process partner. An automatic determination is made as to whether each monitored process partner is available before initiating execution of the specified range of process steps in an instance of the long running computer implemented process and a flow of the long running computer implemented process is transformed based at least in part upon the determination as to whether each monitored process partner is available. | 07-19-2012 |
20120191537 | ADVERTISING PROXIMITY ROUTE SELECTION - A request for route information to a destination is received by a route processing module. Available routes to the destination are determined in response to receiving the request. It is determined, for at least one available route to the destination, whether the available route provides proximity to at least one targeted advertisement. At least one available route to the destination is provided upon determining that the available route provides the proximity to the targeted advertisement. | 07-26-2012 |
20120250846 | HIERARCHAL CONTROL OF TELECONFERENCES - A teleconference between at least two participants is evaluated by monitoring the teleconference and detecting a triggering event if more than one participant desires to speak at the same time. Upon detecting a triggering event, e.g., detecting an attempt of one or more participants to interrupt another participant, or detecting a request initiated by one or more participants to interrupt another participant, a dominant source is selected from among the ones of the participants attempting/requesting to speak based at least in part upon a determined hierarchal order of those participants attempting/requesting to speak. A participant is then selected from the participants to have the role of the dominant participant based upon the selected dominant source and only the speech of the dominant participant is conveyed to each participant through the teleconference system. | 10-04-2012 |
20120323959 | MULTIPLE ELECTRONIC IDENTITY RECOGNITION - A method, device and computer program product for multiple identity recognition includes receiving a first communication from a sender addressed to a recipient using a first identity. A determination may be made as to whether the sender has multiple identities, and in response to determining that the sender has multiple identities, information regarding the identities of the sender is retrieved. The identities of the sender may be associated together so that the recipient may be provided an indication that the sender has at least one identity other than the first identity. | 12-20-2012 |
20120324020 | NAME RESOLUTION - A method, device and computer program product for name resolution in a collaborative environment may include receiving initiation of a collaboration from a user, where the collaboration includes actions from at least two applications. The method may also include determining an identity of the user initiating the collaboration. The method may further include retrieving an alias of the user and attaching the alias of the user to the collaboration. | 12-20-2012 |
20130007258 | Resource configuration change management - Prior to a first configuration change of a first resource, such as a network resource of a network, a processor determines a first performance metric of a second resource, such as a second network resource of the network. The first configuration change does not result in complete failure or fault of the second resource. Subsequent to the first configuration change of the first resource, the processor determines a second performance metric of the second resource and compares the second performance metric to at least one of the first performance metric and a service objective to yield comparison results. Based on the comparison results, the processor can cause a second configuration change of the first resource. The second configuration change of the first resource can revert a configuration of the first resource to its state prior to the first configuration change. | 01-03-2013 |
20130007441 | Resource configuration change management - Prior to a first configuration change of a first resource, such as a network resource of a network, a processor determines a first performance metric of a second resource, such as a second network resource of the network. The first configuration change does not result in complete failure or fault of the second resource. Subsequent to the first configuration change of the first resource, the processor determines a second performance metric of the second resource and compares the second performance metric to at least one of the first performance metric and a service objective to yield comparison results. Based on the comparison results, the processor can cause a second configuration change of the first resource. The second configuration change of the first resource can revert a configuration of the first resource to its state prior to the first configuration change. | 01-03-2013 |
20130298260 | FEDERATION OF EMAIL - A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria. | 11-07-2013 |
20130304452 | MANAGEMENT OF LANGUAGE USAGE TO FACILITATE EFFECTIVE COMMUNICATION - Provided are techniques for providing annotations for revising a message. A message to be sent from a sender to a recipient is received. A meaning map associated with the sender and a meaning map associated with the recipient are obtained. The message is parsed into sub-constructs. The sub-constructs are compared in the meaning map associated with the sender and the meaning map associated with the recipient. Alternative language for the sub-constructs is identified. Annotations are provided based on the alternative language. | 11-14-2013 |
20130304455 | MANAGEMENT OF LANGUAGE USAGE TO FACILITATE EFFECTIVE COMMUNICATION - Provided are techniques for providing annotations for revising a message. A message to be sent from a sender to a recipient is received. A meaning map associated with the sender and a meaning map associated with the recipient are obtained. The message is parsed into sub-constructs. The sub-constructs are compared in the meaning map associated with the sender and the meaning map associated with the recipient. Alternative language for the sub-constructs is identified. Annotations are provided based on the alternative language. | 11-14-2013 |
20140047041 | MESSAGE SUBSCRIPTION BASED ON MESSAGE AGGREGATE CHARACTERISTICS - A method for message subscription based on a message aggregate characteristic is described. The method includes receiving a message subscription from a user. The message subscription is based on the message aggregate characteristic including an aspect other than textual content and bibliographic content. The method also includes determining a published message in response to receiving the message subscription. The published message satisfies the message aggregate characteristic. The method also includes providing an indication of the published message to the user. | 02-13-2014 |
20140156830 | CORRELATING COMPUTING NETWORK EVENTS - According to one aspect of the present disclosure, a method and technique for correlating computing network events is disclosed. The method includes: receiving a plurality of events at an event manager residing on a host computing system; identifying a first resource associated with a first event; identifying a second resource associated with a second event; determining whether the first resource is associated with a deployment pattern; determining whether the second resource is associated with a deployment pattern; and responsive to determining that the first and second resources are each associated with a deployment pattern, correlating the first and second events responsive to the first and second resources being associated with a common deployment pattern. | 06-05-2014 |
20140156846 | CORRELATING COMPUTING NETWORK EVENTS - According to one aspect of the present disclosure a system and technique for correlating computing network events is disclosed. The system includes a processor, and an event manager executable by the processor to: identify a first resource associated with a first event; identify a second resource associated with a second event; determine whether the first resource is associated with a deployment pattern; determine whether the second resource is associated with a deployment pattern; and responsive to determining that the first and second resources are each associated with a deployment pattern, correlate the first and second events responsive to the first and second resources being associated with a common deployment pattern. | 06-05-2014 |
20140201298 | MESSAGE SUBSCRIPTION BASED ON MESSAGE AGGREGATE CHARACTERISTICS - A method for message subscription based on a message aggregate characteristic is described. The method includes receiving a message subscription from a user. The message subscription is based on the message aggregate characteristic including an aspect other than textual content and bibliographic content. The method also includes determining a published message in response to receiving the message subscription. The published message satisfies the message aggregate characteristic. The method also includes providing an indication of the published message to the user. | 07-17-2014 |
20140280038 | DELIVERING A FILTERED SEARCH RESULT - Delivering a filtered search result includes identifying a filtered search result in response to a search query from a user that is associated with at least one member of an augmented social group where the augmented social group including social network connections of the user and individuals other than the social network connections who share a common interest with the user and delivering the filtered search result to the user through a user interface. | 09-18-2014 |