Patent application number | Description | Published |
20110321143 | CONTENT PROTECTION USING AUTOMATICALLY SELECTABLE DISPLAY SURFACES - Embodiments of the invention are directed to systems and methods for protecting content by automatically identifying a display surface viewable only to authorized users and displaying protected content on the identified display surface. In one example embodiment, content is displayed on a first display surface in viewable range of a first user authorized to view the content. The entrance of a second user into viewable range of the first display surface is detected, and automatically determined to be unauthorized to view the content. A second display surface in viewable range of the first user but not viewable by the second user is automatically identified in response to detecting the entrance of the second, unauthorized user into viewable range of the first display surface. The display of the content is automatically moved from the first display surface to the second display surface to prevent the content from being viewed by the unauthorized user. | 12-29-2011 |
20120262569 | VISUAL OBSTRUCTION REMOVAL WITH IMAGE CAPTURE - An object located within an image foreground relative to image content within a field of view of at least one camera lens is identified, using image processing module, as an image obstruction. Responsive to identifying the image obstruction, points of view of at least one camera lens are determined that provide image content portions of the image content that, in combination, yield a complete image of the image content without the image obstruction located within the image foreground. The image content portions are combined to yield the complete image of the image content without the image obstruction located within the foreground. The combined complete image is stored to a memory. | 10-18-2012 |
20120262572 | VISUAL OBSTRUCTION REMOVAL WITH IMAGE CAPTURE - An object located within an image foreground relative to image content within a field of view of at least one camera lens is identified, using image processing module, as an image obstruction. Responsive to identifying the image obstruction, points of view of at least one camera lens are determined that provide image content portions of the image content that, in combination, yield a complete image of the image content without the image obstruction located within the image foreground. The image content portions are combined to yield the complete image of the image content without the image obstruction located within the foreground. The combined complete image is stored to a memory. | 10-18-2012 |
20130225260 | ADAPTIVE DIFFICULTY IN A MULTIPLAYER GAMING ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for adapting game difficulty through dynamic map generation in a multi-player gaming environment. In an embodiment of the invention, a method for adapting game difficulty through dynamic map generation in a multi-player gaming environment is provided. The method includes creating in memory of a computer a multi-player gaming environment. The method also includes identifying a player in the multi-player gaming environment, looking up performance data of the identified player and correlating the performance data of the identified player with a feature of the multi-player gaming environment. Finally, the method includes modifying the multi-player gaming environment to account for the correlated feature. | 08-29-2013 |
20130232376 | Managing A Storage Device Using A Hybrid Controller - Methods, apparatuses, and computer program products for managing a storage device using a hybrid controller are provided where the storage device comprises an internal peripheral component interconnect express (PCIe) interface to control solid state memory within the storage device. In particular embodiments, the storage device includes a first external interface configured to establish an external PCIe link and a second external interface configured to establish at least one of an external serial attached small computer system interface (SAS) link and an external serial advanced technology attachment (SATA) link. Embodiments include receiving from an external source, by the hybrid controller, a first command at the first external interface and a second command at the second external interface; and concurrently implementing, by the hybrid controller, the first command using a PCIe protocol and the second command using one of a SAS protocol and a SATA protocol. | 09-05-2013 |
20130238313 | DOMAIN SPECIFIC NATURAL LANGUAGE NORMALIZATION - Embodiments of the present invention provide a method, system and computer program product for the domain specific normalization of a corpus of text. In an embodiment of the invention, a method for domain specific normalization of a corpus of text is provided, including an industrial, organization, demographic or geographic domain. The method includes loading a corpus of text in memory of a computer and determining a domain for the corpus of text. The method also includes retrieving a lexicon of replacement words for the determined domain. Finally, the method includes text simplifying the corpus of text using the retrieved lexicon. In one aspect of the embodiment, the domain is determined through inference based upon words already presence in the corpus of text. In another aspect of the embodiment, the domain is determined based upon meta-data provided with the corpus of text. | 09-12-2013 |
20130244623 | Updating Contact Information In A Mobile Communications Device - Updating contact information in a mobile communications device, including: identifying, by the mobile communications device, call information associated with an inbound call; identifying, by the mobile communications device, contact information stored in the mobile communications device that is associated with the call information; determining, by the mobile communications device, whether the contact information stored in the mobile communications device includes information contained in the call information; and responsive to determining that the contact information stored in the mobile communications device does not include information contained in the call information, updating, by the mobile communications device, the contact information stored in the mobile communications device in dependence upon the call information. | 09-19-2013 |
20130275850 | AUTONOMIC VISUAL EMPHASIS OF PREVIEWED CONTENT - Embodiments of the present invention provide a method, system and computer program product for the visual emphasis of previously viewed content. In an embodiment of the invention, a method for visual emphasis of previously viewed content has been provided. The method can include identifying an end user viewing content loaded in a content reader executing in memory of a computer and tracking a gaze of the end user to determine a portion of the content viewed by the end user. The method also includes storing a reference to the portion of the content in a data store in connection with the identified end user. Finally, the method can include subsequently responding to a re-loading of the content in the content reader by the end user by visually emphasizing the portion of the content referenced in the data store. | 10-17-2013 |
20130346955 | CALENDAR AWARE ADAPTIVE PATCHING OF A COMPUTER PROGRAM - Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management. | 12-26-2013 |
20140012494 | COLLABORATIVE GPS TRACKING - A collaborative GPS navigation system and method enables nearby vehicles to share and compare planned route for improving navigation. While navigating along a planned route, a navigation device on a first vehicle may detect a specific, slower-moving second vehicle. The navigation device on the first vehicle may obtain the planned route of the second vehicle, compare the two planned routes to identify a shared route segment, and dynamically revise the planned route and route metrics according to the comparison. | 01-09-2014 |
20140013093 | PINOUT ADJUSTMENT RESPONSIVE TO SYSTEM ORIENTATION - A unit of information technology equipment (ITE), such as a compute node or a network switch, comprises a system board in communication with network connectors that selectively connect to a network interconnect, a gravity sensor for detecting a first orientation and a second orientation of the system board, and a basic input/output system (BIOS) in communication with the gravity sensor to receive a signal identifying whether the system board is in the first or second orientation. The ITE further comprises a network ASIC (application specific integrated circuit) that inverts the pinout of transmit and receive signals in the network connectors in response to a command from the BIOS indicating that the system board is in the second orientation. A system may comprise a first ITE in a first orientation that interlocks with a second ITE in a second orientation that is inverted 180 degrees from the first orientation. | 01-09-2014 |
20140020003 | DYNAMIC BANDWIDTH REDUCTION OF TRANSMISSION STREAMS - A processor implemented method conserves bandwidth capacity by reducing the amount of bandwidth that is used in a communication channel between a content transmitting server and a content receiving client computer while streaming multimedia content. A content receiving client computer receives a multimedia streaming content from a content transmitting server. The multimedia streaming content has a video component and an audio component. In response to determining that a user of the content receiving client computer is no longer watching the video component of the multimedia streaming content, a processor generates and transmits an inattention alert to the content transmitting server. The inattention alert directs the content transmitting server to stream only the audio component of a remaining portion of the multimedia streaming content to the content receiving client computer. | 01-16-2014 |
20140029193 | COMPUTER SYSTEM COOLING USING AN EXTERNALLY-APPLIED FLUID CONDUIT - A computer system includes a rack-mountable server unit with a closed server housing. The server housing has a channel with a recessed channel wall in conductive thermal communication with a processor or other heat-generating component. An elongate conduit is received into the channel of the server housing in conductive thermal communication with an external surface of the server housing. The server is cooled by conductive fluid flow through the conduit, with no appreciable airflow through the server housing. The system may be operated in an optional burst cooling mode, wherein a volume of cooling fluid is trapped in the conduit for a period of time before being quickly released. | 01-30-2014 |
20140032628 | DYNAMIC OPTIMIZATION OF COMMAND ISSUANCE IN A COMPUTING CLUSTER - Embodiments of the present invention provide a method, system and computer program product for dynamic optimization of command sequencing in a computing cluster. In an embodiment of the invention, a method for dynamic optimization of command sequencing in a computing cluster can include selecting a set of nodes in the computing cluster to receive a single command and probing the nodes of the set to compute a computer communications latency for each of the nodes. Thereafter, the single command can be transmitted to the nodes in the set according to a sequence determined by the computed computer communications latency for each of the nodes. | 01-30-2014 |
20140032833 | Dynamic Disk Space Management In A File System - Dynamic disk space management in a file system, including: assigning, by a disk utilization manager upon creation of each file in the file system, a unique identifier to the file; tracking, by the disk utilization manager for each file in the file system, file characteristics in dependence upon the unique identifier of the file; prioritizing, by the disk utilization manager in dependence upon the tracked file characteristics and a predefined set of prioritization criteria, files in the file system; tracking, by the disk utilization manager, utilization of disk drive space; and, upon utilization of disk drive space exceeding a predetermined maximum threshold, reducing, by the disk utilization manager in dependence upon the priorities of files, disk drive space utilization to no greater than a predetermined capacity. | 01-30-2014 |
20140032834 | Managing A Solid State Drive ('SSD') In A Redundant Array Of Inexpensive Drives ('RAID') - Managing a solid state drive (‘SSD’) in a Redundant Array of Inexpensive Drives (‘RAID’), including: detecting, by a RAID engine, a number of cell failures of the SSD exceeding a predetermined threshold; responsive to detecting the number of cell failures of the SSD exceeding the predetermined threshold: redirecting, by the RAID engine, a write of data not originally stored in the RAID to a drive in the RAID other than the SSD; and redirecting, by the RAID engine, writes originally directed to data stored on the SSD to another drive in the RAID, including unmapping the data stored on the SSD. | 01-30-2014 |
20140057723 | DYNAMIC QUALITY OF SERVICE MANAGEMENT IN MULTIPLAYER GAMING - Embodiments of the present invention provide a method, system and computer program product for dynamic quality of service (QoS) management for multi-player gaming. In an embodiment of the invention, a method for dynamic QoS management for multi-player gaming is provided. The method includes monitoring a multi-player game and detecting a game moment for a game player in the multi-player game. The method also includes determining a degree of sensitivity for the game moment and enhancing access to a computing resource of the game player in response to determining the game moment to be highly sensitive. In one aspect of the embodiment, the method additionally includes detecting a subsequent game moment for the game player in the multi-player game, determining a degree of sensitivity for the subsequent game moment, and reducing access to the computing resource of the game player in response to determining the game moment to be less sensitive. | 02-27-2014 |
20140068323 | REMAPPING DISK DRIVE I/O IN RESPONSE TO MEDIA ERRORS - A method for handling media errors during a read operation on a data storage device. The method comprises detecting that a first file and a second file are duplicates, wherein the first file is stored on a first storage device. Metadata is written to the first storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the method reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 03-06-2014 |
20140068324 | ASYNCHRONOUS RAID STRIPE WRITESTO ENABLE RESPONSE TO MEDIA ERRORS - A method includes detecting that a first file and a second file are duplicates, and storing the first file and the second file to a target storage device. Metadata is written to the target storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the target storage device reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 03-06-2014 |
20140068586 | CALENDAR AWARE ADAPTIVE PATCHING OF A COMPUTER PROGRAM - Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management. | 03-06-2014 |
20140069680 | EXTENDABLE COMPONENT POWER CABLE - A component power cable having a pair of elongate conductive members each connected at a first end to a power distribution unit connector and at a second end to a component power supply connector, wherein the cable has sufficient resilience to impart a generally collapsed configuration to the component power cable, with the first end generally proximal to the second end. The component power cable is extendable from the collapsed configuration to an extended configuration by displacement of the first end to a position distal to the second end, wherein energy stored in the resilient cable by such displacement restores the component power cable to the collapsed configuration upon return of the first end to a position proximal the second end. The resilience may be provided by a spring element or by an elastomeric sheath. | 03-13-2014 |
20140071058 | Positioning Clickable Hotspots On A Touchscreen Display - Positioning clickable hotspots on a touchscreen display, including: identifying, by a hotspot generation module, a clickable object displayed on the touchscreen display, wherein the clickable object has an associated original clickable zone for invoking the clickable object; generating, by the hotspot generation module, a clickable hotspot associated with the clickable object, wherein the clickable hotspot has an associated updated clickable zone for invoking the clickable object; determining, by the hotspot generation module, a position on the touchscreen display for placing the clickable hotspot; and placing, by the hotspot generation module, the clickable hotspot at the position on the touchscreen display, wherein the original clickable zone and the updated clickable zone cover different areas of the touchscreen display. | 03-13-2014 |
20140071602 | POWER CABLE MANAGEMENT IN AN ELECTRONIC COMPONENT STORAGE RACK - A computer storage rack has vertically arranged bays for receiving electrical power-consuming components, an elongate electrical power distribution unit (PDU) having power distribution sockets vertically spaced along the length of the PDU, and a hinge pivotally coupling the PDU to the rack along a vertical axis. The PDU pivots about the hinge between a position proximal to the bays and a position distal to the bays. The apparatus further comprises a component power supply cables that are resiliently extendable from a collapsed configuration to an extended configuration. Each of the component power supply cables is connected between one of the power distribution sockets and an adjacent one of the electrical power-consuming components, and each is resiliently extendable in response to pivoting the PDU to the distal position and resiliently collapsed in response to pivoting the PDU to the proximal position. | 03-13-2014 |
20140074989 | FREQUENT CONTENT CONTINUITY VISUAL ASSISTANCE IN CONTENT BROWSING - Embodiments of the present invention provide a method, system and computer program product for frequent content retrieval in a content browser. In an embodiment of the invention, a method for frequent content retrieval in a content browser is provided. The method includes retrieving requested content from a content server from over a computer communications network and comparing the retrieved requested content to a cached version of the requested content. The retrieved requested content thereafter can be annotated to visually emphasize a frequently accessed portion of the retrieved requested content in response to a threshold difference between the retrieved requested content and the cached version. Finally, the annotated retrieved requested content can be returned to a content browser for display therein. | 03-13-2014 |
20140092435 | APPLYING INDIVIDUAL PREFERENCES TO PRINTED DOCUMENTS - Applying individual preferences to printed documents, including: receiving, by a preference application module, a print request; identifying, by the preference application module, one or more identifiers of users associated with the print request; retrieving, by the preference application module, print preferences for the one or more identifiers of users associated with the print request; and generating, by the preference application module, one or more individualized print jobs for each of the users in dependence upon the print preferences. | 04-03-2014 |
20140094115 | EVALUATING WIRELESS NETWORK ACCESS CONNECTIONS VIA NEAR FIELD COMMUNICATIONS - Evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices. | 04-03-2014 |
20140094118 | EVALUATING WIRELESS NETWORK ACCESS CONNECTIONS VIA NEAR FIELD COMMUNICATIONS - Evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices. | 04-03-2014 |
20140096139 | WORKLOAD MANAGEMENT CONSIDERING HARDWARE RELIABILITY - A method identifies uptime for each of a plurality of components within a cluster of nodes, and determines a reliability level for each of the plurality of components, where the reliability level of each component is determined by comparing the identified uptime for the component with mean-time-between-failure data for components of the same component type. The method also determines a priority level and a job type for a job to be scheduled. Then, at least one target component type is selected in consideration of the job type, and a target reliability level for the at least one target component type is selected in consideration of the priority level. The job is then scheduled on one of the nodes that includes a component of the at least one target component type having the target reliability level. | 04-03-2014 |
20140099080 | Creating An Abridged Presentation Of A Media Work - Creating an abridged presentation of a media work, including: identifying, by a media abridging module, a plurality of segments of the media work; determining, by the media abridging module, a viewing frequency value for each of the segments of the media work; and creating, by the media abridging module, an abridged version of the media work in dependence upon the viewing frequency value for each of the segments of the media work, wherein the abridged version of the media work includes only a subset of the segments of the media work. | 04-10-2014 |
20140099081 | Creating An Abridged Presentation Of A Media Work - Creating an abridged presentation of a media work, including: identifying, by a media abridging module, a plurality of segments of the media work; determining, by the media abridging module, a viewing frequency value for each of the segments of the media work; and creating, by the media abridging module, an abridged version of the media work in dependence upon the viewing frequency value for each of the segments of the media work, wherein the abridged version of the media work includes only a subset of the segments of the media work. | 04-10-2014 |
20140123019 | Multi-Device Visual Correlation Interaction - Multi-device visual correlation interaction includes displaying, by a first device, a user interface representation of a user interface displayed by a second device, the user interface representation containing one or more element representations, each element representation corresponding to an element contained within the user interface displayed by the second device; receiving from a user of the first device, a selection of a particular element representation of the user interface representation, the particular element representation corresponding to a particular element contained within the user interface; transmitting to the second device, by the first device, a contextual information request corresponding to the selection; in response to transmitting the contextual information request, receiving from the second device, by the first device, contextual information corresponding to the selection; and generating based on the contextual information, by the first device, a contextual list of actions associated with the particular element. | 05-01-2014 |
20140123026 | MULTI-DEVICE VISUAL CORRELATION INTERACTION - Multi-device visual correlation interaction includes displaying, by a first device, a user interface representation of a user interface displayed by a second device, the user interface representation containing one or more element representations, each element representation corresponding to an element contained within the user interface displayed by the second device; receiving from a user of the first device, a selection of a particular element representation of the user interface representation, the particular element representation corresponding to a particular element contained within the user interface; transmitting to the second device, by the first device, a contextual information request corresponding to the selection; in response to transmitting the contextual information request, receiving from the second device, by the first device, contextual information corresponding to the selection; and generating based on the contextual information, by the first device, a contextual list of actions associated with the particular element. | 05-01-2014 |
20140157159 | COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE - Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. | 06-05-2014 |
20140157160 | COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE - Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. | 06-05-2014 |
20140162608 | COLLABORATIVE SHARING OF CONTEXTUALLY SIMILAR CACHE DATA TO REDUCE NETWORK USAGE - A computer program product for controlling a wireless user device comprises computer usable program code for caching data downloaded from websites over a cellular communications network in response to user-entered requests for data; establishing near field communication directly between the wireless user device and other user devices within range of the near field communication; searching metadata stored by the other user devices, wherein the metadata is stored in association with cached data and describes one or more characteristic of the cached data; receiving a user request for data; for determining if the user request can be satisfied with cached data stored by a selected one of the other user devices; receiving cached data directly from the selected user device when the cached data satisfies the user request; and receiving data over the communications network when the cached data stored on the other user devices does not satisfy the user request. | 06-12-2014 |
20140164349 | DETERMINING CHARACTERISTIC PARAMETERS FOR WEB PAGES - A computer receives a search request, wherein the search request contains one or more parameters that allow a search to be performed. Responsive to the search request, the computer identifies a plurality of web pages connected by a plurality of links. The computer determines the number of links in the longest path that connects at least a portion of the plurality of web pages, wherein the longest path includes a sequence of at least two web pages of the plurality of web pages connected by a link of the plurality of links. The computer determines the number of links included in a web page of the plurality of web pages. | 06-12-2014 |
20140164414 | GUIDING A USER TO IDENTIFIED CONTENT IN A DOCUMENT - A method for identifying content in a document. The method includes determining that a user of a computing device has accessed one or more documents and determining a subject matter of the one or more documents. The method includes determining that the user has accessed at least one additional document. The method further includes searching the at least one additional document for the determined subject matter and responsive to finding the determined subject matter, identifying the found subject matter in the at least one additional document. | 06-12-2014 |
20140164472 | COLLABORATIVE SHARING OF CONTEXTUALLY SIMILAR CACHE DATA TO REDUCE NETWORK USAGE - Wireless user devices can independently download and cache data from websites over a wireless communications network. In response to a request for data, a first user device may receive data directly from a second user device instead of receiving data over the communications network, if the data satisfies the request. Near field communications may be used for direct communication between user devices within range of the near field communication. Metadata describing the cached data may be stored in association with the cached data. Each user device may advertise its metadata and allow it to be searched by another user device that is requesting data. If the request can be satisfied with cached data stored by a selected user device, then the cached data is received directly from the selected user device, but the data is otherwise received over the communications network. | 06-12-2014 |
20140164548 | MANAGING DIRECT ATTACHED CACHE AND REMOTE SHARED CACHE - Managing direct attached cache and remote shared cache, including: receiving from an enclosure attached server, by an enclosure that includes enclosure cache, a request for data; determining, by the enclosure, whether the data has been requested by a predetermined number of enclosure attached servers; and responsive to determining that the data has been requested by a predetermined number of enclosure attached servers, marking, by the enclosure, the data as enclosure level cacheable. | 06-12-2014 |
20140164549 | MANAGING DIRECT ATTACHED CACHE AND REMOTE SHARED CACHE - Managing direct attached cache and remote shared cache, including: receiving from an enclosure attached server, by an enclosure that includes enclosure cache, a request for data; determining, by the enclosure, whether the data has been requested by a predetermined number of enclosure attached servers; and responsive to determining that the data has been requested by a predetermined number of enclosure attached servers, marking, by the enclosure, the data as enclosure level cacheable. | 06-12-2014 |
20140164794 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON RELATIVE COMMONALITY - A computer program product includes computer usable program code for: identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source and includes a circuit breaker; identifying a plurality of devices disposed in the rack, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices; obtaining vital product data from a service processor in each device, wherein the vital product data identifies the device by a model identification code; and powering on, for each of the PDUs, the plurality of devices that are connected to the PDU in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on devices in order of ascending commonality of the model identification code. | 06-12-2014 |
20140164811 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON DEVICE FUNCTION - A computer program product includes computer usable program code embodied on a tangible computer usable storage medium for: identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source, and wherein each PDU includes a circuit breaker; identifying a plurality of devices disposed in the rack, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices; and powering on, for each of the PDU, the plurality of devices that are connected to the PDU in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on the devices identified as network switches and external data storage devices prior to powering on the devices identified as server nodes. | 06-12-2014 |
20140164812 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON DEVICE FUNCTION - A method of powering on a plurality of devices includes identifying a plurality of power distribution units disposed in a rack, wherein each power distribution units is connected to receive power from a main power source, and wherein each power distribution unit includes a circuit breaker. The method further includes identifying a plurality of devices disposed in the rack, wherein each device is connected to receive power from one of the power distribution units, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices. For each of the power distribution units, the plurality of devices that are connected to the power distribution unit are powered on in a sequence to prevent an inrush current from tripping the circuit breaker within the power distribution unit. The sequence powers on the devices identified as network switches and external data storage devices prior to powering on the devices identified as server nodes. | 06-12-2014 |
20140164813 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON RELATIVE COMMONALITY - A method of powering on a plurality of devices includes identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source and includes a circuit breaker. A plurality of devices disposed in the rack are identified, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are server nodes, network switches or external data storage devices. Vital product data (VPD) is obtained from a service processor in each device, wherein the VPD identifies the device by a model identification code. For each PDU, the plurality of devices connected to the PDU are powered on in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on devices in order of ascending commonality of the model identification code. | 06-12-2014 |
20140170614 | PROVIDING A USER-SPECIFIC EFFORT VALUE ASSOCIATED WITH DIGITAL TEXTUAL CONTENT - Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. | 06-19-2014 |
20140170615 | Providing A User-Specific Effort Value Associated With Digital Textual Content - Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. | 06-19-2014 |
20140173114 | PRESENTING ENCLOSURE CACHE AS LOCAL CACHE IN AN ENCLOSURE ATTACHED SERVER - Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. | 06-19-2014 |
20140173156 | CABLE ADAPTER CORRELATION IN A CLUSTER - A verified cluster configuration is collected and stored by a central management entity. Servers within the cluster are connected to network cables, where each of the servers has at least one network port and memory storing a port identification code for each network port, and where each network cable has memory storing a cable identification code. For each verified connection between a network cable and a network port, the port identification code is stored in the memory of the network cable and the cable identification code is stored in the memory of the corresponding server. The data identifying each connection is stored by the central management entity and includes the port identification code for a particular network port in association with the network cable identification code for the corresponding network cable. Any miswiring of the configuration is identified by the central management entity and easily corrected by the administrator. | 06-19-2014 |
20140173209 | Presenting Enclosure Cache As Local Cache In An Enclosure Attached Server - Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. | 06-19-2014 |
20140173617 | DYNAMIC TASK COMPLETION SCALING OF SYSTEM RESOURCES FOR A BATTERY OPERATED DEVICE - Methods, apparatuses, and computer program products for dynamic task completion scaling of system resources for a battery operated device are provided. Embodiments include determining, by task completion controller, availability of system resources; retrieving, by the task completion controller, historical user-specific task performance data corresponding to a user; and performing, by the task completion controller, a system action based on the determined availability of system resources and the retrieved historical user-specific task performance data. | 06-19-2014 |
20140177736 | POWER DISTRIBUTION SYSTEM UTILIZING DIGITAL COMMUNICATIONS TO DETERMINE THE CONFIGURATION THEREOF - Three-phase electrical power is used to distribute electrical power to electronic devices in a cluster. A power distribution system includes circuit breaker panels and power distribution units for providing electrical power to the electronic devices. The electrical connections within the power distribution system form a digital communication network that communicates identification codes for the purpose of identifying each electrical connection in the power distribution system. A cluster management entity may then collect the identification codes associated with each electrical connection in order to detect the actual configuration of the power distribution system. By further knowing the load of each electronic device and their association with entities of the power distribution system, the cluster management entity may determine the load on each phase and take steps to balance the load. | 06-26-2014 |
20140177738 | DETERMINING THE CONFIGURATION OF A POWER DISTRIBUTION SYTEM - A method provides digital communication over an electrical power supply cable between a management processor in a circuit breaker panel (CBP) and a management processor in a power distribution unit (PDU), wherein the CBP has a CBP identification code (ID) and the PDU has a PDU ID. The digital communication provides the CBP management processor with the PDU ID for the PDU that is connected through the electrical power supply cable to the CBP, or the digital communication provides the PDU management processor with the CBP ID for the CBP that is connected through the electrical power supply cable to the PDU. The method further comprises identifying the electrical power supply cable connection by communicating first and second endpoints of the electrical power cable connection to a cluster management entity, wherein the first endpoint is identified by the CBP ID and the second endpoint is identified by the PDU ID. | 06-26-2014 |
20140180991 | RECOMMENDING ELECTRONIC CONTENT BASED UPON USER AVAILABILITY - Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval. | 06-26-2014 |
20140181001 | RECOMMENDING ELECTRONIC CONTENT BASED UPON USER AVAILABLITY - Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval. | 06-26-2014 |
20140181385 | FLEXIBLE UTILIZATION OF BLOCK STORAGE IN A COMPUTING SYSTEM - Embodiments of the present invention disclose a method, computer program product, and system for utilizing a block storage device as Dynamic Random-Access Memory (DRAM) space, wherein a computer includes at least one DRAM module and at least one block storage device interfaced to the computer using a double data rate (DDR) interface. During boot up, the computer configures DRAM and block storage devices of the computer for utilization as DRAM or block storage. Then the computer determines that more DRAM space is required. Responsive to determining that more DRAM space is required, the computer transforms a block storage device into DRAM space. Once the computer determines that the transformed block storage device that is being used for DRAM space is no longer needed to be used as DRAM space, the computer transforms the block storage device back to block storage space. | 06-26-2014 |
20140181564 | DETERMINING REDUNDANCY IN A POWER DISTRIBUTION SYSTEM - A computer-implemented method identifies the path of a first power circuit to a first power supply that is connected to supply power to an electronic device, and identifies the path of a second power circuit to a second power supply that is connected to supply power to the electronic device. The method then compares the path of the first power distribution circuit with the path of the second power distribution circuit to determine a measure of redundancy in the first and second distribution paths. A measure of redundancy may then be output to a user. | 06-26-2014 |
20140185078 | PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM - Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. | 07-03-2014 |
20140185083 | NETWORK PRINTER SELECTION BASED ON PRINTER STATUS AND PROFILES - A computer program product maintains a printer profile associated with each of a plurality of printers. For each printer, the printer profile includes the current power status, a cost to power up, and a rate of cost to print. A print job is received and, for each printer, a total cost to print the print job, including the cost to power on the printer, is determined. The print job is redirected from a default printer to a destination printer selected from printers having a lower total cost to print. Each printer profile may further include a time period to power up and a print speed, and, for each printer, a total time period to print the print job is determined. The total time period includes an amount of time to complete other print jobs, and further includes, where the printer is off, the time period to power on the printer. | 07-03-2014 |
20140185084 | PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM - Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. | 07-03-2014 |
20140186009 | STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS - A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. | 07-03-2014 |
20140189735 | STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS - A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. | 07-03-2014 |
20140189848 | INFERRING SECURITY DECISIONS FROM TRUSTED USERS - Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. | 07-03-2014 |
20140189849 | Inferring Security Decisions From Trusted Users - Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. | 07-03-2014 |
20140215148 | LIMITING THE EXECUTION OF BACKGROUND MANAGEMENT OPERATIONS IN A DRIVE ARRAY - Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. | 07-31-2014 |
20140215150 | Limiting The Execution Of Background Management Operations In A Drive Array - Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. | 07-31-2014 |
20140240919 | TARGETED COOLING TO SPECIFIC OVERHEATING RACK-MOUNTED SERVERS - A system selectively cools a set of at least one rack-mounted server in a chassis. The system comprises: a chassis; a chassis manager; a set of at least one thermal sensor coupled to each rack-mounted server in the chassis; a cold air source; a cold air conduit coupled to the cold air source; a plurality of cold air valves coupled to the cold air conduit; and an expandable tube of flexible memory material coupled to each of the plurality of cold air valves, where the expandable tube inflates with cold air from the cold air source to expose directional holes, and thus cold air, across a specific predetermined sub-area of a particular overheating rack-mounted server in response to the chassis manager detecting that the particular overheating rack-mounted server is exceeding a predetermined temperature. | 08-28-2014 |
20140254278 | Writing Data To A Thermally Sensitive Memory Device - Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device. | 09-11-2014 |
20140254279 | Writing Data To A Thermally Sensitive Memory Device - Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device. | 09-11-2014 |
20140258631 | Allocating Enclosure Cache In A Computing System - Allocating enclosure cache in a computing system that includes an enclosure and a plurality of enclosure attached servers, including: receiving, by the enclosure, memory access information from each of the plurality of enclosure attached servers; determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate as shared cache that can be accessed by two or more of the enclosure attached servers; and determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate to each enclosure attached server for exclusive use by the enclosure attached server. | 09-11-2014 |
20140258632 | Sharing Cache In A Computing System - Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server. | 09-11-2014 |
20140258633 | Sharing Cache In A Computing System - Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server. | 09-11-2014 |
20140258634 | Allocating Enclosure Cache In A Computing System - Allocating enclosure cache in a computing system that includes an enclosure and a plurality of enclosure attached servers, including: receiving, by the enclosure, memory access information from each of the plurality of enclosure attached servers; determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate as shared cache that can be accessed by two or more of the enclosure attached servers; and determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate to each enclosure attached server for exclusive use by the enclosure attached server. | 09-11-2014 |
20140285917 | WRITE AVOIDANCE AREAS AROUND BAD BLOCKS ON A HARD DISK DRIVE PLATTER - A method and computer program product identify the location of a bad block on a disk platter of a hard disk drive, determine an avoidance area extending from the bad block, and prevent data from being written to the avoidance area. | 09-25-2014 |
20140327538 | CABLE TRACING IN A DATACENTER - A cable detection system may be implemented in a datacenter to locate the path of a cable. The cable detection system includes a signal generator and driver circuit having its output in communication with a transformer, wherein the transformer has a first output coupled to a cable shield of an elongated cable and a second output coupled to a dedicated transmission wire extending lengthwise with the cable and exterior to the cable shield. The cable detection system further includes a plurality of detection circuits, wherein each detection circuit includes an electromagnetically-powered receiver coupled to a light emitting diode, and wherein radio frequency signals emitted from the transmission wire activate the light emitting diodes of the detection circuits within a detection distance of the cable. | 11-06-2014 |
20140327539 | CABLE TRACING IN A DATACENTER - Embodiments of the invention provide a method of tracing cable through a datacenter. The method causes a cable to emit a radio frequency signal along the length of the cable. One or more structural members have a detection circuit that will illuminate in response to detecting the radio frequency signal with greater than a threshold signal strength, such that the one or more structural members are easy to identify when the detection circuit is illuminated. The one or more structural members may be removed to gain physical access to the cable. | 11-06-2014 |
20140355068 | EMBEDDED DOCUMENT DESTINATION ROUTING RESTRICTIONS - Embodiments of the present invention provide a method, system and computer program product for restricting transmission of a document. In an embodiment of the invention, a method for restricting transmission of a document is provided. The method includes loading an image of a document into memory of a computer, receiving a request to transmit the image to a specified destination, and in response to receiving the request, locating an embedded code within the document, extracting a restriction as to the transmission of the image of the document, applying the restriction, and transmitting the image of the document to the specified destination only if permitted by the restriction. | 12-04-2014 |
20140355071 | FACSIMILE REQUIREMENTS MONITORING - Embodiments of the present invention provide a method, system and computer program product for facsimile requirements monitoring during facsimile transmission of a form. In an embodiment of the invention, a method of facsimile requirements monitoring during facsimile transmission of a form is provided. The method includes loading a document directed for facsimile transmission by a facsimile data processing system, identifying within the document a facsimile requirement that a particular location within the document include end user supplied data, determining whether or not the particular location specified by the facsimile requirement includes end user supplied data, and generating an error message in the facsimile device responsive to a determination that the particular location lacks any end user supplied data. | 12-04-2014 |
20140355201 | PROTECTING DEVICES AGAINST HOT AIR BACKFLOW IN A COMPUTER SYSTEM RACK HAVING A REAR DOOR HEAT EXCHANGER - A rear door heat exchanger is used to cool exhaust air as it exits a rack containing a plurality of computing devices. An air flow rate is determined for each of the plurality of computing devices within the rack, wherein each of the plurality of computing devices includes a fan drawing air through the computing device. The position of a baffle or louver is controlled to allow exhaust air to bypass the rear door heat exchanger in response to determining that the total air flow rate through the plurality of computing devices exceeds a predetermined air flow capacity threshold of the rear door heat exchanger. | 12-04-2014 |
20140359021 | CONTEXT DRIVEN MODIFICATION OF ATTACHMENTS IN A MESSAGING SESSION - Embodiments of the present invention provide a method, system and computer program product for message attachment modification based upon determined context. In an embodiment of the invention, a method for message attachment modification based upon determined context is provided. The method includes loading into memory a message referencing a file to be transmitted to a recipient, determining a context for the transmission of the message, modifying the file according to the determined context, and transmitting the message with the modified file to the recipient. | 12-04-2014 |
20140359028 | CONTEXT DRIVEN MODIFICATION OF ATTACHMENTS IN A MESSAGING SESSION - Embodiments of the present invention provide a method, system and computer program product for message attachment modification based upon determined context. In an embodiment of the invention, a method for message attachment modification based upon determined context is provided. The method includes loading into memory a message referencing a file to be transmitted to a recipient, determining a context for the transmission of the message, modifying the file according to the determined context, and transmitting the message with the modified file to the recipient. | 12-04-2014 |
20140360696 | DYNAMIC SURFACE AREA EXPANSION IN A REAR DOOR HEAT EXCHANGER - A rear door heat exchanger includes a door frame have opposing first and second edges, a fluid supply manifold secured along the first edge of the door frame, a fluid return manifold secured along the second edge of the door frame, a fin tube assembly including a plurality of fin tubes extending across a central region of the rear door heat exchanger and forming an air flow pathway through the fin tube assembly, and an actuator for controllably moving the fin tube assembly between retracted and extended positions. The rear door heat exchanger further comprises a plurality of supply pipe coupling assemblies and a plurality of return pipe coupling assemblies, each pipe coupling assembly providing fluid communication between one of the manifolds and one of the fin tubes. | 12-11-2014 |
20140362520 | DYNAMIC SURFACE AREA EXPANSION IN A REAR DOOR HEAT EXCHANGER - A method comprising flowing a liquid through supply pipe couplings to a fin tube assembly of an air-to-liquid heat exchanger and through the fin tube assembly to return pipe couplings, wherein the fin tube assembly forms a central air flow pathway. The method further comprises passing air through components within a rack secured to the rear door heat exchanger and through the fin tube assembly and detecting an operating condition within the rack. The method then automatically moves the fin tube assembly from a retracted position to an extended position in response to the operating condition, wherein the retracted position directs substantially all of the air to exit the rack through the central air flow pathway, and wherein the extended position allows the air to exit through the central air flow pathway and also through first and second side air flow pathways. | 12-11-2014 |
20140370981 | REDUCING THE BANDWIDTH REQUIREMENTS OF MULTIPLAYER GAMING SESSIONS - A computer identifies a group of players that are participating in a gaming session that is hosted by the computer. The computer identifies the location of an avatar of a first player included in the group of players. The computer identifies the location of a second avatar of a second player included in the group of players and determining the proximity between the first avatar and the second avatar. The computer determines if the proximity exceeds a threshold. Responsive to the determination that the proximity does not exceed the threshold, the computer sends data for the gaming session to the first player and the first player passes that data to the second player. | 12-18-2014 |
20140370992 | PLAYER SUBSTITUTION TO PRESERVE TEAM BALANCE - Exemplary embodiments determine a type, and a status of a first character included in a group of characters participating in a gaming session. Exemplary embodiments determine a goal of the group of characters. Exemplary embodiments determine an environment of the group of characters. Exemplary embodiments determine a balance of a type of characters required to achieve the goal. Exemplary embodiments determine if the first character is available for continued participation in the gaming session. Exemplary embodiments respond to the determination that the first character is not available for continued participation in the gaming session, by identifying a first computer controlled character to replace the first character. Exemplary embodiments determine replace the first character with the identified first computer controlled character. | 12-18-2014 |
20140379815 | AGGREGATING MESSAGE RESPONSES INTO TOPIC-ORGANIZED CONTENT - A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. The computer processor reorganizes the response to the electronic message, such that the content elements are aligned with similar-topic content elements and associated with one of the one or more topics of the response to generate a topic organized aggregate message, and in response to receiving an additional response to the electronic message, the computer processor updates the topic organized aggregate message to include one or more additional content elements from the additional response, wherein the one or more additional content elements are aligned with the one or more topics of the topic organized aggregate message. | 12-25-2014 |
20140379818 | AGGREGATING MESSAGE RESPONSES INTO TOPIC-ORGANIZED CONTENT - A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. The computer processor reorganizes the response to the electronic message, such that the content elements are aligned with similar-topic content elements and associated with one of the one or more topics of the response to generate a topic organized aggregate message, and in response to receiving an additional response to the electronic message, the computer processor updates the topic organized aggregate message to include one or more additional content elements from the additional response, wherein the one or more additional content elements are aligned with the one or more topics of the topic organized aggregate message. | 12-25-2014 |
20150019851 | STATE DEPENDENT OPTIMIZATION FOR SEQUENTIAL BOOTING OF HETEROGENEOUS SYSTEMS - A method and computer program product for implementing the method, where the method comprises obtaining boot dependencies among a plurality of systems, wherein a boot dependency identifies a dependent system, a service system that provides a service to the dependent system, a provide state of the service system, and a need state of the dependent system that requires the service system to have reached the provide state. The method further comprises obtaining historical measurements of the time periods between states for each of the systems. Then, during a process of booting the plurality of systems, the method initiates boot of each dependant system at a time that is determined, based on the historical measurements, to allow the dependent system to reach the need state no earlier than the time at which the service system is determined, based on the historical measurements, to reach the provide state. | 01-15-2015 |
20150029076 | SHARING AN OVERLAPPING REGION IN A DISPLAY - A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. | 01-29-2015 |
20150029077 | SHARING AN OVERLAPPING REGION IN A DISPLAY - A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. | 01-29-2015 |
20150039718 | SHARING LOCAL CACHE FROM A FAILOVER NODE - Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. | 02-05-2015 |
20150039834 | SHARING LOCAL CACHE FROM A FAILOVER NODE - Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. | 02-05-2015 |
20150046816 | DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE - Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. | 02-12-2015 |
20150046817 | DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE - Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. | 02-12-2015 |
20150065087 | SECURITY RECOMMENDATIONS FOR PROVIDING INFORMATION IN A COMMUNICATION SYSTEM - A method of and system for receiving a communication is disclosed. A receiving device receives the communication. The method and system classify user information into a set of security levels. A caller from a source of potential callers is associated with a security rating within the set of security levels. Using at least one caller-identification resource, the communication can be identified as being related to the caller with the security rating. The method and system determine a recommendation for providing user information. The recommendation may be based on the security rating within the set of security levels. The determined recommendation for providing user information in response to the communication is issued. | 03-05-2015 |
20150065251 | PLAYER GENERATED CONTENT MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded. | 03-05-2015 |
20150065256 | PLAYER GENERATED CONTENT MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded. | 03-05-2015 |
20150077271 | CONTROLLING VEHICULAR TRAFFIC ON A ONE-WAY ROADWAY - A method controls vehicular traffic on a one-way roadway. A hardware sensor detects vehicular traffic on a roadway. A hardware traffic control device determines whether the vehicular traffic on the roadway has been moving exclusively in a first direction during a preceding period of time, such that the roadway is a one-way roadway on which current vehicular traffic is authorized to travel only in the first direction. The hardware sensor detects an errant vehicle that is traveling on the one-way roadway in a second direction that is opposite the first direction. In response to determining that the errant vehicle is traveling in the second direction on the one-way roadway, a warning signal is transmitted to vehicles, other than the errant vehicle, on the one-way roadway. | 03-19-2015 |
20150077273 | CONTROLLING VEHICULAR TRAFFIC ON A ONE-WAY ROADWAY - A hardware traffic control device controls vehicular traffic on a one-way roadway. A hardware sensor detects vehicular traffic on a roadway in order to enable a hardware traffic control device to determine that the vehicular traffic on the roadway has been moving exclusively in a first direction during a preceding period of time, thus identifying the roadway as a one-way roadway in which current vehicular traffic is authorized to travel only in the first direction. The hardware sensor then detects an errant vehicle that is traveling in the opposite direction on the one-way roadway. A disabling electronic signal is then transmitted from the hardware traffic control device to disable a distracting electronic device within the errant vehicle. | 03-19-2015 |
20150085882 | REDUCTION OF ON-HOLD CALL BANDWIDTH CONSUMPTION - A computer processor determines that a call has been placed on hold. The computer processor sends a first packet to a local exchange carrier (LEC) of the calling device, wherein the first packet includes instructions to release the bandwidth of the call placed on-hold, between the LEC and a recipient of the call. The computer processor sends a second packet intermittently to the LEC, wherein the second packet maintains a connection between the calling device of the call and the LEC. The computer processor determines that a representative is available, wherein the representative is the recipient of the call, and in response to determining the representative that is available responds to the call, the computer processor sending a third packet to connect the calling device of the call to the representative that is available. | 03-26-2015 |
20150089308 | KEYBOARD, VIDEO AND MOUSE SWITCH IDENTIFYING AND DISPLAYING NODES EXPERIENCING A PROBLEM - A method includes a keyboard, video and mouse (KVM) switch communicating over a network with service processors of a plurality of compute nodes, the KVM switch identifying a compute node from among the plurality of compute nodes that is experiencing one or more predetermined problems, and the KVM switch automatically generating a graphical user interface including the identity of the identified compute node for display on a display device that is connected to the KVM switch. | 03-26-2015 |