Patent application number | Description | Published |
20120011140 | Analytics of historical conversations in relation to present communication - A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications. | 01-12-2012 |
20120246199 | BIDIRECTIONAL NAVIGATION BETWEEN MAPPED MODEL OBJECTS - Provided are techniques for displaying the model objects in models in a models stack. In response to a model object in a model of the models stack being selected as an initial context, one or more navigation paths associated with the selected model object are displayed, wherein each of the navigation paths has nodes represented as graphical components that are built in real time. In response to a user selecting a node in one of the one or more navigation paths, a new model object represented by the selected node in the models stack is navigated to in one of a forward direction and a backward direction to provide bidirectional navigation between the model objects in the models without loosing the initial context and one or more navigation paths associated with the new model object and at least one appended node that represents a previously traversed model object are displayed. | 09-27-2012 |
20120284353 | ANALYTICS OF HISTORICAL CONVERSATIONS IN RELATION TO PRESENT COMMUNICATION - A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications. | 11-08-2012 |
20120330951 | PROVIDING ACCURATE RECIPIENT LISTS BY CORRELATING TAGGED KEYWORDS TO RECIPIENT LISTS - A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used. | 12-27-2012 |
20130080349 | MANAGEMENT AND NOTIFICATION OF OBJECT MODEL CHANGES - Techniques are disclosed for managing development of a model set comprised of one or more object models by a plurality of model developers. Each model developer may be considered an interested party. For example, when a model developer changes an area of the model, that person becomes the most interested party in other changes made to the same area. An automated mechanism is provided to track changes made to the model set and informs interested parties as changes are made or after changes are made to the model based on a weighting system. In one embodiment, the weighting system may be based on a distance from the changed portions and on the amount of time since a party last made a change to the same area. | 03-28-2013 |
20130080350 | MANAGEMENT AND NOTIFICATION OF OBJECT MODEL CHANGES - Techniques are disclosed for managing development of a model set comprised of one or more object models by a plurality of model developers. Each model developer may be considered an interested party. For example, when a model developer changes an area of the model, that person becomes the most interested party in other changes made to the same area. An automated mechanism is provided to track changes made to the model set and informs interested parties as changes are made or after changes are made to the model based on a weighting system. In one embodiment, the weighting system may be based on a distance from the changed portions and on the amount of time since a party last made a change to the same area. | 03-28-2013 |
20130085953 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 04-04-2013 |
20130086254 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 04-04-2013 |
20130179970 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 07-11-2013 |
20130179977 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 07-11-2013 |
20130185086 | GENERATION OF SALES LEADS USING CUSTOMER PROBLEM REPORTS - Methods and apparatus, including computer program products, implementing and using techniques for generating sales leads in a sales lead generation engine. The sales lead generation engine receives one or more keywords describing one or more aspects of a product. The sales lead generation engine performs a search using the received one or more keywords in a collection of problem reports to identify matching keywords in the problem reports. A display of a computing device displays matching keyword pairs resulting from the search, along with a context in which the keywords occur. A selection of one or more matching keyword pairs is received from a user of the computing device. The sales lead generation engine performs a sales-oriented operation with respect to a customer associated with a problem report related to a selected matching keyword pair | 07-18-2013 |
20130185105 | GENERATION OF SALES LEADS USING CUSTOMER PROBLEM REPORTS - Methods implementing and using techniques for generating sales leads in a sales lead generation engine. The sales lead generation engine receives one or more keywords describing one or more aspects of a product. The sales lead generation engine performs a search using the received one or more keywords in a collection of problem reports to identify matching keywords in the problem reports. A display of a computing device displays matching keyword pairs resulting from the search, along with a context in which the keywords occur. A selection of one or more matching keyword pairs is received from a user of the computing device. The sales lead generation engine performs a sales-oriented operation with respect to a customer associated with a problem report related to a selected matching keyword pair | 07-18-2013 |
20130311762 | PROVIDING USER ACCESS TO SPECIFIC PROGRAMS AND DOCUMENTS BEFORE THE BOOTING PROCESS IS COMPLETED - A method, system and computer program product for providing a user access to specific programs and documents before a booting process is completed. A quick start list is generated containing a list of programs and documents that are to be provided priority in initialization during the booting process. A post-quick start list is generated that includes programs that are to be started after the initialization of the programs and documents listed in the quick start list. The programs and documents listed in the quick start list are initialized as soon as feasibly possible in light of the requirements of the booting process. Upon initializing these programs and documents, such programs and documents may be displayed as icons on the user's computer screen. As a result, the user has access to such programs and documents more quickly without having to wait for the booting process to be completed. | 11-21-2013 |
20140156592 | UPDATING A CONFERENCE INVITATION RESPONSIVE TO USER LOCATION - Embodiments of the present invention disclose a computer method, computer program product, and computer system for automatically updating a conference invitation with contact information corresponding to a user's geographical location. A user on a client device accepts an invitation to a conference. The geographical location of the client device is determined and stored in a database. Using the location of the client device, a conference information database is accessed, and location specific conference contact information is determined. The location specific conference contact information is then input into the conference invitation so that the user has location specific conference contact information. In another embodiment, when the user accesses the conference invitation, the location of the client device is determined, and if the location has changed from when the invitation was accepted, a new location is determined. The conference contact information for the new location is determined and input into the invitation. | 06-05-2014 |
20140365603 | WIRELESSLY SYNCING CONTENT OF AN APPLICATION WITHOUT REQUIRING DEVICE TO BE PLUGGED INTO POWER SOURCE - A method, system and computer program product for wirelessly syncing content. An analytics engine in a mobile computing device gathers and stores information regarding battery usage for data synchronizations. Upon receiving an indication for content of an application to be synced with the device, the analytics engine determines an estimated amount of content to be synced as well as an estimated amount of battery usage for syncing the estimated amount of content based on the stored information. The content will be wirelessly synced with the device if there is sufficient battery life for syncing the content. If there is not enough battery life for wirelessly syncing the entire content, then a portion of the content will be synced. In this manner, the device does not need to be plugged into a power source and will only sync the amount of content that the device has power to do so. | 12-11-2014 |
20140365636 | WIRELESSLY SYNCING CONTENT OF AN APPLICATION WITHOUT REQUIRING DEVICE TO BE PLUGGED INTO POWER SOURCE - A method, system and computer program product for wirelessly syncing content. An analytics engine in a mobile computing device gathers and stores information regarding battery usage for data synchronizations. Upon receiving an indication for content of an application to be synced with the device, the analytics engine determines an estimated amount of content to be synced as well as an estimated amount of battery usage for syncing the estimated amount of content based on the stored information. The content will be wirelessly synced with the device if there is sufficient battery life for syncing the content. If there is not enough battery life for wirelessly syncing the entire content, then a portion of the content will be synced. In this manner, the device does not need to be plugged into a power source and will only sync the amount of content that the device has power to do so. | 12-11-2014 |