Patent application number | Description | Published |
20090285616 | METHOD AND APPARATUS FOR RECONFIGURABLE KEY POSITIONING ON A KEYBOARD - A method and apparatus for a reconfigurable keyboard is provided. One implementation involves a row mounting mechanism for mounting each row of keys on a row frame, the row mounting mechanism allowing one or more keys of each row to be moved and locked in a certain row position, whereby the spacing of one or more keys in each row on the keyboard can change. The apparatus also includes a column mounting mechanism for mounting each column of keys on a column frame, the column mounting mechanism allowing one or more keys of each column to be moved and locked in a certain column position, whereby the spacing of one or more keys in each column on the keyboard can change. As such, one or more keys can be moved in row or column and to lock or unlock key positioning for arranging the keys on a keyboard according to a reconfigurable layout. | 11-19-2009 |
20090312002 | METHOD AND SYSTEM FOR SIGNAL FIELD STRENGTH PREDICTION IN COMMUNICATION SYSTEMS - A method and system for communication involving a mobile station and one or more radio base stations providing a signal field in an area, is provided. One implementation includes determining signal field variation at a mobile station in said area due to motion of the mobile station relative to the base stations; and predicting the time remaining to an eventual drop of the signal field by estimating the time remaining to an eventual drop of the signal field based on a rate of variation of the signal field. | 12-17-2009 |
20100023805 | METHOD AND SYSTEM FOR DISASTER RECOVERY BASED ON JOURNALING EVENTS PRUNING IN A COMPUTING ENVIRONMENT - A method and system for automated disaster recovery in an information technology computing system including computing resources, is provided. One implementation involves logging system events in a journaling log file, filtering the events of the log file for each resource and storing the filtered log file, reading the filtered log file, and restarting from a backup file by applying the filtered events to a backup file for recovery. | 01-28-2010 |
20100025449 | METHOD AND APPARATUS FOR REMOTELY ACTIVATING DESTRUCTION OF A GLASS WINDOW - The disclosure relates to a method and apparatus for activating destruction of window glass. In one embodiment, the disclosure relates to a method for remotely destroying a glass by providing a glass window having a resonant vibration frequency; identifying a frequency channel on the glass window; positioning a resonator at or near the embedded frequency channel, the resonator providing one of an acoustical vibration or mechanical vibration to the glass window, the acoustical vibration or mechanical vibration substantially matching the resonant frequency of the glass window; detecting an external event necessitating destruction of the window glass; activating the resonator to deliver the acoustical vibration or mechanical vibration substantially matching the resonant frequency of the glass to the frequency channel. | 02-04-2010 |
20100064136 | METHOD AND SYSTEM FOR ELECTRONIC VEHICLE DOCUMENT DISPLAY - A method and system for automatically displaying electronic documents on a vehicle display screen, is provided. One implementation involves transferring an encrypted digital certificate to a control module in a vehicle, the vehicle including a display screen embedded in a window area of the vehicle, wherein the control module is configured for connection to the display screen; storing the digital certificate in a memory unit of the control module; automatically displaying information on the display screen by: retrieving the digital certificate from the memory unit of the control module; and upon validating the digital certificate in the control module, displaying said information associated with the digital certificate on the display screen. | 03-11-2010 |
20100171993 | Document Information Acquisition and Notification of Duplicate Document Storage - Mechanisms for document information acquisition and notification of duplicate document storage are provided. The mechanisms convert a physical hard copy document to an electronic form of the document and generates a first digital fingerprint of the electronic form of the document. The mechanisms further retrieve one or more second digital fingerprints for previously stored electronic forms of documents. The first digital fingerprint is compared to the one or more second digital fingerprints. Storage of the electronic form of the document is controlled based on results of comparing the first digital fingerprint to the one or more second digital fingerprints. | 07-08-2010 |
20100174761 | Reducing Email Size by Using a Local Archive of Email Components - A mechanism for reducing electronic mail (email) sizes by using a local archive of email components is provided. The mechanism receives the email file, the email file specifying a sender identifier of a sender of the email file, a recipient identifier of a recipient of the email file, and common component information for a common component included in the email file, the common component being a component of the email file that is common amongst a plurality of email files sent from the sender. The mechanism identifies the common component of the email file and determines whether to remove the common component from the email file before forwarding the email file to the recipient based on at least the sender identifier. Based on the determination, the common component is either removed or kept in the email file that is subsequently transmitted to the recipient computer. | 07-08-2010 |
20100198594 | MOBILE PHONE COMMUNICATION GAP RECOVERY - Mobile phone signals may be corrupted by noise, fading, interference with other signals, and low strength field coverage of a transmitting and/or a receiving mobile phone as they pass through the communication network (e.g., free space). Because of the corruption of the mobile phone signal, a voice conversation between a caller and a receiver may be interrupted and there may be gaps in a received oral communication from one or more participants in the voice conversation forcing either or both the caller and the receiver to repeat the conversation. Transmitting a transcript of the oral communication along with a voice signal comprising the oral communication can help ensure that voice conversation is not interrupted due to a corrupted voice signal. The transcript of the oral communication can be used to retrieve parts of the oral communication lost in transmission (e.g., by fading, etc.) to make the conversation more fluid. | 08-05-2010 |
20100211822 | DISASTER RECOVERY BASED ON JOURNALING EVENTS PRIORITIZATION IN INFORMATION TECHNOLOGY ENVIRONMENTS - Disaster recovery is performed based on journaling events prioritization in information in an information technology environment. One implementation involves prioritizing log file events for scheduling of jobs on a computing system, by logging events concerning each job execution plan, in a log file, and for disaster recovery, prioritizing logged events based on corresponding job urgency and relevance level and performing recovery by reapplying the events of log files in the priority order such that more urgent and relevant jobs are recovered first. | 08-19-2010 |
20120079495 | MANAGING ACCESS TO A SHARED RESOURCE IN A DATA PROCESSING SYSTEM - Processes requiring access to shared resources are adapted to issue a reservation request, such that a place in a resource access queue, such as one administered by means of a semaphore system, can be reserved for the process. The reservation is issued by a Reservation Management module at a time calculated to ensure that the reservation reaches the head of the queue as closely as possible to the moment at which the process actually needs access to the resource. The calculation may be made on the basis of priority information concerning the process itself, and statistical information gathered concerning historical performance of the queue. | 03-29-2012 |
20120158206 | REGULATING THE TEMPERATURE OF A DATACENTER - A method for regulating the temperature of a datacenter within an optimum temperature range includes predicting, using a computing device, a thermal load from a workload scheduler containing information on machines assembled in the datacenter to be turned on and/or off during a particular time period, and the thermal load of the datacenter associated with the work of the machines within the particular time period; and controlling at least one cooling system of the datacenter based upon the predicted thermal load within the particular time period under consideration of the thermal inertia of the datacenter by at least one of activating, controlling, and deactivating cooling resources of the cooling system in advance to maintain the temperature of the datacenter within the optimum temperature range. | 06-21-2012 |
20120185865 | MANAGING ACCESS TO A SHARED RESOURCE IN A DATA PROCESSING SYSTEM - Processes requiring access to shared resources are adapted to issue a reservation request, such that a place in a resource access queue, such as one administered by means of a semaphore system, can be reserved for the process. The reservation is issued by a Reservation Management module at a time calculated to ensure that the reservation reaches the head of the queue as closely as possible to the moment at which the process actually needs access to the resource. The calculation may be made on the basis of priority information concerning the process itself, and statistical information gathered concerning historical performance of the queue. | 07-19-2012 |
20130155280 | PRE-SETTING THE FOREGROUND VIEW OF A PHOTOGRAPH - A method, computer program product, and computer system for pre-setting the foreground view of a photograph. A reference image is captured by a camera. The reference image is compared to a current a current image displayed within a viewing field of the camera. One or more alignment guides are displayed within the viewing field of the camera to aid in aligning the reference image and the current image. If it is determined that the reference image and the current image are aligned, the capture of a preferred photograph is enabled. | 06-20-2013 |
20140135036 | Proximity Based Reminders - Mechanisms, in a data processing system, for generating a reminder notification are provided. The physical presence of another device within a physical local range of a wireless communication device is detected. An identity associated with the other device is determined and a determination is made as to whether a reminder record is stored in association with the identity associated with the other device. In response to a reminder record being stored in association with the identity associated with the other device, a reminder notification is generated and output on the wireless communication device based on content of the reminder record. | 05-15-2014 |
20140207293 | ENERGY PRODUCTION FROM FLUID - Exemplary embodiments of the present invention disclose a method, computer program product, and system for energy production from fluid. In a step, the computer determines if the rate of the fluid level increase in the one of the one or more fluid reservoirs is above a predetermined threshold. In a step, the computer sends a signal to a bypass valve to open and release fluid through a bypass fluid connection from the one of the one or more fluid reservoirs if the rate of the fluid level increase in the one of the one or more fluid reservoirs is above a predetermined threshold. In a step, the computer sends a signal to a regulation valve to open for fluid connection to one or more turbines if the fluid level of the one of the one or more fluid reservoirs is above the predetermined threshold level. | 07-24-2014 |
20140359375 | SELECTIVE PURGING OF A LOG STRUCTURE - A method, system, and/or computer program product log at least one stream of records in a data-processing system. A stream of records is received in succession. Records from the stream of records are logged into a log structure. In response to fulfillment of a pre-defined purging condition: the logging of the records are diverted to a buffer structure; the log structure is purged according to a set of purging criteria in response to the diverting; the records logged in the buffer structure are moved to the log structure in response to a completion of the purging; and the logging to the log structure is restored in response to a completion of the moving. | 12-04-2014 |