Patent application number | Description | Published |
20100064010 | ENCOURAGING USER ATTENTION DURING PRESENTATION SESSIONS THROUGH INTERACTIVE PARTICIPATION ARTIFACTS - A presentation session can be identified in which at least one participant of the presentation session is associated with a computing device. A participation artifact can be conveyed to one or more participants. The participation artifact can be configured to solicit a response from a participant and to ensure that each artifact receiving participant is paying attention. The response can result from interactions between the associated participant and the computing device. The interactions can be specific to the participation artifact and can be responsive to a receipt of the participation artifact. A response to the participation artifact can be received from each participant receiving a participation artifact. The received response can be processed to assess an attention level of each participant receiving a participation artifact. | 03-11-2010 |
20100067670 | VOICE RESPONSE UNIT HARVESTING - A system, method and program product for providing voice response unit (VRU) harvesting. A system is provided that includes: an account management system for allowing a user to identify a set of VRUs and associated data desired from each VRU; a navigation system for automatically navigating each VRU and collecting the desired data from each VRU; and an output system for outputting the desired data for the user. | 03-18-2010 |
20100070860 | ANIMATED CLOUD TAGS DERIVED FROM DEEP TAGGING - A tagging engine can analyze deep tag data associated with a portion of media and process the tagging data into a deep tag cloud. Tag clouds can contain snapshot information about a particular media stream segment. Tag clouds for the entire duration or portions of the media stream can be aggregated. Aggregated tag clouds can be processed and compiled into a slideshow form. The tag clouds in the slideshow can be animated and presented to summarize media that includes the deep tags from which the tag clouds were derived. | 03-18-2010 |
20100076951 | SERVICE FOR NEGOTIATING A MEETING LOCATION GIVEN MULTIPLE USER PREFERENCES AND LOCATIONS USING SOCIAL NETWORKING - A computer-implemented method for providing a meeting location recommendation comprises receiving user preferences specifying types of recommendations to be provided, including defining which types of user ratings of services from a social networking service to consider, wherein at least a portion of the services being rated have respective service locations; receiving a meeting location recommendation request, including a list of participants; initiating a request to the social networking service to retrieve a subset of the user ratings based at least in part on the user preferences of the participants; and returning to the participants a list of the services and corresponding service locations specified in the subset of the user ratings to enable the participants to negotiate one of the service locations to serve as an agreed to meeting location. | 03-25-2010 |
20100077034 | MODIFYING ENVIRONMENTAL CHAT DISTANCE BASED ON AVATAR POPULATION DENSITY IN AN AREA OF A VIRTUAL WORLD - A mechanism for modifying a chat distance associated with an environmental chat based on the avatar population density of an area of a virtual universe associated with the environmental chat. An initial environmental chat distance may be determined based on the avatar population density, i.e., the number of avatars, in the area of the virtual universe associated with the environmental chat. The environmental chat distance may be modified in response to a change in the number of avatars in the area of the virtual universe associated with the environmental chat. The environmental chat distance may be modified such that the environmental chat distance is inversely proportional to the detected number of avatars in the virtual universe area associated with the environmental chat. | 03-25-2010 |
20100077036 | SYSTEM AND METHOD FOR INTERACTIVELY OBTAINING ACCESS TO RESTRICTED CONTENT - The present invention is directed to a system, method and program product for interactively obtaining access to restricted content. A system is disclosed that includes a first device operable by a restricted party to transmit an access request to a restricting party. The access request requests access to the restricted content or to restricted event. A server receives the access request and relays it to the restricting party. A second device that is operable by the restricting party receives the access request from the server and transmits an access request response to the first device via the server. | 03-25-2010 |
20100077318 | MODIFYING ENVIRONMENTAL CHAT DISTANCE BASED ON AMOUNT OF ENVIRONMENTAL CHAT IN AN AREA OF A VIRTUAL WORLD - A mechanism for modifying a chat distance associated with an environmental chat based on a determined chat amount within a time window of a predetermined amount of time in an area of a virtual universe associated with the environmental chat. An initial environmental chat distance may be determined based on the determined chat amount within an initial time window in the virtual universe area associated with the environmental chat. The initial environmental chat distance may be modified in response to a change in the chat amount within a subsequent time window. The environmental chat distance may be modified such that the environmental chat distance is inversely proportional to the determined chat amount in the virtual universe area associated with the environmental chat | 03-25-2010 |
20100080410 | METHOD AND SYSTEM FOR PREVENTING USE OF A PHOTOGRAPH IN DIGITAL SYSTEMS - A photograph processing system that prevents the unpermitted use of photographic media containing a depiction of a protected person, view or item. A permission object is located in physical proximity to the person, view or object being protected. A photograph including the permission object will contain a depiction of the permission object. When the photograph is processed, the photograph processing system scans the photograph for a permission object. If a permission object is found, the system further processes the photograph according to the permission associated with the permission object. | 04-01-2010 |
20100080470 | TAGGING IMAGES BY DETERMINING A SET OF SIMILAR PRE-TAGGED IMAGES AND EXTRACTING PROMINENT TAGS FROM THAT SET - An image can be compared with a set of images, each including pre-existing tags. A similar image set can be determined from results of the comparing. Pre-existing tags can be extracted from the similar image set. Prominent tags can be determined from the extracted pre-existing tags. At least one of the determined prominent tags can be added to a tag set associated with the image. | 04-01-2010 |
20100082583 | AUTOMATICALLY TAGGING SOFTWARE RESOURCES WITH SEARCH TERMS - A user can enter terms into a search engine, which produces a set of results. The results can include links to software resources. In one embodiment, when a user selects one of these links, the associated resource can be automatically tagged with one or more of the search terms. In another embodiment, the software resource can be tagged with one or more of the search terms only after a user responds affirmatively to a prompt to tag the software resource with one or more of the search terms. In still another embodiment, one or more search terms can be automatically applied to one or more software resources when search results are produced by the search engine. | 04-01-2010 |
20100082645 | SORTING RECORDS BASED ON FREE TEXT FIELD CONTENT - Disclosed are a method, system and computer program product for sorting records based on content in a free text field. A request is received by a sort function to sort a free text field. The sort function request is intercepted. The content in the free text field is analyzed. One or more new focus words are identified by the analysis. The new focus words are used to sort the free text field. The focus words in the free text field are highlighted and sorted alphabetically. Sorted free text field results based on the new focus words are displayed to a user on the user's display. | 04-01-2010 |
20100088613 | VOICE RESPONSE UNIT PROXY UTILIZING DYNAMIC WEB INTERACTION - A system, method and program product for providing a voice response unit (VRU) proxy. A system is provided that includes: a graphical user interface (GUI) for dynamically displaying information from a VRU and for receiving data from a user; a system for initiating a call with the VRU; and a VRU interface system for transmitting data from the user to the VRU, and for using speech recognition to capture broadcasts from the VRU for display within the GUI. | 04-08-2010 |
20100114485 | Providing Popular Global Positioning Satelite (GPS) Routes - A method, system, and computer program product for providing popular routes via a global positioning satellite (GPS) system. A GPS device receives a route request from a user. The GPS device then determines a current location of the GPS device and connects to a network server. In response to connecting to the network server, the GPS device transmits a route selection request to the network server. In response, the GPS device receives a route selection list from the network server where the route selection list contains a plurality of routes previously taken by other drivers. Each route is assigned a popularity rating. The GPS device displays one or more of the routes of the route selection list, and requests that a user select a route. After the user selects a route the GPS device displays the selected route as an overlay on a map display. | 05-06-2010 |
20100138166 | ESTIMATING CONSUMER ALCOHOL INTAKE USING NON-INVASIVE TECHNOLOGY - One or more alcohol inputs are received at the interactive system. Each of the alcohol inputs corresponds to an alcoholic beverage to be consumed by a consumer. The system calculates an estimated blood-alcohol level of the consumer based on the alcohol inputs. The estimated blood-alcohol level is compared with one or more alcohol impairment limits retrieved from an electronic data store. If the comparison reveals that the consumer might be impaired, an alert is automatically signaled. | 06-03-2010 |
20100185552 | PROVIDING GPS-BASED LOCATION AND TIME INFORMATION - Methods and apparatus, including computer program products, implementing and using techniques for providing data pertaining to a one or more users' visits to an establishment. A location of one or more global positioning system devices is determined. Each global positioning system device is associated with a user of the device. One or more establishments situated at each determined location are identified. One or more of a time of day and a duration of the user's visit to the establishment is determined. One or more of the location, the time of day and the duration of the user's visit are recorded in a database. | 07-22-2010 |
20100185946 | MULTI-TOUCH DEVICE HAVING A BOT WITH LOCAL AND REMOTE CAPABILITIES - A system, method, and program product for instantiating and executing a bot on an interface system are disclosed. A bot is an agent for the user and includes an animated visual personification. The system includes an interface system including a graphical user interface, a system for instantiating a bot and displaying the bot on the graphical user interface, and a command processing system for causing the bot to execute one of a plurality of actions in response to a user command. The plurality of actions includes at least one local capability and at least one remote capability. The at least one remote capability also includes a system for transferring the bot to a second interface at a remote location. | 07-22-2010 |
20100191466 | GPS LOCATION AND FAVORITE PREDICTION BASED ON IN-VEHICLE META-DATA - According to one embodiment of the present invention, a method for automatically entering favorite locations into a navigation system is provided. The method according to one embodiment includes receiving information regarding a location from an object within a vehicle using a navigation system. An identifier to the information and the information and identifier are stored in the navigation system. The user may retrieve the information from the navigation system using the identifier. The information from the objects may be received in various wireless formats, including RFID, Bluetooth and Wi-Fi. | 07-29-2010 |
20100251167 | SCROLLBAR USER INTERFACE FOR MULTITOUCH DEVICES - Two sliding user interactions along a display surface of a multitouch input display device are detected in approximately opposite directions proximate to a display location of a scroll element displayed on a graphical user interface (GUI) of the device. Available content displayed within the GUI is automatically zoomed based upon the detected two sliding user interactions along the display surface. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 09-30-2010 |
20100274889 | AUTOMATED FEED READER INDEXING - An incoming web feed received from a web feed document server is monitored for changes associated with a web feed document. A change associated with the web feed document is determined to have occurred. A priority is assigned to the change associated with the web feed document based upon a ranking criterion. The change associated with the web feed document is stored with the assigned priority to a memory. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 10-28-2010 |
20100277606 | PREDICTIVE PERSONAL VIDEO RECORDER OPERATION - A predictive personal video recorder (PVR) can include a tuner, a buffer, a predictive tuner, and a predictive buffer. The tuner can be configured to allow viewing of a currently-selected digital video channel chosen from a plurality of digital video channels received by a predictive PVR. The buffer can be configured to store video data of the currently-selected digital video channel, allowing time-shifted viewing of the currently-selected digital video channel. The predictive tuner can be configured to capture video data for a predicted digital video channel. The predicted digital video channel can be selected based upon a predictive factor. The predictive buffer can be configured to store the captured video data for the predicted digital video channel received by the predictive tuner to allow time-shifted viewing of said predicted digital video channel. | 11-04-2010 |
20100317304 | Enhanced Radio - A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content. | 12-16-2010 |
20110010216 | SOFTWARE LICENSE USAGE AMONGST WORKGROUPS USING SOFTWARE USAGE DATA - An approach is provided that receives a message from a first user. The first user's message requests a license to a licensed product that has previously been purchased by the organization. The system identifies current users in the organization that currently have licenses to the licensed product. A need score is calculated that reflects a needs analysis of the first user to the licensed product. Current user need scores are calculated and these need scores correspond to the needs of the current users pertaining to the licensed product. The first user's need score is compared to the current user product need scores and a second user is selected based on the comparison where the first user's need score is better than the second user need score. The second user's license to the licensed product is revoked and the first user is granted a license to the licensed product. | 01-13-2011 |
20110010258 | File Fragment Pricing in a Segmented File Sharing Network - A mechanism is provided for file fragment pricing in a segmented file sharing system. The mechanism allows peers to set a price for distributing a file through the file sharing system. A peer then becomes a file distributor on behalf of an original file provider. The original file provider may compensate the file distributor based on a compensation agreement. The peer's client may be configured to download file fragments from file distributors, or the original file provider, based on preferences, such as price, peer rating, upload speed, or similarity. As a result, a peer may download a file for a price that is less than the original price from the original file provider. Thus, the mechanism provides an incentive for peers to participate in file sharing, which results in larger swarms. | 01-13-2011 |
20110010350 | AUTOMATED VIEWABLE SELECTABLE CHANGE HISTORY MANIPULATION - A set of edited changes associated with an editable file is displayed on a display associated with a computing device in response to receipt of a request via a user input device to display the plurality of edited changes. A contextual representation of the editable file is displayed. A context indicator is displayed within the contextual representation of the editable file that represents a location within the editable file associated with a first of the displayed set of edited changes. The context indicator is iteratively updated to represent a location within the editable file associated with each selected element of the displayed set of edited changes in response to detection of user selections of elements of the displayed set of edited changes received via the user input device. | 01-13-2011 |
20110010421 | List Passing in a Background File Sharing Network - A mechanism is provided for distributing file fragments in the background of a segmented peer-to-peer network using list passing between peers. Rather than trading actual content, peers may trade file names or file fragment identifiers. Upon receiving a new file name or identifier, a peer may request that file from the network, either in the background or the foreground. For example, once a client begins background file sharing in a swarm, the client may propagate file information for files it possesses to all or a portion of the peers in a swarm. Those clients then have the file information for a file without the user having to locate and specifically request that file. The file list may piggyback on a file fragment that is transferred as a result of a file sharing request. | 01-13-2011 |
20110010665 | SYSTEM, METHOD, AND APPARATUS FOR INLINE COMMENTS WITHIN ELECTRONIC COMMUNICATIONS - A communication apparatus which facilitates inline comments includes a client processing unit and an electronic memory device. The client processing unit receives an electronic communication and generates a reply communication for response to the electronic communication in an inline comment mode. The reply communication includes a copy of original content from the electronic communication. The electronic memory device is coupled to the client processing unit. The electronic memory device stores a plurality of inline comment rules. The inline comment rules facilitate adjoining comment content to the copy of original content within the reply communication according to user commands. The comment content is uniquely identified from standard response content according to the inline comment rules in effect during the inline comment mode. | 01-13-2011 |
20110025716 | ENABLING A USER TO CHOOSE A REPRESENTATIVE LANDMARK TO DISPLAY AT A PARTICULAR ZOOM LEVEL ON A DIGITAL MAP - A user is enabled to choose a particular landmark to display on a particular view of a digital map instead of a landmark chosen by a digital map designer. This particular landmark may then represent all landmarks that are in close proximity to each other within a geographical area on the digital map when only one of the landmarks can be displayed on that particular view of the digital map. | 02-03-2011 |
20110029226 | INFORMATION TECHNOLOGY FOR FINDING A LOCATION BASED ON AN IMAGE AT ANOTHER LOCATION - A computer system displays an image of a first geographic location by a computer system, receives a user selection of a portion of the image of the first geographic location, processes the user-selected image portion to identify a meaning for the user-selected image portion, computes a logical connection between the computer system identified meaning and a second geographic location, and directs the user to the second geographic location. Computing the logical connection may include finding a match between a significance of the second geographic location and the meaning identified for the user-selected image portion. Receiving a user selection of an image portion may include receiving a user selection identifying an ad within the image and wherein the processing to identify a meaning for the user-selected image portion includes identifying a meaning for the ad. | 02-03-2011 |
20110055175 | SYSTEM, METHOD, AND APPARATUS FOR MANAGEMENT OF MEDIA OBJECTS - A computer program product that includes a computer useable storage medium to store a computer readable program for tracking media object data that, when executed on a computer, causes the computer to perform operations. The operations include storing usage data for a media object which is used in a first message. The usage data indicates historical usage of the media object by a user. The operations also include recalling the stored usage data for the media object in response to associating the media object with a second message. The operations also include communicating to the user the stored usage data corresponding to the media object prior to sending the second message with the media object to a recipient. | 03-03-2011 |
20110066949 | VISUALIZATION OF REAL-TIME SOCIAL DATA INFORMATICS - Data corresponding to a current activity of a user is formatted for display. A contact list, tags of interest, and visual display mapping preferences associated with the user are received. A real time broadcast of a current activity of the user is received. A tag of interest most relevant to the current activity of the user is selected. Real time broadcasts of current activities of contacts associated with the user are received. Tags of interest most relevant to the current activities of the contacts are selected. The tag of interest selected most relevant to the current activity of the user is compared with the tags of interest selected most relevant to the current activities of the contacts. Data corresponding to the current activity of the user and the current activities of the contacts is transmitted in a format determined by the visual display mapping preferences associated with the user. | 03-17-2011 |
20110066977 | ANALYZING AN INTERACTION HISTORY TO GENERATE A CUSTOMIZED WEBPAGE - Systems, methods and articles of manufacture are disclosed for generating a webpage. In one embodiment, a request may be received from a user to view the webpage that includes portlets. A time of the request may be identified. The portlets may be provided. Based on an interaction history of the user and the identified time of the request, the portlets may be arranged on the webpage. The webpage may be output for display, in response to the request. | 03-17-2011 |
20110072090 | METHOD AND SYSTEM FOR NAVIGATING EMAIL - A method and computer program product for providing an email navigation tool includes receiving, on an email server, an email thread including a sequence of email messages. A sender of each email message in the sequence of email messages is identified. At least one sender file associated with at least one identified sender of the email messages in the sequence of email messages is identified. The sender file is configured to provide a visual identification of the identified sender. A sequence of sender files is generated from the at least one sender file. The sequence of sender files has an order corresponding to an order of the sequence of email messages. The sequence of sender files is displayed on a computer display. | 03-24-2011 |
20110078251 | Instant Messaging Exchange Incorporating User-generated Multimedia Content - A method for displaying multimedia content created by a user of a first computerized messaging device to a user of a second computerized messaging device communicatively coupled to the first computerized messaging device by a network includes: displaying, with the second computerized messaging device, a textual instant messaging exchange between the user of the first computerized messaging device and the user of the second computerized messaging device; receiving the multimedia content at the second computerized messaging device over the network; and dynamically embedding a player for the multimedia content in-line in the display of the textual instant messaging exchange at the second messaging device. | 03-31-2011 |
20110107197 | RENDERING SECTIONS OF CONTENT IN A DOCUMENT - Systems, methods and articles of manufacture are disclosed for rendering a document having collapsible sections of content. In one embodiment, the document may be received and rendered for display. Rendering the document for display may include collapsing all but a first section of the collapsible sections of content. Rendering the document for display may also include collapsing all but a second section of the collapsible sections of content, upon determining that a period of time has elapsed since collapsing all but the first section of the collapsible sections of content. | 05-05-2011 |
20110113104 | FLAGGING RESOURCE POINTERS DEPENDING ON USER ENVIRONMENT - Systems, methods and articles of manufacture are disclosed for indicating a hyperlink in a message as being inappropriate for a specified user environment, such as an office or an educational setting. In one embodiment, a message may be received from a sending user and to a receiving user (e.g., by a sending mail client or by a mail server). The message may include a hyperlink. If a message includes a hyperlink determined to be inappropriate for the specified user environment, a property of the message may be set to indicate as such. Optionally, the sending user may be notified that the hyperlink is indicated as being inappropriate for the specified user environment. The receiving user may also be warned not to activate the hyperlink that is determined to be inappropriate. | 05-12-2011 |
20110113324 | PASTING CONTENT INTO A DOCUMENT USING TWISTIES - Systems, methods and articles of manufacture are disclosed for pasting text into a document as twisties. In one embodiment, a request may be received to paste text into a document. A plurality of twisties may be generated from the text. The plurality of twisties may be inserted into the document, responsive to the request to paste text into the document. | 05-12-2011 |
20110119581 | RECORDING EVENTS IN A VIRTUAL WORLD - Systems, methods and articles of manufacture are disclosed for recording events occurring in a virtual world. In one embodiment, properties of events previously recorded and/or attended by a user may be identified. Recording criteria for the user may be derived from the identified properties. Upon identifying an event satisfying the recording criteria, the event may be recorded. The recorded event may be played back at the convenience of the user. | 05-19-2011 |
20110122432 | Scanning and Capturing Digital Images Using Layer Detection - A mechanism for scanning and capturing digital images using document layer detection. Upon detecting a document placed on a scanning surface of a scanning device, the illustrative embodiments identify one or more layers within the document. The illustrative embodiments then scan the one or more layers within the document on a layer by layer basis. | 05-26-2011 |
20110122458 | Scanning and Capturing Digital Images Using Residue Detection - A mechanism for scanning and capturing digital images using residue detection. Upon detecting a document placed on a scanning surface of a scanning device, the illustrative embodiments detect a residue deposited on the document. The illustrative embodiments determine a portion of the document to be scanned based on a location of the residue on the document. The illustrative embodiments then scan the portion of the document. | 05-26-2011 |
20110122459 | Scanning and Capturing digital Images Using Document Characteristics Detection - A mechanism for scanning and capturing digital images using document characteristics detection. Upon detecting a document placed on a scanning surface of a scanning device, the illustrative embodiments identify characteristics of the document. The illustrative embodiments detect that a characteristic of the document indicates the document comprises a defect. A portion of the document to be scanned is determined based on a location of the detected defect. The illustrative embodiments then scan the portion of the document. | 05-26-2011 |
20110126161 | POSITIONAL EFFECTS IN A THREE-DIMENSIONAL DESKTOP ENVIRONMENT - Systems, methods and articles of manufacture are disclosed for arranging display elements in a three-dimensional desktop environment. In one embodiment, each display element may include an attribute. A user request may be received to apply the positional effect to the display elements. The positional effect may be applied to the display elements based on the attribute, responsive to the user request. | 05-26-2011 |
20110128568 | MANAGING DIGITAL IMAGES TO BE PRINTED - Systems, methods and articles of manufacture are disclosed for managing digital images to be shared with and/or printed for a user. In one embodiment, the digital images may be received for the user. That a count of the digital images exceeds a threshold count may be determined. The digital images may be transmitted to a location where they may be printed for the user. The user may be notified when the printed images are ready to be picked up by the user. | 06-02-2011 |
20110131233 | Using Symbols to Search Local and Remote Data Stores - An approach is provided that uses symbols to represent search criteria. In this approach, a symbol is received from a user in a search request. Search criteria that corresponds to the received symbol is retrieved from a computer accessible data store. Data stores are searched for the plurality of search criteria that correspond with the received symbol and search results are retrieved based on the searching performed. These retrieved search results are then provided to the user. | 06-02-2011 |
20110131510 | SPLITTING AVATARS IN A VIRTUAL WORLD - Systems, methods and articles of manufacture are disclosed for splitting an avatar a split point in a virtual world. In one embodiment, a location in the virtual world may be designated as the split point. It may be determined that a first avatar has encountered the split point. The user may be prompted to specify whether to split the first avatar in a virtual world. Responsive to a request to split the first avatar, a second avatar may be created from the first avatar. The first avatar and the second avatar may be controlled independently in the virtual world and in response to user input. A user may also request to merge the first avatar and the second avatar. A third avatar may be created from the first avatar and the second avatar, responsive to the request to merge. The third avatar may include assets of both the first avatar and the second avatar. | 06-02-2011 |
20110153753 | E-MAIL AWARENESS ENHANCEMENT - A method for preserving e-mail messages. It is determined, by a processor, whether an event has occurred with respect to an e-mail message, wherein an occurrence of the event results in a consequence activity with respect to the e-mail message. Responsive to determining that the event has occurred, it is determined, by the processor, whether criteria is satisfied, wherein the criteria relates to a status of an e-mail user. Responsive to determining that the criteria is satisfied, the consequence activity is prevented notwithstanding that the event has occurred. | 06-23-2011 |
20110154221 | SUBJECT SUGGESTION BASED ON E-MAIL RECIPIENTS - Methods, apparatus and articles for dynamically inserting a subject based on an entered list of recipients. A graphical user interface (GUI) screen comprising a TO field, a carbon copy field, and a BCC field may be provided for entering a list of recipients for the e-mail, as well as a SUBJECT field for entering the subject of the e-mail. The association between the list of recipients and the subject string may then be stored, such that when the user again enters the same list of recipients into a new e-mail, the SUBJECT field may be automatically populated based on previously used subject strings. | 06-23-2011 |
20110154490 | Malicious Software Prevention Using Shared Information - A method and apparatus for managing executable files. Responsive to detecting a request to run an executable file on a computer, a processor unit determines whether the executable file was downloaded to the computer within a period of time associated with a recent download. Responsive to a determination that the executable file was downloaded to the computer within the period of time, the processor unit determines whether feedback for the executable file from a number of users of the executable file is present in a repository. The feedback identified for the executable file in the repository is presented using a presentation system. User input as to whether the executable file should be run is prompted for by the processor unit after presenting the feedback. | 06-23-2011 |
20110161426 | Control E-Mail Download Through Instructional Requests - Method, system and computer program product for requesting e-mail messages. Download instructions for sending e-mail messages from an e-mail message database storing a plurality of e-mail messages to an e-mail client are received at an e-mail messaging system, the plurality of e-mail messages having accumulated due to inattention by a user. The e-mail messaging system sends e-mail messages from the e-mail message database to the e-mail client in accordance with the download instructions. | 06-30-2011 |
20110161438 | METHOD AND SYSTEM FOR A MULTI-APPLICATION FOLLOW-UP MECHANISM - A system that responds to a user setting a follow-up flag on a message within a first communication application by associating the flagged message with another user, such that the flagged message is available to a second communication application. When a user sets a flag on an electronic mail message contained in an electronic mail mailbox provided by an electronic mail application, the system responds by associating the flagged message with another user in a list of other users with whom flagged messages are associated. When a communication session occurs with the other user through another communication application, the system checks the list and determines that a flagged message is associated with the other user. The flagged message is then brought to the attention of the local user, for example within a list of flagged messages associated with the other user displayed simultaneously with the instant messaging session. | 06-30-2011 |
20110191289 | MANAGING INFORMATION ABOUT AVATARS ACROSS VIRTUAL WORLDS - Systems, methods and articles of manufacture are disclosed for managing relationship information across virtual worlds. In one embodiment, information about avatars in virtual worlds may be received. A correlation may be derived between two avatars based on the received information. The derived correlation between the two avatars may be stored. Applications may query for derived correlations. | 08-04-2011 |
20110219136 | INTELLIGENT AUDIO AND VISUAL MEDIA HANDLING - Methods, apparatus, and articles of manufacture for transmitting data. A first device defining a preferred language may be configured to receive a media stream from a second device. The second device may be configured to make public broadcasts in a plurality of languages to the first device and other devices. The second device interrupts the media stream at the first device only during transmission of the public broadcast in the preferred language. | 09-08-2011 |
20110219331 | WINDOW RESIZE ON REMOTE DESKTOPS - Methods, apparatus, and articles for fitting a graphical user interface screen within a remote desktop screen. A predefined event may resize one of a graphical user interface screen within a remote desktop screen or the remote desktop screen itself such that the graphical user interface screen is fully visible within the remote desktop screen. | 09-08-2011 |
20110225245 | SENDING MESSAGES WITH LIMITED AWARENESS OF RECIPIENTS - Methods, apparatus and articles for sending emails to a plurality of recipients comprising a group of blind carbon copied recipients. A graphical user interface (GUI) screen comprising a TO field, a carbon copy field, and at least one blind carbon copy group (BCC-G) field may be provided for entering a list of recipients for the email. The email may be transferred to the recipients such that the identities of a plurality of recipients in the at least one BCC-G field are disclosed only to the recipients within the BCC-G field. | 09-15-2011 |
20110225649 | Protecting Computer Systems From Malicious Software - A method, computer program product, and apparatus for determining whether newly installed software is malicious software are presented. In one illustrative embodiment, software is installed on a computer system to produce newly installed software running in a secured part of the computer system. The newly installed software is only permitted to access a subset of resources in the computer system when running in the secured part. The newly installed software is run on the computer system until a selected event occurs. The newly installed software running on the computer system is monitored until the selected event occurs. The monitoring creates information used to evaluate the software for malicious behavior. The information is presented on a display to a user after the selected event has occurred, wherein the presented information comprises a recommendation of whether to provide the software access to the resources in the computer system outside the subset of resources. | 09-15-2011 |
20110251862 | Ticket Segmentation - Techniques to segment a ticket into at least two ticket segments for a customizable event experience are disclosed. Events can have natural break points or event segments such as innings, periods, quarters, halves, or acts. In accordance with the claimed subject matter, a ticket can be segmented into a ticket segment for each of the event segments. Event factors, progression, and demand information can be monitored to allow or deny access to a ticket segment, set pricing, filter ticket segments, or adjust ticket segments. Furthermore, as the event progresses, analysis can continue and the ticket segments can be dynamically updated accordingly. | 10-13-2011 |
20110289159 | MESSAGE BROADCASTING IN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide message broadcasting within a clustered computing environment such as a Cloud computing environment. Specifically, under the present invention, a message is received in a message queue (e.g., on a message queue server). From the message queue, the message is sent to a single node of a plurality of heterogeneous nodes within the clustered computing environment. The single node can be selected based on any factor such as a best available node within the plurality of nodes. This single node will process the message and identify a set of message listeners to whom the message should be broadcast. Typically, the set of message listeners is identified based on a topic of the message and an association of the topic to the set of message listeners (e.g., as set forth in a table or the like). In any event, the single node will then publish the message to the set of message listeners. Delivery confirmations, responses, etc. associated with the message will then be tracked, processed, and/or routed by the single node. Thus, embodiments of the present invention obviate the need for a given message from having to be delivered to and/or processed by multiple nodes. | 11-24-2011 |
20110298691 | Flexible Display Security CAPTCHA Bends - An approach is provided that receives a request to perform an action by an information handling system that includes a processor. In response to the request, a captcha request that corresponds to a captcha is transmitted to a foldable display screen. A response is received from the foldable display screen with the response including one or more bends of the foldable display screen. The received one or more bends are compared to one or more expected bends included in the captcha. The requested action is performed in response to the comparison revealing that the received one or more bends match the one or more expected bends. On the other hand, performance of the requested action is inhibited in response to the comparison revealing that at least one of the received one or more bends fails to match at least one of the one or more expected bends. | 12-08-2011 |
20110307563 | DETERMINING GROUP CHAT ACCESS - A method and computer program product for determining group chat access is described. A method may comprise sending a passphrase for a group chat from a first user to a second user. The method may further comprise determining a level of the second user for the group chat based upon, at least in part, a number of group chat participants between the second user and a moderator through which the second user was informed of the passphrase for the group chat. The method may also comprise determining if the first user is permitted to access the group chat based upon, at least in part, a user-level set by the moderator and the level of the second user for the group chat. The method may additionally comprise, if the first user is permitted to access the group chat, allowing the first user to access the group chat. | 12-15-2011 |
20110307792 | ACCESSING ELEMENTS IN AN OPERATING SYSTEM - Providing access to an element in an operating system executed by a processor includes: with the processor, tracking behavior of a user with respect to multiple elements managed by the operating system; displaying a tag cloud to the user with a display device, the tag cloud having multiple objects, each of the objects representing one of the elements managed by the operating system and having a size based on the tracked behavior of the user with respect to the element managed by the operating system; and allowing, with the processor, the user to access at least one of the elements using the tag cloud. | 12-15-2011 |
20110310027 | Method, System, and Program Product for No-Look Digit Entry in a Multi-Touch Device - A method, device, and program product are provided for no-look entry of digits in a multi-touch device. A multi-touch screen of the multi-touch device senses an initializing combination of at least one touch. A no-look digit entry application assigns a binary value to each touched location. The multi-touch screen detects at least one combination of at least one touch of the touch screen. The no-look digit entry application determines the locations touched and enters digit inputs corresponding to the sum of the binary values assigned to the locations for each detected combination of touches. | 12-22-2011 |
20120023175 | Method to Change Instant Messaging Status Based on Text Entered During Conversation - An embodiment of the invention provides a method for communication within a system, wherein an instant messaging conversation is initiated between a first user and a second user. An indicator and a text entry are received from the first user during the instant messaging conversation. The status of the first user is changed, including automatically setting the text entry as the status of the first user, and automatically including the name of the second user in the status of the first user if preferences of the first user indicate that the name of the second user is to be included in the status of the first user. Further, the text entry is automatically sent to the second user if the preferences of the first user indicate that a text entry following the indicator is to be automatically sent to the second user. | 01-26-2012 |
20120030238 | AUTOMATICALLY IDENTIFYING PERSONALIZED SUPPORT - Embodiments of the present invention leverage information of the end-user and personal annotations/tags attached to resources and/or support related thereto (e.g., people, documents, etc.) to provide personalized support. Among other things, these embodiments allow for the mapping of expert “system”-based support to social technology to enable dynamic, localized support. In a typical embodiment, the system will analyze a profile of a user, as well as tags the user has attached to requested computer resources. Based on the profile and the tags, individualized support can be provided automatically. | 02-02-2012 |
20120042163 | SECURELY IDENTIFYING HOST SYSTEMS - Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s). | 02-16-2012 |
20120065969 | System and Method for Contextual Social Network Communications During Phone Conversation - An embodiment of the invention includes methods and systems for contextual social network communications during a phone conversation. A telephone conversation between a first user and at least one second user is monitored. More specifically, a monitor identifies terms spoken by the first user and the second user during the telephone conversation. The terms spoken are translated into textual keywords by a translating module. One or more of the second user's web applications are searched by a processor for portion(s) of the second user's web applications that include at least one of the keywords. The processor also searches one or more of the first user's web applications for portion(s) of the first user's web applications that include at least one of the keywords. The portion(s) of the second user's web applications and the portion(s) of the first user's web applications are displayed to the first user during the telephone conversation. | 03-15-2012 |
20120072555 | LINKING INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (GUI or the like), and associated with a set of rules. The set of rules indicates a behavior/reaction of one instance when an action is performed with respect to another instance linked thereto. These embodiments could be implemented external to or within a cloud operating environment. | 03-22-2012 |
20120072978 | Desired Font Rendering - An embodiment of the invention provides a method for displaying a message from a first user to a second user, wherein the message from the first user is received in a system of the second user. The message includes text in an intended font and metadata, wherein the metadata includes a link to a font source. It is determined whether the intended font is on the system of the second user; and, if the intended font is not on the system of the second user, rendering instructions are obtained from the font source. The rendering instructions include instructions on how to display the text in the intended font on the system of the second user without downloading the intended font to the system of the second user. The text is displayed in the intended font on the system of the second user using the rendering instructions. | 03-22-2012 |
20120076291 | Automated call to a contact with whom another form of communication is exchanged - A method of automating a telephone call to a contact with whom a text based electronic communication is exchanged. The method can include, via a processor, receiving from a first electronic messaging client a first identifier corresponding to a first text based electronic communication sent to a user or received by the user, and receiving from a second electronic messaging client a second identifier corresponding to a second text based electronic communication sent to the user or received by the user. Via the processor, a list that identifies at least the first identifier and the second identifier can be presented. Responsive to receiving a user selection of the first identifier or the second identifier, via the processor, a telephone call can be automatically initiated to a telephone number that corresponds to the selected identifier. | 03-29-2012 |
20120077469 | Automated electronic messaging to a person with whom another form of communication is exchanged - A method of, within an electronic messaging client that communicates using a first form of communication, receiving from a user an input identifying a tag that identifies at least one communication session corresponding to a second form of communication. The tag can be processed to identify at least one electronic messaging address associated the person with whom a communication is exchanged during the identified communication session. A recipient identifier field in the electronic messaging client can be automatically populated with the electronic messaging address. The electronic message can be communicated to the person using the electronic messaging address. The electronic messaging address also can be selected from list identifying a plurality of communication sessions corresponding to at least a second form of communication. | 03-29-2012 |
20120110143 | DIFFERENTIATING IMAGE FILES IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon. | 05-03-2012 |
20120110502 | USING SCREEN CAPTURES TO PROVIDE AUTOMATIC CONTEXTUAL SMART INPUT-IN DEVICE SELECTION MENU - A two-way smart input-in device recognition mechanism determines which input slots of a multi-input display device (such as a television) are actually occupied, and obtains a screen capture of a graphic image for each such device. An embodiment of the present invention automatically associates the screen capture graphics with input-in device locations to enable presenting an intelligent visual input-in selection menu, which may be rendered in response to activation of a Menu button of a remote control device. Preferably, the input-in selection menu only displays graphics for currently-occupied input-in slots. | 05-03-2012 |
20120136932 | MIRRORING MESSAGING STATUS - A messaging status associated with a first user is determined. A messaging status associated with a second user is set based upon, at least in part, the determined messaging status associated with the first user. | 05-31-2012 |
20120143964 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC COMMUNICATIONS - Described are a system and method for delivering an electronic communication to a recipient. The system and method determine whether at least one other recipient received the electronic communication. A relationship is identified between the recipient and the at least one other recipient. A response assessment result is generated in response to the determined relationship. The response assessment result is presented to the recipient. | 06-07-2012 |
20120158881 | Software License Agreement Amongst Workgroups Using Software Usage Data - A license handling information handling system receives an electronic message from a first computer system utilized by a first user. The first user's message requests a license to a licensed product that has previously been purchased by the organization. The license handling information handling system identifies a second user in the organization that currently has a license to the licensed product, and requests that the second user relinquish the license to the licensed product. The second user indicates that the second user's license will be relinquished for a temporary time period. The licensing handling information handling system sends an electronic message, including the temporary time period, to the first user. In response to the first user accepting the temporary time period, the second user's license to the licensed product is revoked, and the first user is granted a license to the licensed product. | 06-21-2012 |
20120162523 | USING SCREEN CAPTURES TO PROVIDE AUTOMATIC CONTEXTUAL SMART INPUT-IN DEVICE SELECTION MENU - A two-way smart input-in device recognition mechanism determines which input slots of a multi-input display device (such as a television) are actually occupied, and obtains a screen capture of a graphic image for each such device. An embodiment of the present invention automatically associates the screen capture graphics with input-in device locations to enable presenting an intelligent visual input-in selection menu, which may be rendered in response to activation of a Menu button of a remote control device. Preferably, the input-in selection menu only displays graphics for currently-occupied input-in slots. | 06-28-2012 |
20120173489 | ATTRIBUTE SELECTABLE FILE OPERATION - Embodiments of the present invention provide a method, system and computer program product for attribute based file operation implementation selection. In an embodiment of the invention, a method for providing selectable implementations of a file operation is provided. The method includes receiving a directive to perform a file operation on a particular file stored in fixed storage of a computer and identifying an attribute of the particular file. An implementation of the file operation can be selected amongst different implementations of the file operation that maps to the identified attribute. Thereafter, the selected implementation of the file operation can be invoked to perform the file operation upon the particular file. | 07-05-2012 |
20120173608 | AUTOMATED DATA UPDATING IN DISTRIBUTED NOTICES - Embodiments of the present invention provide a method, system and computer program product for automated data updating of notices in a calendaring and scheduling (C&S) system. In an embodiment of the invention, a method for automated data updating of notices in a C&S system can be provided. The method can include composing a C&S document in a C&S system executing in memory by at least one processor of a computer. The method further can include noticing different users addressed for the C&S document and adding to the C&S document a reference to variable data stored separately from the C&S document. The method yet further can include detecting a change in the variable data. Finally, the method can include transmitting notice to the different users of the change in variable data. In one aspect of the embodiment, transmitting notice to the different users of the change in variable data can include flagging the C&S document as having changed. | 07-05-2012 |
20120173984 | CONTEXT-ADDRESSED TABS FOR PRESENTATION APPLICATIONS - A method, system and computer program product for providing and using context-addressed tabs in a computer presentation application may include selecting at least one element in a current slide of a presentation displayable in a computer window. The method, system and computer program product may also include generating a context-addressed tab in a predetermined area of the computer window for each selected element in the current slide of the presentation. Each context-addressed tab may be addressed to an associated selected element in the current slide of the presentation. | 07-05-2012 |
20120180040 | TECHNIQUES FOR PERSONALIZING FEED CONTENT IN VIRTUALIZED COMPUTING ENVIRONMENTS - A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata. | 07-12-2012 |
20120188189 | MULTI-POINT TOUCH-SENSITIVE SENSOR USER INTERFACE USING DISTINCT DIGIT IDENTIFICATION - For digit identification on a multi-point touch sensitive sensor, an assignment module assigns a digit identity to each digit of at least two digits in contact with a multi-point touch sensitive sensor during a learning phase. The digit identity includes a distinct representation of each digit. A receiving module detects a digit interaction of one or more particular digits of the at least two digits with the multi-point touch-sensitive sensor. A determination module recognizes the assigned digit identity for each particular digit involved in the digit interaction. | 07-26-2012 |
20120197912 | Sorting E-Mail Documents Based on Free Text Field Content - A request is received to sort multiple e-mail documents according to least frequently used words in the multiple e-mail documents. The multiple e-mail documents are analyzed to identify which of the multiple e-mail documents use at least one of the least frequently used words. The multiple e-mail documents are sorted, according to the least frequently used words, to create alphabetically sorted e-mail documents, and the alphabetically sorted e-mail documents are then displayed. | 08-02-2012 |
20120198001 | METHOD TO SHOW/HIDE E-MAIL MESSAGES BY A SENDER OR GROUP OF SENDERS WITHIN AN E-MAIL THREAD - An embodiment of the invention includes a method for displaying electronic messages. The electronic messages are displayed to a user in a conversation thread. The conversation thread only includes a first message and at least one reply message, wherein the reply message including a direct reply to the first message and/or an indirect reply to the first message. A request is received from the user to display select messages from the conversation thread. The request includes a request to display only messages from the conversation thread sent from a select sender or a request to display only messages from the conversation thread not sent from the select sender. Only the select messages from the conversation thread are displayed to the user based on the received request. | 08-02-2012 |
20120215855 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 08-23-2012 |
20120216109 | ANALYZING AN INTERACTION HISTORY TO GENERATE A CUSTOMIZED WEBPAGE - Systems, methods and articles of manufacture are disclosed for generating a webpage. In one embodiment, a request may be received from a user to view the webpage that includes portlets. A time of the request may be identified. The portlets may be provided. Based on an interaction history of the user and the identified time of the request, the portlets may be arranged on the webpage. The webpage may be output for display, in response to the request. | 08-23-2012 |
20120239767 | Method to Change Instant Messaging Status Based on Text Entered During Conversation - An embodiment of the invention provides a method for communication within a system, wherein an instant messaging conversation is initiated between a first user and a second user. An indicator and a text entry are received from the first user during the instant messaging conversation. The status of the first user is changed, including automatically setting the text entry as the status of the first user, and automatically including the name of the second user in the status of the first user if preferences of the first user indicate that the name of the second user is to be included in the status of the first user. Further, the text entry is automatically sent to the second user if the preferences of the first user indicate that a text entry following the indicator is to be automatically sent to the second user. | 09-20-2012 |
20120246570 | MANAGING A PORTAL APPLICATION - A mobile device includes a processor that executes a portal application to implement a plurality of portlet modules; and a user interface that allows a user to establish a trigger for reducing power consumption in the mobile device. The processor is configured to pause operations in a number of the portlet modules in the portal application in response to the trigger occurring. | 09-27-2012 |
20120246648 | MANAGING A PORTAL APPLICATION - A method of managing a portal application includes, in a device comprising at least one processor that executes a portal application, establishing a trigger for preserving resources for the device; determining in the device that the trigger has occurred; and pausing operations of a portlet module within the portal application executed by the device. | 09-27-2012 |
20120260339 | Imposter Prediction Using Historical Interaction Patterns - An approach is provided in which an electronic message is received from a source at a network interface that is accessible from the information handling system. A source address corresponding to the electronic message is identified, wherein the source address also corresponds to a legitimate source. Current usage patterns are extracted from the received electronic message and historical usage patterns are retrieved that correspond to the identified source address. The historical usage patterns being previously gathered from previous messages received from the legitimate source. The extracted current usage patterns and the retrieved historical usage patterns are compared. A user of the system is notified in response to the comparison revealing that the source is an imposter. | 10-11-2012 |
20120300917 | SELECTING HOLD MUSIC CORRESPONDING TO AN EXPECTED WAITING TIME - In one embodiment of the invention, a method for selecting hold music corresponding to an expected waiting time comprises establishing a communications link with a caller; marking a first event by placing the caller on hold; determining a waiting time between the first event and a second event; selecting a media file having a parameter corresponding to the determined waiting time; playing the media file over the established communications link to the caller; and re-determining a waiting time remaining until the second event, selecting a different media file having a parameter corresponding to the re-determined waiting time, and playing the different media file over the established communications link to the caller. | 11-29-2012 |
20120308200 | CONTIGUOUS MEDIA PLAYBACK - In one embodiment of the invention, a method for contiguous media playback comprises recording a first media content and storing the recorded first media content in a first media file; recording a second media content and storing the recorded second media content in a second media file; playing the first media file; determining if the second media content was recorded within a predefined window of and from a same channel as the recording of the first media content; determining a user preference for contiguous playback; and if the second media content was recorded within a predefined window of and from a same channel as the recording of the first media content and if the user preference is for contiguous playback, playing the second media file contiguous with the first media file. | 12-06-2012 |
20120311135 | AUTOMATED RECOMMENDATIONS FOR CLOUD-COMPUTING OPTIONS - Systems, computer storage devices, and methods receive a request from a first user. The first user has at least one instance running within a cloud-computing environment. The systems, computer storage devices, and methods automatically analyze the first user instance to produce first user instance characteristics, and automatically analyze characteristics of other user instances running within the cloud-computing environment. Other users, who are different from the first user, operate the other user instances. The systems, computer storage devices, and methods automatically match the first user instance to instances of the other user instances by determining which of the other user instances have the same characteristics as the first user instance characteristics. The systems, computer storage devices, and methods automatically identify cloud-computing options selected by such other users that operate the matching instances that are related to the request. The systems, computer storage devices, and methods then automatically make recommendations to the first user using the computing devices. | 12-06-2012 |
20120311156 | Autoconfiguration of a Cloud Instance Based on Contextual Parameters - An embodiment of the invention provides a method and system for autoconfiguring a cloud instance based on contextual parameters. More specifically, an interface receives a request for a resource from a user; and, an analysis module connected to the interface examines parameters of the resource. The parameters of the resource include an encryption parameter and a language parameter. The analysis module also examines properties of the request, including a location of the user, at least one rule at the location of the user, and a dominant language at the location of the user. A processor connected to the analysis module determines whether the encryption parameter of the resource violates the rule at the location of the user. An instance generator connected to the processor creates a customized instance of the resource when the encryption parameter of the resource violates the rule at the location of the user. | 12-06-2012 |
20120324339 | RENDERING SECTIONS OF CONTENT IN A DOCUMENT - Systems, methods and articles of manufacture are disclosed for rendering a document having collapsible sections of content. In one embodiment, the document may be received and rendered for display. Rendering the document for display may include collapsing all but a first section of the collapsible sections of content. Rendering the document for display may also include collapsing all but a second section of the collapsible sections of content, upon determining that a period of time has elapsed since collapsing all but the first section of the collapsible sections of content. | 12-20-2012 |
20130014011 | RECORDING EVENTS IN A VIRTUAL WORLD - Systems, methods and articles of manufacture are disclosed for recording events occurring in a virtual world. In one embodiment, properties of events previously recorded and/or attended by a user may be identified. Recording criteria for the user may be derived from the identified properties. Upon identifying an event satisfying the recording criteria, the event may be recorded. The recorded event may be played back at the convenience of the user. | 01-10-2013 |
20130036217 | NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center. | 02-07-2013 |
20130042234 | VIRTUAL MACHINE MANAGEMENT - A virtual machine management method and system is provided. The method includes receiving by a computing system, a list of virtual machines deployed within an enterprise. The computing system determines that a specified time period has elapsed during deployment and a list of resources and transactions associated with the virtual machines is retrieved. The computing system calculates a cost value and service value for deploying the virtual machines and a premium value associated with the services. The computing system determines if the premium value is within a policy for the enterprise. | 02-14-2013 |
20130046835 | GENERATING AND/OR PROVIDING ACCESS TO A MESSAGE BASED ON PORTIONS OF THE MESSAGE INDICATED BY A SENDING USER - Message processing is disclosed that includes detecting an action by a sending user selecting at least one portion of a message. An indication of the selected portion of the message is stored in the message, and the message transmitted to at least one message recipient. Contextually related content from the message for the selected portion may also be indicated in the message. The selected portion or portions of the message may be displayed to a recipient user, and selection by the recipient user of a portion of the message selected by said sending user may be detected. Contextually related content may be retrieved from the message in response detecting the recipient user's selection of the portion of the message selected by said sending user, and the contextually related content displayed to the recipient together with the portion of the message selected by said sending user. | 02-21-2013 |
20130054295 | PROVIDING INDICATIONS BY A CALENDARING SYSTEM THAT A MEETING HAS BEEN PREVIOUSLY RESCHEDULED TO AID IN SCHEDULING - A method, system and computer program product for informing users regarding the rescheduling of a meeting. A counter, associated with a meeting, is set to the value of 1 when the meeting has been rescheduled for the first time. Upon a user (e.g., meeting initiator, meeting recipient) proposing to reschedule the meeting a further time, an indicator is presented to the user informing the user that the meeting has been previously rescheduled. Such information may be used by the user to decide whether to proceed with rescheduling the meeting. If the user decides to proceed, the counter is incremented and a meeting invitation is generated, where the meeting invitation includes an indication (e.g., number of times the meeting has been rescheduled obtained from the counter) regarding the meeting having been previously rescheduled. In this manner, the meeting recipients would have knowledge that the meeting has been previously rescheduled. | 02-28-2013 |
20130073526 | LOG MESSAGE OPTIMIZATION TO IGNORE OR IDENTIFY REDUNDANT LOG MESSAGES - A method of presenting log messages during execution of a computer program. The method can include identifying at least a second log message set comprising information that is the same as information contained in a first log message set. The method can include determining to present the second log message set in a manner that indicates that the second log message set is redundant, and presenting such list of log messages accordingly, or determining not to present the second log message set in the list of log messages, and presenting the list of log messages accordingly. | 03-21-2013 |
20130073641 | MULTI-APPLICATION FOLLOW-UP - A system that responds to a user setting a follow-up flag on a message within a first communication application by associating the flagged message with another user, such that the flagged message is available to a second communication application. When a user sets a flag on an electronic mail message contained in an electronic mail mailbox provided by an electronic mail application, the system responds by associating the flagged message with another user in a list of other users with whom flagged messages are associated. When a communication session occurs with the other user through another communication application, the system checks the list and determines that a flagged message is associated with the other user. The flagged message is then brought to the attention of the local user, for example within a list of flagged messages associated with the other user displayed simultaneously with the instant messaging session. | 03-21-2013 |
20130073716 | DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center. | 03-21-2013 |
20130081120 | INCREASED SECURITY FOR COMPUTER USERID INPUT FIELDS - A computer determines whether current location information of the computer indicates that the computer is at a home location. The computer determines a minimum number of characters to be entered by a user into a userID field to cause the computer to automatically display previously entered userIDs based on whether the computer is located at a home location. If fewer than the minimum characters are entered, previously entered userIDs are not displayed. Location information can be based on one or more of: wi-fi signal strengths, cell tower signal strengths and signal arrival timing information, whether the network connection is wireless or Ethernet cable, the wireless protocol, whether a wi-fi connection is secured or public, whether the computer is a mobile device, and satellite navigation system location. | 03-28-2013 |
20130101107 | TELECONFERENCE PRESENTATION RETRIEVAL MANAGEMENT - A system, method and program product for delivering to an invitee of a teleconference an electronic file attached to or referenced by a meeting notice for the teleconference. The teleconference hosted by a server computer, the invitee has a telephone to call-in to the teleconference via a telephone connection, and an invitee computer downloads the electronic file from the server computer via a first network in response to selection by the invitee of a representation of the electronic file from the meeting notice. The server computer receives a notification that a predetermined combination of keys has been pressed by the invitee on the telephone. In response, the server computer determines an e-mail address or instant message address for the invitee. The server computer attaches and sends the electronic file to an e-mail or instant message with the attached electronic file to the e-mail address or instant message address. | 04-25-2013 |
20130103823 | EVENT PREDICTION AND PREEMPTIVE ACTION IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold). | 04-25-2013 |
20130104098 | AUTOMATIC SCHEDULING OF REVIEW MEETINGS - A tool for scheduling a project review meeting based on monitoring of one or more documents required for the project review meeting. The documents/files are identified along with criteria that the documents must meet prior to scheduling the review meeting. The criteria can be default criteria or specifically defined and entered by a user. The tool monitors the documents and in response to finding that the criteria has been met, determines meeting participants, generally collaborators working on the documents, determines the meeting participants' individual schedules, and determines a meeting time based on the meeting participants' individual schedules. | 04-25-2013 |
20130124245 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 05-16-2013 |
20130124643 | SYSTEM AND METHOD FOR COMMUNICATION THREAD MANAGEMENT - Described are systems and methods for managing an electronic communication thread. A thread is identified between a first electronic device and a plurality of second electronic devices. A parameter is generated to stop watching communications generated by the second electronic devices related to the thread. At least one new communication from the second electronic devices is detected, the at least one new communication related to the thread. An action is performed in accordance with criteria established with respect to the thread in response to detecting the at least one new communication. | 05-16-2013 |
20130124809 | DISTRIBUTING DATA AMONG DATA STORAGE PARTITIONS BASED ON A FORECASTED DEMAND IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to forecast a potential demand for partitioned/sharded data and to distribute the data among a set of data partitions based on forecasted demand to optimize network characteristics (e.g., network bandwidth) and/or expedite data retrieval. For example, the data may be distributed among the partitions based on a quantity of trends/requests/hits on the data, so that requests for the data can be balanced among the partitions geographically. | 05-16-2013 |
20130125009 | REMOTE DESKTOP LOCALIZED CONTENT SHARING - Illustrative embodiments disclose managing content displayed in a remote data processing system by identifying a set of links displayed in the content of the remote data processing system during a desktop sharing session between a local data processing system and the remote data processing system. The local data processing system obtains information about the set of links identified. Responsive to a selection of a link in the set of links displayed on the remote data processing system during the desktop sharing session, the local data processing system retrieving content using the link on the local data processing system using the information obtained about the set of links. | 05-16-2013 |
20130132556 | PROVIDING STATUS INFORMATION FOR VIRTUAL RESOURCE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for an image provider to specify data (e.g., commands to run, files to read), etc., about an image of a virtual resource (e.g., virtual machine, etc.) in a networked computing environment (e.g., a cloud computing environment). Such data may be used (e.g., at runtime) by a client application to obtain specific information about a running instance that is provisioned based on the image (e.g., operating system health, middleware health, etc.). | 05-23-2013 |
20130133038 | AUTHENTICATION FOR SOCIAL NETWORKING MESSAGES - A tool for verifying that a message received by a social networking service was sent by a bona fide owner of a social networking account who purportedly sent the message. The tool receives a message and it locates in the message a string that was entered into a message text field of the message. The string is compared with a registered authentication string for the bona fide owner of the account. If the string in the message matches the registered authentication string, the string is removed from the message and the message is forwarded to the social networking service. If the string in the message does not match the registered authentication string, the message is blocked from being forwarded to the social networking service. | 05-23-2013 |
20130145304 | CONFIRMING INPUT INTENT USING EYE TRACKING - A tool for detecting potential unintentional user input. Eye tracking technology is used to keep a record of where on a display a user is looking or if the user is even looking at the display. When input, such as a mouse selection or a tap on a touch screen, is received, the location of the selection is compared to a location of the user's gaze around when the selection was made. If the gaze location is outside of an acceptable range from the selection location, it is determined that the selection may have been in error and the selection is disregarded or a confirmation is requested of the user. | 06-06-2013 |
20130151629 | PRE-TRANSMISSION CONTEXTUAL ELECTRONIC MESSAGE PROMPTING - Embodiments of the present invention provide a system, method, and program product to provide to a user creating an electronic message one or more informational messages related to the content and addressees of the electronic message. A computer system identifies one or more addressees of the electronic message created by the user. The computer system identifies any informational messages associated with each of the addressees, and displays to the user the identified informational messages. Each step is performed prior to the computer system transmitting the electronic message for delivery to any addressee. The informational messages can be predefined by the addressees of the electronic message and include hyperlinks and other programmable elements for execution by the user. The electronic message can be an e-mail, instant message, or other form of electronic message. | 06-13-2013 |
20130151935 | GENERATING AN ELECTRONIC FORM LOCALLY ON A CLIENT COMPUTER FROM INPUT PARAMETERS - A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form. | 06-13-2013 |
20130173781 | ACTIVITY-BASED VIRTUAL MACHINE AVAILABILITY IN A NETWORKED COMPUTING ENVIRONMENT - An approach for activity-based virtual machine (VM) availability in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a system provided under the present approach monitors and logs network traffic and performs network packet inspections. Based on the contents of the network packets, the system may determine which applications/processes on particular VMs that are associated with the traffic. Users of this system may configure rules and thresholds. Regardless, if an availability threshold is not met as compared to a volume of network traffic, certain network traffic disablement actions can be taken. Users may also configure those conditions that will result in re-enablement of the network and/or processes that were disabled. | 07-04-2013 |
20130174013 | WIKI MONITORING AND UPDATING - A method for monitoring and updating a wiki includes associating a portion of the wild with a reference by identifying the reference, displaying information from the reference in the portion of the wiki and monitoring the reference for change. If a change is detected, the wiki reports to the user that a reference has changed. The user is presented with options to update portions of the wiki that are associated with the reference. If the user accepts an option to update portions of the wiki associated with a reference that has changed, then the wiki is updated. | 07-04-2013 |
20130174168 | POLICY-BASED SCALING OF COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy. | 07-04-2013 |
20130184982 | GENERATING ROUTES - A method, data processing system and computer program product for generating a route. A beginning location is received. A set of preferences for generating a set of routes is received. A set of routes is generated based upon the set of preferences, wherein each route in the set of routes starts and ends at the beginning location, and wherein at least a portion of a specified route in the set of routes does not overlap any other portion of the specified route in the set of routes. | 07-18-2013 |
20130185363 | Selective Display of Past Instant Messages - A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant. | 07-18-2013 |
20130191923 | SOFTWARE LICENSE MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated. | 07-25-2013 |
20130205218 | EVENT TRIGGERED VIEWING - In a method for viewing an event, a computer registers agents such that each agent is communicatively coupled to each other agent. Each agent is associated with a graphical user interface (GUI) session. The computer monitors a first graphical user interface (GUI) session that includes contents viewable on a display device coupled to the computer. The first agent receives, from a second agent, monitoring data associated with a second GUI session. The second GUI session includes contents hidden from view on the display device. The first agent detects an event associated with the second GUI session. In response, the computer displays, on the display device, the event within the contents of the first GUI session. | 08-08-2013 |
20130211868 | Indication of Partial Meeting Request Responses - An embodiment of the invention provides a method for indicating partial meeting request responses, wherein a digital meeting invitation is sent from a processor to an electronic messaging device of an invitee. The meeting invitation includes a time period of the meeting, a meeting declination option, a meeting acceptance option, a partial meeting declination option, and a partial meeting acceptance option. A digital response is received from the invitee, wherein the response includes a partial meeting declination selection and/or a partial meeting acceptance selection. The partial meeting declination selection includes at least one time slot during the time period of the meeting that the invitee will not attend. The partial meeting acceptance selection includes at least one time slot during the time period of the meeting that the invitee will attend. In another embodiment, the response includes a meeting declination selection or a meeting acceptance selection. | 08-15-2013 |
20130212276 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 08-15-2013 |
20130218867 | INTEGRATED EXCHANGE OF SEARCH RESULTS IN AN INTEGRATED SOFTWARE DEVELOPEMENT ENVIRONMENT - In a method for sharing computer-generated search results, in an integrated development environment (IDE), a first computer inserts, into a message, a portion of search results of a search of one or more files accessible via the IDE. The portion of the search results includes a user-selectable file name. The first computer inserts metadata into the message. The metadata includes an identifier of a version of the file. The first computer displays the message in a graphical window such that the search results are visible in the graphical window and the metadata is invisible in the graphical window. The first computer sends the message to a second computer. | 08-22-2013 |
20130218922 | LOCATING PREVIOUSLY COMMUNICATED ELECTRONIC MESSAGES - Embodiments of the present invention provide an approach for locating previously communicated electronic messages (e.g., emails, etc.). Specifically, the system will receive a request to locate/retrieve a previously communicated electronic message (“message”). The request can be issued by a sender or a recipient of the message. In any event, the request will include a set (one or more) of characteristics pertaining to the message such as a set of recipients thereof. One or more electronic messaging databases will then be searched based on the set of recipients and the message located. Once located, an alert will be sent to the requester and/or other message parties. The alert will indicate the message that was located. If the alert is validated (e.g., the message was the correct message), the message will be displayed. | 08-22-2013 |
20130219067 | ACTIVATING LOCATION-BASED RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for invocation and de-allocation of networked-based resources (e.g., cloud-based resources) based on users' geographic movements. Specifically, in a typical embodiment, a set (one or more) of user preferences are received. Such preferences can include: a set of geographic points of interest, a set of users, associations of a set of resources (e.g., services, applications, etc.) of the set of users with the set of geographic points of interest, and/or contexts associated with the set of geographic points of interest. A listening service may then be implemented for the set of resources to determine a location of the set of users. Based on the location and the associations of the set of resources with the set of geographic points of interest, at least one of the set of resources may then be activated. | 08-22-2013 |
20130227525 | Delivery of Changesets by Environment - A method for allowing selective delivery of changesets by environment includes selecting at least one value in software code of a software program; specifying at least one environment for the selected at least one value; compiling the software code in each specified at least one environment; delivering the software code to a central repository; determining how the specified at least one environment is defined; and choosing at least one environment to build against, thereby ensuring that only software code for the chosen environment is pulled from the central repository. | 08-29-2013 |
20130238713 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 09-12-2013 |
20130241937 | Social Interaction Analysis and Display - Provided are techniques for storing information for identifying and characterizing a plurality of user characterizations associated with a social networking application; parsing a display associated with the social networking application to identify a first user characterization of the plurality of user characterizations; correlating the first user characterization to a first portion of the stored information; analyzing the first portion with respect to a first user-defined criteria; and in response to a determination that the first portion satisfies the first user-defined criteria, displaying, on the display, first data corresponding to the first portion in conjunction with a first indicia to enable the first data to be associated with the first user characterization. | 09-19-2013 |
20130246040 | DYNAMIC MEDIA CAPTIONS IN A SOCIAL NETWORK ENVIRONMENT - A dynamic media caption apparatus and method in a social network environment. Included is a user interface to define syntax and distribution rules for a media caption in a social network; a distribution rules engine to understand the syntax and distribution rules defined in the user interface for the media caption and output a media caption that is customized according to the distribution rules; and a distribution manager to translate the customized media caption output by the distribution rules engine to a language understandable by the social network, generate the customized media caption in the language understandable by the social network and output the translated customized media caption to the social network, the customized media caption changing according to the distribution rules and a relationship to the user of a viewer of the media caption on the social network. | 09-19-2013 |
20130247004 | VISUALLY INDICATING FILE ALLOCATION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - In a method for allocating a file to a user, a first computer receives, over a network, data monitored by a second computer. The first computer comprises an IDE client. The data comprises data of usage of the file by one or more users in a group of users. The first computer receives a request to allocate the file to a first user in the group. In response to the first computer determining that, based on the data of usage, the file is allocated to a second user in the group, the first computer denies the request. The first computer adds the first user to an end of a queue identifying one or more users in the group that are waiting for the second user to relinquish allocation of the file. The first computer utilizes the data of usage to display the queue in the IDE client. | 09-19-2013 |
20130247022 | IDENTIFYING OPTIMAL UPGRADE SCENARIOS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested. | 09-19-2013 |
20130251124 | CONTINUAL INDICATOR OF PRESENCE OF A CALL PARTICIPANT - Examples include a system, method and program for notifying presence of a phone call participant. In an example, a computer receives a request from a first calling device to connect with one or more second calling devices through a network. The computer provides a presence notification on the first calling devices wherein the presence notification provides a repeating indicator which represents that the one or more second calling devices are connected. The computer determines that the one or more second calling devices has disconnected and in response the computer ceases the presence notification on the first calling device. | 09-26-2013 |
20130251125 | MANAGING MULTIPLE PASSCODES RELATED TO A SINGLE CALL-IN NUMBER USED BY A PHONE DEVICE - An embodiment of the invention is used with a conference calling system that includes a plurality of client phones, and a conference call center. Passcodes are entered into a list contained in a given client phone, wherein all listed passcodes are associated with a specified phone number that can be used to establish a connection between the given client phone and the conference call center. The specified phone number is used at the given client phone to access the passcode list. A passcode is selected from the list for transmission from the given client phone to the conference call center, over the phone connection established using the specified phone number. In response to receiving the selected passcode at the conference call center, the conference call center is operated to connect the given client phone into a conference call with one or more other client phones. | 09-26-2013 |
20130254681 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130254682 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130262592 | DETERMINING CROWD TOPICS FROM COMMUNICATIONS IN A FOCUS AREA - An embodiment of the invention provides a system and method for managing computing resources, wherein a data analyzer analyzes communications from electronic devices to identify a common topic among the communications in a predetermined area. In at least one embodiment, only communications that have been created within a predetermined time period are analyzed. A processor connected to said data analyzer generates a title based on the common topic. A communications module connected to the processor sends an electronic message to a user, wherein the electronic message includes the title and the predetermined area. In at least one embodiment, the title and the predetermined area are displayed on a graphical user interface. | 10-03-2013 |
20130272508 | Voice Input State Identification - A method for indicating voice input state for a call on a communications device. A processor unit identifies the state of voice input for the call. In response to the state of the voice input being a mute state, the processor unit identifies a mute setting for the mute state based on a user profile. Thereafter, first audio data specified by the mute setting is played with audio data from the call on the communications device. In response to the state of the voice input being an unmute state, the processor unit identifies an unmute setting for the unmute state based on the user profile. Thereafter, second audio data specified by the unmute setting is played with the audio data from the call on the communications device. | 10-17-2013 |
20130282836 | Propagation of Message Having Time-Based Information - A method for propagating a message includes searching a plurality of messages for time-based information; associating located time-based information with the corresponding message as meta-data; extracting the meta-data and propagating the message as the time-based information approaches; and displaying the propagated message in a graphical user interface. | 10-24-2013 |
20130304788 | APPLICATION COMPONENT DECOMPOSITION AND DEPLOYMENT - A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns. | 11-14-2013 |
20130305316 | COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. | 11-14-2013 |
20130305318 | COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. | 11-14-2013 |
20130308764 | ADDING A TELECONFERENCE CALLER TO A GROUP INSTANT MESSAGING CHAT - In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat. | 11-21-2013 |
20130318447 | Prompting of Recipient Expertise in Collaboration Environment - A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface. | 11-28-2013 |
20130318520 | EARLY CONFIGURATION IN DEPLOYING AN ENTERPRISE APPLICATION - Illustrative embodiments include a method, system, and computer program product for early configuration of an application in a deployment of an enterprise application. A section is located in an enterprise application deployment file of the enterprise application. The section includes configuration information of the application. The configuration information of the application is loaded before completing loading of the enterprise application deployment file such that the application is configurable without waiting for the loading of the enterprise application deployment file to complete. Loading the enterprise application deployment file is continued without waiting for a configuring of the application using the configuration information of the application that is loaded. | 11-28-2013 |
20130322610 | EXTERNAL MESSAGING DURING CONFERENCE CALL - A solution for enabling a participant to a conference call to obtain contact information for other participants to the conference call in order to send an external message to one or more of the other participants is provided. The contact information can be used by a messaging system, which is available to the participant independent of the conference call, to transmit the external message for presentation to the other participant(s). | 12-05-2013 |
20130326331 | RECEIVER SIDE INDICATION OF PREVIEW CONTENT FOR TEMPLATE EMAILS - A computer implemented method, a computer program product, and a data processing system display a user-defined email preview within a mail folder of an email client. A user can enter a user-defined preview text into a preview field associated with a particular email. When a preview of the email is shown in a mail folder, the user-defined preview text is shown as the email preview instead of a truncated portion of the email body. | 12-05-2013 |
20130329871 | CALL-IN NUMBER FORMATTING ADJUSTMENT PER VIEWING DEVICE - Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver. | 12-12-2013 |
20130329874 | CALL-IN NUMBER FORMATTING ADJUSTMENT PER VIEWING DEVICE - Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver. | 12-12-2013 |
20130332782 | BACKGROUND BUFFERING OF CONTENT UPDATES - A computer-implemented method, system, and/or computer program product handles content availability error codes. A content refresh response, responsive to a content refresh request that requests content being displayed on a user interface to be updated, is received by and stored in a buffer in a client computer. The content refresh request was generated by a content renderer in the client computer, and the buffer is isolated from the content renderer. The content refresh response is then transmitted from the buffer to a content refresh handler, such that the content refresh handler prevents the content refresh response from being sent directly from the buffer to the content renderer without the content refresh response first being analyzed by the content refresh handler. | 12-12-2013 |
20130343529 | Auto-Save, Retrieval, and Presentation of Key Press Sequences - An embodiment of the invention provides a method for communicating on a telecommunications device, wherein a telephone number is received from a user via an interface of the telecommunications device. At least one character from the user is also received via the interface in response to key press options presented to the user. The telephone number and the character received from the user are automatically saved on a memory device. The character is automatically associated with the telephone number. Contextual information associated with the character is saved, wherein the contextual information indicates the time of day that the character is entered, the date that the character is entered, and/or the type of call where the character is entered. The character is presented to the user in a list of previously entered characters on a display of the telecommunications device during a subsequent telephone call to the saved telephone number. | 12-26-2013 |
20130346243 | TRANSACTION MANAGEMENT BASED ON INDIVIDUAL ORDERS OR NUMBER OF DEVICES AT TABLE FOR DESIRED DISTRIBUTION - A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations. | 12-26-2013 |
20130346515 | Content-Sensitive Notification Icons - Methods and systems may provide for receiving a message, determining a mood condition for the message, and generating a message notification icon based on the mood condition. In one example, the mood condition estimates one or more of a mood of the sender of the message and a mood impact of the message on a recipient of the message. Moreover, one or more additional messages may be received, wherein one or more additional mood conditions are determined for the additional messages, and the mood conditions are combined to form an aggregate mood condition. The message notification icon may be further generated based on the aggregate mood condition. | 12-26-2013 |
20140006971 | SELECTIVE SHARING OF WINDOWS AMONG PARTICIPANTS IN A WEB CONFERENCE | 01-02-2014 |
20140006974 | SELECTIVE SHARING OF WINDOWS AMONG PARTICIPANTS IN A WEB CONFERENCE | 01-02-2014 |
20140006993 | TASK TIMER | 01-02-2014 |
20140012618 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 01-09-2014 |
20140012642 | EVENT-BASED MANAGEMENT OF A COUPON PROMOTION - An approach for managing a coupon based on an event is presented. Information about an event is received. Attributes indicating an email or text message communication is from a retailer are received. The communication is received. The communication is determined to be from the retailer and include the coupon by determining the communication has the received attributes. Based on the communication having the attributes, the coupon included in the communication is associated with the event. A user selection of the event is received to display the received information about the event and a link to the communication that includes the coupon associated with the selected event. | 01-09-2014 |
20140018038 | AURAL CUING PATTERN BASED MOBILE DEVICE SECURITY - When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality of positions from which an access code for accessing a mobile device can be selected. Indications of a set of positions of the plurality of positions in a sequence are received. The sequence of the set of the positions form an access code. For at least the first of the set of positions, an aural cue associated with the first position is determined, and the aural cue is emitted to indicate the first position based on the aural cue. It is determined whether the access code is correct. Access to the mobile device is allowed if the access code is correct. | 01-16-2014 |
20140019902 | PROGRESS BARS FOR MEDIA CONTENT - Some example embodiments include a method for presenting media content. The method includes decoding the media content having a number of time segments to access metadata that defines a number of selectable characteristics for semantic content in the media content. The method includes presenting to a viewer of media content the number of selectable characteristics for the semantic content. The method includes receiving, from the viewer, a selectable characteristic of the number of selectable characteristics. The method includes presenting, along with the media content, a progress bar for the media content that defines, through the number of time segments, temporal positions in the media content where the selectable characteristic is within the media content. The presenting of the progress bar includes presenting a graphic in the progress bar that is different for different values for a same selectable characteristic of the at least one selectable characteristic. | 01-16-2014 |
20140020088 | AURAL CUING PATTERN BASED MOBILE DEVICE SECURITY - When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality of positions from which an access code for accessing a mobile device can be selected. Indications of a set of positions of the plurality of positions in a sequence are received. The sequence of the set of the positions form an access code. For at least the first of the set of positions, an aural cue associated with the first position is determined, and the aural cue is emitted to indicate the first position based on the aural cue. It is determined whether the access code is correct. Access to the mobile device is allowed if the access code is correct. | 01-16-2014 |
20140025653 | Source Control Inheritance Locking - An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process. | 01-23-2014 |
20140025752 | MESSAGE DISTRIBUTION AND VIEWING RULES IN A NETWORK - A system, method and computer-readable medium for displaying a message over a network are disclosed. A distribution indicator is associated with a defined distribution rule for displaying messages over the network. A message includes the distribution indicator in the message. The message is displayed over the network according to the distribution rule indicated by the distribution indicator included in the message. | 01-23-2014 |
20140026116 | SOURCE CONTROL EXECUTION PATH LOCKING - An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user. | 01-23-2014 |
20140026117 | Source Control Execution Path Locking - An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user. | 01-23-2014 |
20140026119 | INTEGRATED DEVELOPMENT ENVIRONMENT-BASED WORKLOAD TESTING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an integrated development environment (IDE)-based approach for testing development projects (e.g., comprising one or more intended workloads). In a typical embodiment, a designation of a project (e.g. having a set of workloads) for testing on a network resource group is received via a user interface associated with an IDE. A current server instance in the network resource group having a highest availability for testing the project may then be identified (e.g., based on an analysis of various computing/cost characteristics). The project may then be deployed to the current server instance, and a network address corresponding to the current server instance may be associated with the project in a computer storage device. The project may then be tested by processing the set of intended workloads using the current server instance. | 01-23-2014 |
20140028708 | GRAPHICALLY REPRESENTING TAGS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc. | 01-30-2014 |
20140047509 | AUTHORIZING COMPUTING RESOURCE ACCESS BASED ON CALENDAR EVENTS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing environment) is provided. A portion/segment (e.g., private cloud) of the networked computing environment may be designated for storing at least one electronic file to be shared (e.g., as stored in a computer storage device associated with the portion). The portion of the networked computing environment may then be associated (e.g., graphically) with an electronic calendar entry (e.g., a meeting having a set of attendees). Based on the calendar entry, a set of users (e.g., the meeting attendees) authorized to access the at least one electronic file may be determined based on the electronic calendar entry. Thereafter, access (e.g., a related permissions) to the at least one electronic file may be authorized for the set of users. | 02-13-2014 |
20140050311 | TELEPHONE CALL SET CORRELATION AND INFORMATION RANKING - A set of call-specific metadata entries specified by a user that each represent a user-specified item of information to capture in association with a set of telephone numbers is obtained. The user-specified items of information represented by the set of call-specific metadata entries are captured from the user in association with a telephone number that is related to the set of call-specific metadata entries. The user-specified items of information are sorted based upon at least one user-specified item of information in response to detecting a user request to sort the captured user-specified items of information. | 02-20-2014 |
20140051390 | AUTOMATICALLY CONNECTING TO A BEST AVAILABLE CALLING DEVICE BASED ON RESOURCE STRENGTH - A method, computer program product, and computer system for automatically connecting a calling device to a best available calling device based on resource strength. A computer system receives from a first calling device a request for a call to a second calling device and evaluates resource strength of the second calling device. The computer system determines one or more third calling devices, in response to determining that the resource strength of the second calling device is low. The computer system compares resource strength of the one or more third calling devices with that of the second calling device and determines a best available one of the one or more third calling devices. The computer system connects the call by connecting the first calling device and the best available one of the one or more third calling devices. | 02-20-2014 |
20140053125 | DETERMINING PROJECT STATUS IN A DEVELOPMENT ENVIRONMENT - A method and program product to monitor the activities of a named person for developing a computer program. The method comprises the steps of logging operations performed by a software build tool or software test tool, a record in the log for each of the operations comprising an identity of a person that requested the operation and a time stamp of the operation; identifying the activities of the named person; determining that the named person is currently accessing the software build tool or software test tool; querying the log records with a time stamp within a predetermined period to determine that the named person has used the software build tool or software test tool to develop the computer program within the predetermined period; and reporting to the user that the named person used the tool to develop the computer program within the predetermined period. | 02-20-2014 |
20140067824 | DATABASE TABLE FORMAT CONVERSION BASED ON USER DATA ACCESS PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables. | 03-06-2014 |
20140074803 | LOG MESSAGE OPTIMIZATION TO IGNORE OR IDENTIFY REDUNDANT LOG MESSAGES - A method of presenting log messages during execution of a computer program. The method can include identifying at least a second log message set comprising information that is the same as information contained in a first log message set. The method can include determining to present the second log message set in a manner that indicates that the second log message set is redundant, and presenting such list of log messages accordingly, or determining not to present the second log message set in the list of log messages, and presenting the list of log messages accordingly. | 03-13-2014 |
20140074942 | IDENTIFYING A WEBPAGE FROM WHICH AN E-MAIL ADDRESS IS OBTAINED - Detecting an e-mail client generating a first e-mail identifying as a recipient e-mail address an e-mail address identified in the webpage. A screen shot of the webpage can be captured. An association can be automatically created between the screen shot of the webpage and the first e-mail, and the screen shot of the webpage is stored. The first e-mail is sent to the recipient e-mail address. Responsive to receiving or opening the first e-mail or a second e-mail related to the first e-mail, the screen shot of the webpage can be automatically retrieved and presented. | 03-13-2014 |
20140081693 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein are a computer-implemented method, computer program and system to invite one or more people to a meeting. The method includes, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people, such as in one or both of a database and a social network space, in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list of located identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140082000 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein in part is a data processing system configured to invite one or more people to a meeting. The data processing system includes at least one data processor connected with at least one memory storing computer program code. Execution of the computer program code by the at least one data processor results in operations being performed that include, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list comprising identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140082485 | SYNCHRONIZATION OF CONTEXTUAL TEMPLATES IN A CUSTOMIZED WEB CONFERENCE PRESENTATION - In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a conference presentation. The computer system receives a request to access presentation templates based on parameters of a presenter, wherein the presentation templates including parameters identifying one or more of template texture, template font, template name of the presenter or template photo of the presenter of the conference presentation. In addition, the computer system determines an identity of the presenter during the conference presentation and matching the identity of the presenter against the parameter of the presenter. Moreover, the computer system extracts the presentation templates in the repository based on the match. The computer system further applies the extracted presentation template to presentation contents of the presentation program. In one aspect, the extracted presentation template alters visual characteristics of the presentation content based on the applied presentation template. | 03-20-2014 |
20140089897 | INTEGRATED EXCHANGE OF DEVELOPMENT TOOL CONSOLE DATA - Embodiments of the present invention provide a method, system and computer program product for exchanging console data in a messaging system. In an embodiment of the invention, a method for exchanging console data in a messaging system includes receiving a message in a messaging client executing in memory by at least one processor of a computer. The method further includes selecting in the message in the messaging client a portion of console data for a version of source code. For instance, the console data can be a selection of source code or an error message for a selection of source code. Finally, in response to the selection of the portion of console data, corresponding meta-data for the message can be extracted and a version of source code for the console data can be determined from the meta-data. Finally, the version of the source code can be loaded in an IDE executing in the memory by the at least one processor of the computer. | 03-27-2014 |
20140149193 | MANAGING A RETAIL OFFER - An approach for managing retail offer(s) based on information from a social networking website is presented. Information about an event is received. The event is determined to be relevant to user(s) of the social networking website by determining preferences of the user(s) and determining the user(s) have an interest in the event based on the preferences. Retail offers are received. Received retail offer(s) are determined to be relevant to the event by determining a preference of an individual associated with event and determining the individual has an interest in the retail offer(s) based on the preference. Based on the event being relevant to the user(s) and the retail offer(s) being relevant to the event, the retail offer(s) are displayed for viewing by the user(s) via an interface provided by the social networking website. | 05-29-2014 |
20140149218 | PROMOTIONAL ITEM DELIVERIES BASED ON PLANNED/FUTURE TRAVELING - An approach for managing electronic promotional item(s) is presented. A plurality of subscriptions is submitted to at least one software service on behalf of a user. The submitted subscriptions are associated with respective geographical locations within a threshold distance from a travel route of a trip to a destination. The electronic promotional item(s) associated with respective geographical location(s) within the threshold distance are received from the at least one software service. The received electronic promotional item(s) are determined to be in effect between start and end dates of the trip. Based on the received electronic promotional item(s) being in effect between the start and end dates, at least a portion of the received electronic promotional item(s) is presented. | 05-29-2014 |
20140149897 | METHOD, APPARATUS AND COMPUTER PROGRAM TO DESIGNATE CONTENT RETRIEVAL ON AN INTERACTIVE DISPLAY - Disclosed is a method, computer program product and a system configured, in response to a user placing one or more markings at a first location on a display screen, creating a mapping between data representing the one or more markings; saving the data in a file that is identified at least in part by the mapping; and in response to the user inputting a command to retrieve the markings, retrieving the data from the file based on the mapping and rendering markings on the display screen at a second location specified by the user. | 05-29-2014 |
20140149898 | METHOD, APPARATUS AND COMPUTER PROGRAM TO DESIGNATE CONTENT RETRIEVAL ON AN INTERACTIVE DISPLAY - Disclosed is a system configured, in response to a user placing one or more markings at a first location on a display screen, to create a mapping between data representing the one or more markings; to save the data in a file that is identified at least in part by the mapping; and in response to the user inputting a command to retrieve the markings, to retrieve the data from the file based on the mapping and to render markings on the display screen at a second location specified by the user. | 05-29-2014 |
20140157270 | VIRTUAL MACHINE MANAGEMENT - A virtual machine management method and system is provided. The method includes receiving by a computing system, a list of virtual machines deployed within an enterprise. The computing system determines that a specified time period has elapsed during deployment and a list of resources and transactions associated with the virtual machines is retrieved. The computing system calculates a cost value and service value for deploying the virtual machines and a premium value associated with the services. The computing system determines if the premium value is within a policy for the enterprise. | 06-05-2014 |
20140164446 | SHARING ELECTRONIC FILE METADATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like. | 06-12-2014 |
20140164510 | RESCHEDULING UNFINISHED MEETING AGENDA TOPICS - Rescheduling unfinished meeting agenda topics includes detecting an unfinished meeting agenda topic at a conclusion of a meeting and rescheduling with a meeting management engine the unfinished meeting agenda topic to be addressed in a later meeting. | 06-12-2014 |
20140172841 | SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword. | 06-19-2014 |
20140173279 | SECURELY IDENTIFYING HOST SYSTEMS - Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s). | 06-19-2014 |
20140173506 | SEARCH ENGINE OPTIMIZATION UTILIZING SCROLLING FIXATION - Provided are techniques for utilizing scrolling fixation. An amount of time a user spends on a portion of a page based on scroll bar usage by the user is monitored. The amount of time the user spends on the portion of the page is aggregated with an amount of time at least one other user spent on that portion of the page based on scroll bar usage by the at least one other user. A scroll bar is displayed with at least one indicator, wherein the at least one indicator represents an aggregated amount of time spent on an associated portion of the page. | 06-19-2014 |
20140189640 | Native Language IDE Code Assistance - An embodiment of the invention provides a method including receiving input from a user interface, wherein the input includes the name of a code segment in a first language. A database is queried with the name of the code segment in the first language to identify the name of the code segment in a second language different from the first language. The database includes names of code segments in a plurality of languages. The name of the code segment is displayed in the second language and/or the name of the code segment in the first language is replaced with the name of the code segment in the second language. | 07-03-2014 |
20140189642 | Native Language IDE Code Assistance - An embodiment of the invention provides a method including receiving input from a user interface, wherein the input includes the name of a code segment in a first language. A database is queried with the name of the code segment in the first language to identify the name of the code segment in a second language different from the first language. The database includes names of code segments in a plurality of languages. The name of the code segment is displayed in the second language and/or the name of the code segment in the first language is replaced with the name of the code segment in the second language. | 07-03-2014 |
20140189865 | SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level. | 07-03-2014 |
20140195146 | PREVENTATIVE TRAFFIC CONGESTION SOCIAL NETWORKING IMPROVEMENT SYSTEM WITHIN A COMMUNITY - A method, system, and computer program product for transmitting traffic congestion routing data to a community of global positioning system (GPS) devices. Community routing logic of a community routing system (CRS) receives a route request containing the current location and desired destination of a GPS device. The CRS may use the community routing logic to determine a path that the user of the GPS device should travel on to best minimize driving time and traffic conditions for a community of users of the CRS. The CRS considers road capacity, current traffic conditions, and historical traffic data for roads and alternate roads along a preferred route. The CRS also considers routes previously taken by the GPS device. Additionally, the CRS may receive information about routes taken by other GPS devices to further improve future routes of the community of GPS devices. | 07-10-2014 |
20140201345 | MANAGING USER PRIVILEGES FOR COMPUTER RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided. | 07-17-2014 |
20140207768 | SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword. | 07-24-2014 |
20140208261 | SEARCH ENGINE OPTIMIZATION UTILIZING SCROLLING FIXATION - Provided are techniques for utilizing scrolling fixation. An amount of time a user spends on a portion of a page based on scroll bar usage by the user is monitored. The amount of time the user spends on the portion of the page is aggregated with an amount of time at least one other user spent on that portion of the page based on scroll bar usage by the at least one other user. A scroll bar is displayed with at least one indicator, wherein the at least one indicator represents an aggregated amount of time spent on an associated portion of the page. | 07-24-2014 |
20140208444 | SYSTEM AND METHOD FOR TEMPORARY OBFUSCATION DURING COLLABORATIVE COMMUNICATIONS - Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device. | 07-24-2014 |
20140208445 | SYSTEM AND METHOD FOR TEMPORARY OBFUSCATION DURING COLLABORATIVE COMMUNICATIONS - Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device. | 07-24-2014 |
20140214971 | ESTABLISHING AN AUTOMATIC COMMUNICATIONS DELAY BASED ON SOCIAL OR BUSINESS NETWORK FACTORS - Methods and arrangements for imparting a communications delay. A delay is dynamically determined for sending an outgoing communication. The determining includes using information derived from at least one of: a social network graph and a business network graph, and the determined delay is applied to the outgoing communication. | 07-31-2014 |
20140214973 | ESTABLISHING AN AUTOMATIC COMMUNICATIONS DELAY BASED ON PREVAILING ACTIVITY FACTORS - Methods and arrangements for imparting a communications delay. A delay is dynamically determined for sending an outgoing communication. The determining includes using information derived from a determination of a prevailing activity level of a sender, and the determined delay is applied to the outgoing communication. | 07-31-2014 |
20140215392 | CONNECTIONS IDENTIFICATION - A method includes, a computer generating a first listing of participants, the computer obtaining a second listing of known participants; and the computer generates a third listing of participants by only listing said second listing of known participants that appear in said first listing of participants. | 07-31-2014 |
20140215436 | MANAGING CHANGE-SET DELIVERY - An approach that analyzes and manages unresolved (i.e., pending, outgoing) change-sets is provided. Specifically, this approach parses the change-set into a plurality (i.e., one or more) of changes to determine the impact each change may have. An alert may be provided to the user indicating whether the change-set should be checked-in based on the determined impact. Specifically, a change-set management tool provides this capability. The change-set management tool includes a parsing module configured to receive an outgoing change-set; and parse the change-set into a plurality of changes. The change-set management tool further comprises an evaluation module configured to evaluate an impact that each of the plurality of changes within the change-set has on other changes of the plurality of changes within the change-set. | 07-31-2014 |
20140245394 | TRUST-BASED COMPUTING RESOURCE AUTHORIZATION IN A NETWORKED COMPUTING ENVIRONMENT - A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources). | 08-28-2014 |
20140258879 | THEME ENGINE - A method includes activating a theme engine, determining a proximity between a user's device and at least one known person, and applying at least one theme to the user's device based on the proximity between the user's device and the at least one known person. | 09-11-2014 |
20140280534 | DYNAMIC SOCIAL NETWORKING CONTENT - A method, computer program product, and system for performing a dynamic social content selection. According to an embodiment, a method may include determining, via one or more computing devices, a plurality of status indicators available to be associated with social content associated with a first user. The method may also include defining one or more rules for the plurality of status indicators based on, at least in part, a recipient characteristic. The method may further include selecting one of the plurality of status indicators to associate with the content for a second user based on the one or more rules. The method may further include providing the content and the selected one of the plurality of status indicators to the second user. | 09-18-2014 |
20140280653 | GENERATING AND/OR PROVIDING ACCESS TO A MESSAGE BASED ON PORTIONS OF THE MESSAGE INDICATED BY A SENDING USER - Message processing is disclosed that includes detecting an action by a sending user selecting at least one portion of a message. An indication of the selected portion of the message is stored in the message, and the message transmitted to at least one message recipient. Contextually related content from the message for the selected portion may also be indicated in the message. The selected portion or portions of the message may be displayed to a recipient user, and selection by the recipient user of a portion of the message selected by said sending user may be detected. Contextually related content may be retrieved from the message in response detecting the recipient user's selection of the portion of the message selected by said sending user, and the contextually related content displayed to the recipient together with the portion of the message selected by said sending user. | 09-18-2014 |
20140282104 | DYNAMIC SOCIAL NETWORKING CONTENT - A method, computer program product, and system for performing a dynamic social content selection. According to an embodiment, a method may include determining, via one or more computing devices, a plurality of status indicators available to be associated with social content associated with a first user. The method may also include defining one or more rules for the plurality of status indicators based on, at least in part, a recipient characteristic. The method may further include selecting one of the plurality of status indicators to associate with the content for a second user based on the one or more rules. The method may further include providing the content and the selected one of the plurality of status indicators to the second user. | 09-18-2014 |
20140297695 | INTELLIGENT DATA ROUTING AND STORAGE PROVISIONING - Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource. | 10-02-2014 |
20140303970 | ADAPTING SPEECH RECOGNITION ACOUSTIC MODELS WITH ENVIRONMENTAL AND SOCIAL CUES - An acoustic model adaptation system includes a memory device and a model selector engine coupled to the memory device. The model selector engine is configured to compile information of environmental conditions to identify a current speech environment for audio input into a speech recognizer on a device. The model selector engine is further configured to compare the information of the environmental conditions with profiles of acoustic models. Each profile associates with an acoustic model. Each acoustic model compensates for background noise or acoustical distortions of the audio input. The model selector engine is further configured to select a first acoustic model for the speech recognizer based on the information of the environmental conditions exclusive of audio input from the user. | 10-09-2014 |
20140317263 | IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration. | 10-23-2014 |
20140325077 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 10-30-2014 |
20140325475 | REFERENCING AND SYNCHRONIZATION OF EMAIL THREADS INTO INTEGRATED DEVELOPMENT ENVIRONMENT (IDE) - A method includes providing a source control system in an integrated development environment, providing an email server through which the integrated development environment can communicate, providing an email mapping reference repository, and using the email mapping reference repository to find a linked email from the email server and provide the linked email to the integrated development environment. | 10-30-2014 |
20140330782 | REPLICATION OF CONTENT TO ONE OR MORE SERVERS - An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties. | 11-06-2014 |
20140330975 | ENHANCED COMMAND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource. | 11-06-2014 |
20140342661 | Social Network Based Wi-Fi Connectivity - An embodiment of the invention provides a method for social network based Wi-Fi, wherein an antenna of a mobile electronic device identifies at least one wireless network within range of the mobile electronic device, and wherein owner(s) of the wireless network(s) are identified with a processor. Relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are determined with an analysis engine. The wireless network(s) and the relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are displayed on the mobile electronic device. A request to access a wireless network is received from the owner of the mobile electronic device. Access to the wireless network is automatically granting when the relationship status between the owner of the mobile electronic device and the owner of the wireless network is above a predetermined threshold. | 11-20-2014 |
20140359110 | AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted. | 12-04-2014 |
20150074211 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING PREVIOUSLY IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 03-12-2015 |