Patent application number | Description | Published |
20080244594 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-02-2008 |
20080253546 | Telephone Conference Call Management - Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise. | 10-16-2008 |
20090037542 | METHOD AND SYSTEM FOR IMPROVING EFFICIENCY OF EMAIL FORWARDING BY REMOVING DUPLICATION - In a method and system for removing email forwarding duplication, when an email was sent for the first time, the email was assigned a unique identifier. An aggregate recipient list was created and associated with the unique identifier. When the email is to be forwarded, the aggregate recipient list has recipients previously forwarded the email. The recipient list of the forwarding email is compared with the aggregate recipient list. If duplicate email addresses are found, the duplicate email addresses are displayed to a sender of the forwarding email. If the sender chooses not to send the forwarding email to the duplicate email addresses, the duplicate email addresses are removed from the recipient list of the forwarding email. New recipients of the forwarding email are added to the aggregate recipient list. The forwarding email with the unique identifier is sent to the recipient list. | 02-05-2009 |
20090055234 | SYSTEM AND METHODS FOR SCHEDULING MEETINGS BY MATCHING A MEETING PROFILE WITH VIRTUAL RESOURCES - A system for scheduling meetings by matching a scheduler-defined meeting profile against a pool of virtual resources is provided. The system includes an electronic data storage comprising data defining a set of virtual resources, at least one property being associated with each resource. The system also includes a meeting profiler module that is configured to define a meeting profile which specifies one or more resources required for a meeting based upon received user input. The system further includes a profile-resource matching module that searches the data of the electronic data storage and matches elements of the set of virtual resources to the one or more resources required for the meeting defined by the meeting profiler module, and, based thereon, automatically generates at least one meeting schedule candidate. | 02-26-2009 |
20090150397 | METHOD OF TAGGING INSTANT MESSAGING (IM) CONVERSATIONS FOR EASY INFORMATION SHARING - A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection. | 06-11-2009 |
20090171937 | System and Method for Solving Ambiguous Meanings of Unknown Words Used in Instant Messaging - A system and method for identifying an unknown word's likely definition based upon a common social networking group is presented. A user receives a message and selects an unknown word in the message. In turn, the recipient client identifies a common social networking group between the sending client and the recipient client. The recipient client then uses the common social networking group to identify the unknown word's definitions using one or more unknown word repositories, such as the sending client unknown word repository, the recipient client unknown word repository, or a mutual client unknown word repository, which corresponds to a mutual client included in the common social networking group. Once the recipient client identifies the unknown word's definitions, the recipient client orders and displays the definitions based upon the common social networking group and social networking group frequency values. | 07-02-2009 |
20090300709 | AUTOMATED CORRECTION AND REPORTING FOR DYNAMIC WEB APPLICATIONS - Changes to dynamic web content are monitored for compliance with web content compliance rules. A noncompliant element associated with a change to the dynamic web content is identified based upon the web content compliance rules. Automated correction of the noncompliant element is performed based upon the web content compliance rules. The noncompliant element is reported to a server associated with the change to the dynamic web content. | 12-03-2009 |
20100011066 | CONTROLLING EMAIL DISTRIBUTION LISTS USING POLICIES - A policy can be established that is associated with an email distribution list. The policy can specify an extent that email addresses contained in the email distribution list are visible to recipients. An email message to be conveyed to at least the email distribution list can be identified. A set of recipient messages can be created from the identified email message—one recipient message for each of the recipients. The policy can be applied to each recipient message to determine an extent that email addresses contained in the email distribution list are visible to that recipient. Different ones of the recipient email messages can have different visibility regarding email addresses of members of the distribution list based upon the applied policy. | 01-14-2010 |
20110119338 | EMAIL COMPOSITION AND PROCESSING - A computer implemented user interface allows composition of an electronic mail message. A user selects at least one pre-existing email from an email inbox. An envelope is then created by parsing each of the selected pre-existing emails. The pre-existing email is displayed as a tree structure comprising an envelope with at least a label sub-node in a new email view. A new email is composed by selecting parts from the tree structure. The sub-nodes may further comprise a content sub-node. The content sub-node further comprises multi-media parts, and the new email body is composed by selecting parts from the content sub-node. | 05-19-2011 |
20110161425 | Automatic Notification of Document Changes - Included are method, article of manufacture, and device that serve to identify one or more tracked categories in a document, the tracked category representing a portion of the document, identify a change in one or more of the tracked categories of the document, identify a client to notify of the change in the tracked category, and send a notification to a client, where the notification provides notice that a change has occurred in a tracked category of a document. | 06-30-2011 |
20120005275 | ACCELERATED MICRO BLOGGING USING CORRELATED HISTORY AND TARGETED ITEM ACTIONS - A computer implemented method correlates a digital resource with an electronic message. A processor detects a focus on a targeted item that identifies a digital resource. The targeted item is in a user history that presents a history of a user's access to multiple digital resources. The processor then auto-populates a draft of an electronic message with the targeted item that was focused in the user history. | 01-05-2012 |
20120260254 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-11-2012 |
20140059112 | AUTOMATED CORRECTION AND REPORTING FOR DYNAMIC WEB APPLICATIONS - A run-time application-generated change to dynamic web content, generated during an application run-time by a dynamic web application, is detected in response to user run-time interactions with the dynamic web content rendered by the dynamic web application that changed the dynamic web content during the run-time. The detected run-time application-generated change to the dynamic web content is parsed. The parsed run-time application-generated change to the dynamic web content is compared with web content compliance rules that define specifications for web content representation. A noncompliant element associated with the parsed run-time application-generated change is identified based upon the comparison with the web content compliance rules. A run-time correction of the identified noncompliant element within the dynamic web content changed by the dynamic web application is performed to cause the identified noncompliant element to comply with the web content compliance rules. | 02-27-2014 |