Patent application number | Description | Published |
20100205267 | Instant Messaging Device/Server Protocol - A generic IM device/server protocol permits a single implementation of a IM application on client devices for communicating with different enterprise IM servers types. The protocol defines a server maintained tag to identify the currency of a contact list it is managing for a client device. The client device receives and persists the tag and provides it at login. The server automatically sends a contact list update only if the tag indicates the client devices contact list instance is not current. Presence updates may also be sent automatically at login and the client device need not separately request contact list or presence updates at login. The client device may be pre-provisioned with respective graphics, text and server capabilities for multiple server types. A specific IM configuration may be selected in response to service information. | 08-12-2010 |
20110099612 | AUTOMATIC USER AUTHENTICATION AND IDENTIFICATION FOR MOBILE INSTANT MESSAGING APPLICATION - Automatic identification and authentication of a user of a mobile application entails receiving from the wireless communications device a unique device identifier and an e-mail address corresponding to the wireless communications device, associating a registration identifier with the unique device identifier and the e-mail address, generating an authentication token, and communicating the authentication token and the registration identifier to the wireless communications device. This technology obviates the need for the user to remember and enter a user ID and password to access backed-up application data on a server. This is particularly useful for instant messaging applications, e.g. PIN messaging, in which the unique device identifier is used to identify the user and is also the transport address. Once registered, the user who has switched to a new device or has wiped his existing device, can restore contacts or other application data from the server based on the registration identifier. | 04-28-2011 |
20110264733 | Instant Messaging Device/Server Protocol - A generic IM device/server protocol permits a single implementation of a IM application on client devices for communicating with different enterprise IM servers types. The protocol defines a server maintained tag to identify the currency of a contact list it is managing for a client device. The client device receives and persists the tag and provides it at login. The server automatically sends a contact list update only if the tag indicates the client devices contact list instance is not current. Presence updates may also be sent automatically at login and the client device need not separately request contact list or presence updates at login. The client device may be pre-provisioned with respective graphics, text and server capabilities for multiple server types. A specific IM configuration may be selected in response to service information. | 10-27-2011 |
20120079016 | EFFICIENT TRANSMISSION OF PRESENCE UPDATE INFORMATION TO PRESENCE SERVICE CLIENTS - To promote efficient transmission of presence update information to a presence service client associated or integrated with a communication client such as an instant messaging (IM) client, a separate computing device may be notified when the communication client becomes dormant. The separate device may buffer presence updates destined for the communication client, each presence update containing information regarding availability of at least one of a set of contacts for intercommunication via said communication client. When the separate device learns that either the communication client has ceased being dormant or that an event has occurred which shall cause the communication client to cease being dormant, the buffered presence updates may be sent to the presence service client. Presence updates within the buffered set may be reconciled to eliminate obsolete information. The result may be a conservation of wireless connection bandwidth or reduction in device power consumption. | 03-29-2012 |
20120117460 | URL DOCUMENT VIEWING THROUGH A PLUG-IN APPLICATION FOR A MOBILE BROWSER ON A WIRELESS DEVICE - A method is set forth of displaying a document identified by a URL on a mobile browser, comprising registering an attachment viewer plug-in to the mobile browser for a predetermined data stream content type, registering a mobile data service transcoder for predetermined document types, sending a request for the document of one of the predetermined document types from the mobile browser to the mobile service transcoder, retrieving and converting the document to the predetermined data stream content type, and forwarding the converted document from the mobile data service transcoder to the mobile browser for display via the attachment viewer plug-in. | 05-10-2012 |
Patent application number | Description | Published |
20100068705 | GENETIC SUSCEPTIBILITY VARIANTS ASSOCIATED WITH CARDIOVASCULAR DISEASE - The invention relates to methods of diagnosing susceptibility to cardiovascular disease, including coronary artery disease. MI, abdominal aorta aneurysm, intracranial aneurysm restenosis and peripheral arterial disease, by assessing the presence or absence of alleles of certain polymorphic markers found to be associates with cardiovascular disease. The invention further relates to kits encompassing reagents for assessing such markers, and methods for assessing the probability of response to therapeutic agents and methods using such markers. | 03-18-2010 |
20110015081 | Genetic Variants on chr 5p12 and 10q26 as Markers for Use in Breast Cancer Risk Assessment, Diagnosis, Prognosis and Treatment - The invention pertains to certain genetic variants on Chr5p12 and Chr10q26 as susceptibility variants of breast cancer. Methods of disease management, including diagnosing increased and/or decreased susceptibility to breast cancer, methods of predicting response to therapy and methods of predicting prognosis using such variants are described. The invention further relates to kits useful in the methods of the invention. | 01-20-2011 |
20110117545 | GENETIC VARIANTS ON CHR2 AND CHR16 AS MARKERS FOR USE IN BREAST CANCER RISK ASSESSMENT, DIAGNOSIS, PROGNOSIS AND TREATMENT - The invention pertains to certain genetic variants on Chr2q14, Chr2q35 and Chr16q12 as susceptibility variants of breast cancer. Methods of risk assessment and diagnosis of increased and/or decreased susceptibility to breast cancer, using such variants are described. The invention further relates to kits for diagnosing a susceptibility to breast cancer. | 05-19-2011 |
20120208709 | GENETIC SUSCEPTIBILITY VARIANTS ASSOCIATED WITH CARDIOVASCULAR DISEASE - The invention relates to methods of diagnosing susceptibility to cardiovascular disease, including coronary artery disease, MI, abdominal aorta aneurysm, intracranial aneurysm restenosis and peripheral arterial disease, by assessing the presence or absence of alleles of certain polymorphic markers found to be associated with cardiovascular disease. The invention further relates to kits encompassing reagents for assessing such markers, and methods for assessing the probability of response to therapeutic agents and methods using such markers. | 08-16-2012 |
20140179546 | GENETIC VARIANTS ON CHR 5P12 AND 10Q26 AS MARKERS FOR USE IN BREAST CANCER RISK ASSESSMENT, DIAGNOSIS, PROGNOSIS AND TREATMENT - The invention pertains to certain genetic variants on Chr5p12 and Chr10q26 as susceptibility variants of breast cancer. Methods of disease management, including diagnosing increased and/or decreased susceptibility to breast cancer, methods of predicting response to therapy and methods of predicting prognosis using such variants are described. The invention further relates to kits useful in the methods of the invention. | 06-26-2014 |
Patent application number | Description | Published |
20100030648 | SOCIAL MEDIA DRIVEN ADVERTISEMENT TARGETING - Techniques and systems for selecting one or more advertisements to target (e.g., send to, display to, etc.) a user are disclosed wherein the interests of the user are inferred based on current behaviors of social media. Social media is collected and categorized according to some predetermined criteria, such as keywords or outlinks in a post. As a function of the social media collected, current topics in the social media are identified and an advertisement, or advertisements, relating to the current topics is selected. Current topics may be those topics that are more popular, for example, in the social media at the instant a user enters an ad-enabled site. | 02-04-2010 |
20100042910 | Social Media Guided Authoring - Techniques and systems for assisting an author in creating content for social media (e.g., blog posts, microblogs, tweets, etc.) are disclosed, wherein hints are provided to the author as a function of social media stored in a social media knowledge store. Social media is collected and stored in a social media knowledge store according to some criteria. Upon the happening of some predetermined event, for example, relevant information is retrieved from the social media knowledge store. The relevancy of information may be a function of editing context (provided by the author) and/or social media behavior, for example. The relevant information may be translated into hints that provide an author with suggestions and/or corrections, for example. This information is provided to the author through a social media environment (e.g., an authoring tool) that may be also be capable of receiving input from the author and outputting editing context. | 02-18-2010 |
20100057772 | AUTOMATIC DETERMINATION OF AN ENTITY'S SEARCHABLE SOCIAL NETWORK USING ROLE-BASED INFERENCES - Techniques and systems for determining a first entity's social network are provided herein. Data is extracted from one or more data sources associated with the first entity. Once data is extracted, a role of a second entity may be inferred using inference algorithms, rules, keywords, and/or tags in the data extracted. The first entity's social network may be determined by linking the first entity to the second entity and the second entity's role(s) in relation to the first entity. It will be appreciated that the first entity may also search his/her/its network and/or other entities' social networks if the first entity has been granted access by the other entities, for example. Additionally, information about entities found during the first entity's search may be added to a data source associated with the first entity. | 03-04-2010 |
20100058285 | COMPOSITIONAL VIEW OF IMPERATIVE OBJECT MODEL - A compositional or alternate object model is employed over an imperative object model to facilitate inspection and construction of imperative structures in a user-friendly manner. Transformations between compositional and imperative models and vice versa can be specified to provide a bridge between differing computing worlds. Moreover, various architectures and/or design patterns can be employed to effect transformation in different ways. | 03-04-2010 |
20110202909 | TIER SPLITTING FOR OCCASIONALLY CONNECTED DISTRIBUTED APPLICATIONS - Distributed programming is aided by tier splitting single-tier applications into multi-tier applications. Computations and persistent data are split across tiers to generate offlineable or occasionally connected distributed applications. More specifically, computations are divided amongst tiers while preserving the semantics of a single-tier application, and upstream-tier resident data and changes thereto are replicated downstream to facilitate offline work. | 08-18-2011 |
20120096435 | CAPABILITY-BASED APPLICATION RECOMMENDATION - Capabilities associated with a capability-based security model are utilized as a basis for discriminating between software applications. More specifically, software applications can be identified as a function of capabilities. A comparison can be made between software application capabilities and capabilities of interest to identify matches. Subsequently, users can be notified of any matching software applications. | 04-19-2012 |
20120102503 | Green computing via event stream management - The subject disclosure relates to resource optimization in a computing system by leveraging the asynchronous nature of event-based programming. Events arriving on respective event streams are intercepted by mechanisms as described herein that regulate the flow of events from the event stream(s) to their corresponding programs according to a desired resource usage level associated with processing of the programs. Event flow control is performed as described herein via operations on events such as buffering, queuing, desampling, aggregating, reordering. As additionally described herein, a resource usage level for a given processing entity can be determined based on considerations such as program priorities, power profiles or other resource profiles, and resource cost analysis. Further, techniques for extending input regulation as described herein to the case of load distribution among multiple processing nodes are provided. | 04-26-2012 |
20130091295 | PUBLISH/SUBSCRIBE SYSTEM INTEROPERABILITY - Publish/subscribe (pub/sub) systems can be interoperable. Differences between various pub/sub systems can be addressed to enable creative combination of streams from diverse pub/sub systems, among other things. More specifically, pub/sub systems can be unified to facilitate interaction, and adjustments can be made to compensate for any message stream idiosyncrasies. | 04-11-2013 |