Patent application number | Description | Published |
20080263031 | METHOD AND APPARATUS FOR CREATING SEARCHES IN PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for creating searches in peer-to-peer networks includes forming clusters comprising data from a user's media library and formulating at least one search request message in accordance with the clusters. Formation of the clusters may be guided at least in part by data attributes that the user indicates are important. In this way, the user's media library may be “mined” for information that will aid in creating searches for data that the user may be interested in, but may not necessarily know how to search for or may not necessarily know exists. | 10-23-2008 |
20080281966 | METHOD AND SYSTEM OF NETWORK COMMUNICATION PRIVACY BETWEEN NETWORK DEVICES - A method for network communication privacy between network devices includes communicating first and second network enabled devices with a network, the first and second network devices in communication via a main communication channel. Respective network addresses of the first and second network enabled devices are dynamically and automatically changed while maintaining the main communication channel between the first and second network enabled devices. Subsequent network addresses of the first and second network enabled devices are created in one of a symmetric manner using a secret key or predetermined list shared between the first and second network enabled devices or created in an asymmetric manner. The asymmetric manner includes communicating the subsequent network addresses of the first and second network enabled devices over a back channel separate from the main communication channel. | 11-13-2008 |
20090113243 | Method, Apparatus and Computer Program Product for Rule-Based Directed Problem Resolution for Servers with Scalable Proactive Monitoring - Method, apparatus and computer program product are configured to perform computer monitoring activities; to collect information regarding computer system status during the computer monitoring activities; to detect a problem in dependence on the information collected during the computer monitoring activities; and to determine whether to launch a diagnostic probe when the problem is detected. The monitoring activities may be performed on a periodic or event-driven basis. The determination whether to launch a diagnostic probe is based on a rule included in a hierarchy of rules. The hierarchy of rules is based on problem tickets; system logs; and computer system configuration information. | 04-30-2009 |
20090125629 | METHOD AND APPARATUS FOR TRANSPARENT NEGOTIATIONS - In one embodiment, the present invention is a method and apparatus for transparent TCP negotiations. In one embodiment, endpoint machines (e.g., clients and servers) negotiate network characteristics through use of TCP header fields, which provide backward capability. Negotiations may be requested or initiated by either endpoint, and if the receiving endpoint is not capable of negotiating, the existing TCP connection will continue to operate as normal. | 05-14-2009 |
20090132939 | METHOD AND APPARATUS FOR A FLOATING ISLAND FOR USER NAVIGATION IN AN INTERACTIVE ENVIRONMENT - This invention provides a method for dynamically calculating and presenting a graphical user interface (GUI) within the display device in a computing system including a display device and an input device. The method includes creating a shared icon space within the GUI, automatically populating the shared icon space with GUI icons including stacking and clustering the GUI icons in the shared icon space based on current context, and potential user needs in view of the current user context and modifying the shared icon space in response to a detected change in current context. | 05-21-2009 |
20090150807 | METHOD AND APPARATUS FOR AN IN-CONTEXT AUTO-ARRANGABLE USER INTERFACE - A method for dynamically re-calculating and presenting a graphical user interface (GUI) that includes interface icons based on user context, includes, for a current user, determining a change in user context associated with the GUI. The method then modifies one of a state, appearance and spatial placement of the user interface icons within the GUI automatically, in accordance with a determined change in user context. The step of determining a change in user context may further include analyzing a set of contextual attributes associated with the user. For that matter, the step of determining is preferably automatically triggered by at least one factor from a group of factors, the group of factors including a) a creation date of a data item associated with the current user, b) a modification date of a data item associated with the current user, c) a last-accessed date of a data item associated with the current user, d) a type of a data item associated with the current user, e) a location of a data item associated with the current user, f) a category of a data item's content, the data item associated with the current user, g) a size of a data item, the data item associated with the current user, h) a source of a data item associated with the current user and i) a completeness of a data item associated with the current user. | 06-11-2009 |
20090177597 | SYSTEMS, METHODS AND COMPUTER PRODUCTS FOR PROFILE BASED IDENTITY VERIFICATION OVER THE INTERNET - Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a system including an activity classifier configured to receive Internet activity input including email, chat, browser and voice over Internet Protocol (VoIP) logs/streams, an email profiler, a chat, a browser profiler, a voice over Internet Protocol (VoIP) logs/streams profiler, wherein the profilers are configured to extract values from the Internet Activity input attributes from the data set, a score calculator configured to receive the attributes and calculate the score of the data set, a categorization engine configured to receive the score from the score calculator and map the data set to an individual or class of individuals based on the value of the score and on a database of activity-specific attributes and an application configured to place weights on the activity specific and generic attributes to define a score function from the score. | 07-09-2009 |
20090222561 | Method, Apparatus and Computer Program Product Implementing Session-Specific URLs and Resources - Methods, apparatus and computer program products implement session-specific URIs for allocating network resources by receiving a request from a user for at least one network resource; assigning a session-specific URI to the at least one network resource for use in identifying the at least one network resource and controlling access to the at least one network resource; updating a network directory service with the session-specific URI; and communicating the session-specific URI to the user. The user communicates the session-specific URI to other participants in the session during which the at least one network resource will be used. After a pre-determined time, the session ends and the at least one network resource is de-allocated by, for example, changing the URI of the at least one network resource. Frequent changes of URIs hinder efforts by unauthorized individuals to gain access to network resources. | 09-03-2009 |
20090222727 | Method, Apparatus and Computer Program Product for Capturing and Viewing Stored Web Resource Interactions - Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control. | 09-03-2009 |
20090249188 | METHOD FOR ADAPTIVE TRANSCRIPTION OF WEB PAGES - A web page is adaptively transcribed and rendered at a client endpoint. A request for a web page is received, and full page content of the web page is obtained from a remote web server, including assembly of previously cached parts of the web page. The web page is transcribed according to prescribed rules. The prescribed rules are selected according to user preferences, the environmental factors and information learned from prior handling of the web page. The transcribed web page is rendered. | 10-01-2009 |
20100005402 | System and Apparatus for Whispering in Group Chats - A method, system and program storage device are provided for allowing chat room participants to communicate with other participants privately without requiring general chat “friends” or “buddies” pre-authorization. All chatting dialog including private and public chats are consolidated into a unified group chat dialog window that requires no special handling by a user to see public and private chats. The private and public chat messages are displayed chronologically in a single chat message log within the chat group window. | 01-07-2010 |
20100082620 | METHOD FOR EXTRACTING SIGNATURE FROM PROBLEM RECORDS THROUGH UNSTRUCTURED AND STRUCTURED TEXT MAPPING, CLASSIFICATION AND RANKING - The structure attributes and unstructured attributes of a ticket are used to generate a problem signature. For structured attributes, correlation between field values is determined and fields with the highest weight are identified. For unstructured attributes, data mining techniques are applied to generate a plurality of keywords with a ranking for each ticket by identifying keywords, and commonly used acronyms and corpus variances. The set of structured attributes and the plurality of keywords from unstructured attributes form the signature of a given problem ticket. | 04-01-2010 |
20100100774 | AUTOMATIC SOFTWARE FAULT DIAGNOSIS BY EXPLOITING APPLICATION SIGNATURES - A method monitors non-faulty application traces of a computer application with the runtime environment during fault-free activities to create non-faulty runtime signatures for the computer application. Once obtained, the method stores the non-faulty runtime signatures. The method then detects a faulty application trace of the computer application and compares the faulty application trace with the non-faulty runtime signatures by comparing a call graph of the faulty application trace with call graphs of non-faulty application traces of the application signatures to identify differences between the two (e.g., fault attributes). Then the invention outputs the fault attributes to allow the user to identify a fault cause. | 04-22-2010 |
20110208823 | METHOD AND APPARATUS FOR IMPROVING DATA TRANSFERS IN PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests. | 08-25-2011 |
20110296021 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-01-2011 |
20120324116 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-20-2012 |