Patent application number | Description | Published |
20140139530 | SYSTEMS AND METHODS FOR USER VIEWABLE TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal. For example, the client can display a selected character string in its entirety or an excerpt of the truncated representation. The signal can be detected from a touchscreen or input device. This allows a user to view those portions of the selected character string that may be obscured by the truncation symbol. | 05-22-2014 |
20140143662 | Systems and Methods for User Modifiable Truncation - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol. | 05-22-2014 |
20140143663 | SYSTEMS AND METHODS FOR PROVIDING CONTEXTUAL BASED TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. A client can perform contextual based truncations of character strings using at least one truncation symbol when the characters strings extend beyond the width of an output display. The client can analyze the character strings for differences and similarities. The client can then generate the truncated representations of the character strings based on predetermined parameters for truncation. The truncated representations can include similar and different portions of the character strings that maintain descriptive information that differentiates them. | 05-22-2014 |
20140176562 | SYSTEMS AND METHODS FOR PROVIDING A SOFTWARE APPLICATION PRIVACY SCREEN - Systems and methods are provided for applying a localized software privacy screen over the display of specific applications, files, and/or other content on a computing device. In response to a user request, a computing device can open a window comprising a file or content in an associated application on its output display, determine whether a privacy screen should be applied to the user interface, and apply the privacy screen in a visual layer over the user interface if specified by the settings, rules, and/or permissions. The privacy screen can be user modifiable and can be made up of plurality of privacy lines that may be of any suitable orientation, thickness, spacing, and/or color and opaqueness that permits the user of the computing device to view the underlying window while preventing unauthorized onlookers from viewing the same. | 06-26-2014 |
20140188802 | PULL AND PASTE - Systems and methods are described for providing pull and paste functionalities. A computerized method of pulling and pasting data among computing devices includes determining attributes of a first computing device, transmitting the attributes of the first computing device to a second computing device, receiving a pulling request for copying information from the first computing device to the second computing device, wherein the information resides on the first computing device, automatically processing the pulling request at the first computing device and automatically generating a response to the pulling request, and automatically sending the response to the pulling request back to the second computing device, wherein the response contains the information. | 07-03-2014 |
20140195593 | SYSTEMS, METHODS AND MEDIA FOR MANAGING EMBEDDED CONTENT - A method, system and medium for managing embedded content in documents are provided. The method, e.g., includes detecting, at a host device running a host application program, a user's action to initiate editing of content embedded in a document associated with the host application program and querying for the user's content management configuration to determine a target device having an interface suitable for editing the embedded content. If it is determined that the user's configuration specifies a device other than the host device as the target device, the method further includes sending a revision notification to the target device, wherein the notification includes a copy of, or a reference to, the document and receiving an update notification from the target device, wherein the update notification includes one of a copy of or a reference to a latest version of the document including the latest edits made to the embedded content. | 07-10-2014 |
20140250069 | SYSTEMS AND METHODS FOR SELECTIVELY SYNCHRONIZING FILES - Systems and methods are provided for selectively synchronizing files. Data is received from a remote storage device indicative of a set of files stored on the remote storage device. A first file from the set of files is downloaded, but not a second file from the set of files. Both (a) the first file and (b) data indicative of the second file are stored in a database. A list of files stored in the database is displayed, the list including the first file and the second file. | 09-04-2014 |
20140258875 | SYSTEMS, METHODS AND MEDIA FOR PROVIDING HISTORICAL NAVIGATION CONTROLS FOR A MOBILE DEVICE USER - Systems, methods and media for providing multi-dimensional historical navigation controls are provided. One method includes recording, at a mobile device, a first navigation path associated with a data item accessed by a user using the mobile device and enabling a plurality of elements in the first navigation path by generating a plurality of active controls each corresponding to one of the plurality of elements. The method also includes displaying a UI control including the first navigation path that is presented using the enabled elements. The method further includes detecting a selection of one of the enabled elements of the first navigation path when the user selects the active control corresponding to the selected one of the enabled elements and navigating to the site associated with the selected one of the enabled elements by jumping to the site from a first site associated with any other one of the enabled elements. | 09-11-2014 |
20140279873 | SYSTEM AND METHOD FOR OPTIMIZING FILE STORAGE ON A COMPANY COMPUTER AND A USER COMPUTER - Embodiments of the invention include a system, computer program product and computer-implemented method for synchronizing data files on a company computer and performing a process of determining whether a data file should be synchronized with the computer and a process of synchronizing the data file. These process may include the steps of receiving a request for the data file from a user computer; determining whether the data file is located in the computer memory; determining whether the file is stored in a remote computer memory; requesting the data file from the remote computer; and determining a rank for the data file retrieved from the remote computer based whether the data file is associated with a plurality of users accessing the computer. | 09-18-2014 |
20140281875 | MULTI-USER LAYER ANNOTATION - Techniques are disclosed for providing collaborative annotation of documents. In one embodiment, a computerized method is disclosed for providing collaborative annotation of documents that can include receiving, at a first computer, a first annotation from a first user for an original file; storing the first annotation to a first layer file; uploading the first layer file to a cloud storage server; receiving, at the first computer from the cloud storage server, a second layer file created by a second user; retrieving a second annotation from the second layer file; and concurrently displaying the original file together with the first annotation and the second annotation by overlaying the first annotation and the second annotation over the original file. | 09-18-2014 |
20140282820 | SECURE DATA MANAGEMENT - The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface. | 09-18-2014 |
20140283107 | SECURE DATA MANAGEMENT - The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone. | 09-18-2014 |
20140337495 | WEB EVENT FRAMEWORK - Systems and methods are described for a web event framework. A computerized method includes receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin. | 11-13-2014 |