Patent application number | Description | Published |
20120182437 | GENERATING STILL IMAGES AND VIDEO BY CAPTURE OF IMAGES PROJECTED BY LIGHT PASSING THROUGH A DISPLAY SCREEN - Methods and systems for generating still images and video by capture of images projected by light passing through a display screen are disclosed. According to an aspect, a method includes controlling light emitting components of a display screen to activate in a sequence for displaying a sequence of images. For example, in an organic light emitting diode (OLED) display screen, the method may include controlling a subset of the display screen OLEDs to activate in sequence to display a sequence of images. The displayed sequence of images may appear to a viewer of the display screen to be a still image or a video. The method may control light emitting components different subsets of the LEDs to be activated in the sequence, such that different areas of the display screen display images in each part of the sequence. | 07-19-2012 |
20120205433 | COMMUNICATION OF TRANSACTION DATA WITHIN A SELF-CHECKOUT ENVIRONMENT - Systems and method for communication of transaction data within a self-checkout environment are disclosed. According to an aspect, a method includes controlling a display device to display a machine-readable representation of transaction data. The method may include receiving a signal that indicates acknowledgement of reading of the machine-readable representation of the transaction data. Further, the method may include controlling the display device to display a machine-readable representation of other transaction data in response to receipt of the signal. | 08-16-2012 |
20120272301 | CONTROLLED USER ACCOUNT ACCESS WITH AUTOMATICALLY REVOCABLE TEMPORARY PASSWORD - Systems and computer-implemented methods are disclosed for providing controller access to a normally single-user account. In an example system, a primary user is provided with a primary password to the user account. A secondary user may be temporarily authorized by generating a temporary password selected independently of the primary password. The user account may be accessed by entering either the primary password or the temporary password. The temporary password is automatically revoked in response to granting access with the primary password. The secondary user is thereby provided with temporary access to the user account that is revocable by the primary user at any time without having to share the primary password with the secondary user and without having to change the primary password. | 10-25-2012 |
20120284383 | CLOUD WORKLOAD MANAGEMENT WITH AUTOMATED WORKLOAD BIDDING - A computer program product is provided for managing workload in a computer system. Computer usable program code cause a first compute node to broadcast a workload bid request to a plurality of compute nodes, wherein the workload bid request includes workload parameters. The compute nodes each receive the request from the first compute node, and each compute node uses the workload parameters to calculate a cost of running the workload. One or more individual compute nodes within the plurality of compute nodes send a workload bid to the first compute node, wherein each workload bid includes the cost of running the workload on the individual compute node sending the workload bid. The first compute node receives and uses each workload bid to select a target compute node to run the workload, wherein the target compute node is selected from the individual compute nodes and the first compute node. | 11-08-2012 |
20120284410 | CLOUD WORKLOAD MANAGEMENT WITH AUTOMATED WORKLOAD BIDDING - A computer-implemented method for workload management in a computer system is provided. According to the method, a first compute node broadcasts a workload bid request to a plurality of compute nodes, wherein the workload bid request includes workload parameters characterizing the workload. The plurality of compute nodes each receive the workload bid request from the first compute node, and each of the plurality of compute nodes uses the workload parameters included in the workload bid request to calculate a cost of running the workload. One or more individual compute nodes within the plurality of compute nodes each send a workload bid to the first compute node, wherein each workload bid includes the cost of running the workload on the individual compute node sending the workload bid. The first compute node receives each workload bid and selects a target compute node to run the workload. | 11-08-2012 |
20120319814 | OPENING MANAGEMENT THROUGH GAIT DETECTION - Embodiments of the present invention provide a method, system and computer program product for managing an opening through gait recognition. In an embodiment of the invention, a method for managing an opening through gait recognition is provided. The method includes capturing imagery, for example through the use of a Web cam, of a moving object as the moving object approaches an automated door. The method additionally, includes determining from the captured imagery a presence or absence of a gait of the moving object. Finally, the method includes managing an automated opening of the door according to the determined presence or absence of a gait of the moving object. | 12-20-2012 |
20120321136 | OPENING MANAGEMENT THROUGH GAIT DETECTION - Embodiments of the present invention provide a method, system and computer program product for managing an opening through gait recognition. In an embodiment of the invention, a method for managing an opening through gait recognition is provided. The method includes capturing imagery, for example through the use of a Web cam, of a moving object as the moving object approaches an automated door. The method additionally, includes determining from the captured imagery a presence or absence of a gait of the moving object. Finally, the method includes managing an automated opening of the door according to the determined presence or absence of a gait of the moving object. | 12-20-2012 |
20120331130 | Selecting A Network Connection For Data Communications With A Networked Device - Selecting a network connection for data communications with a networked device, including: identifying a plurality of networks available for data communications with the networked device, each network having network connection attributes; and selecting one of the plurality of networks in dependence upon the network connection attributes and the direction of data transfer. | 12-27-2012 |
20120331157 | Selecting A Network Connection For Data Communications With A Networked Device - Selecting a network connection for data communications with a networked device, including: identifying a plurality of networks available for data communications with the networked device, each network having network connection attributes; and selecting one of the plurality of networks in dependence upon the network connection attributes and the direction of data transfer. | 12-27-2012 |
20130009758 | Tactile Visual Indicator - A tactile visual indicator and methods, apparatuses, and computer program products for controlling a tactile visual indicator are provided. Embodiments include a light source; an electromagnetically inductive wound coil; and a light pipe coupled to a ferromagnetic-metal jacket surrounding the outside of the light pipe. The ferromagnetic-metal jacket is within the wound coil and one end of the light pipe is provided to the light source. The light pipe and the ferromagnetic-metal jacket are configured to move within the wound coil in response to the coil receiving power. Light shining through the light pipe from the light source provides a visual indication of a status and the movement of the light pipe and jacket within the wound coil provides a tactile indication of the status via contact with a user. | 01-10-2013 |
20130016917 | Image CompressionAANM Rodriguez; Adrian X.AACI DurhamAAST NCAACO USAAGP Rodriguez; Adrian X. Durham NC USAANM Woods; EricAACI DurhamAAST NCAACO USAAGP Woods; Eric Durham NC US - Methods, apparatuses, and computer program products for image compression are provided. Embodiments include: examining, by an image controller, contextual data of a plurality of uncompressed images; selecting from the plurality of uncompressed images, by the image controller, a group of uncompressed images that have related contextual data; designating, by the image controller, one of the selected images to be a reference image; creating, by the image controller, delta images, each delta image representing differences between the reference image and one of the uncompressed images; and compressing and storing, by the image controller, the reference image and each of the delta images. | 01-17-2013 |
20130036131 | File Object Browsing and Searching Across Different Domains - A desired object stored on a computer system is retrieved by retrieving one or more objects based on an object attribute to produce initial search results, selecting an object from the initial search results, where the selected object is associated with one or more other attributes, and retrieving one or more additional objects based on one or more of the other attributes of the selected object to expand the initial search results and provide the desired object. The objects are linked to one or more tree structures each associated with an object attribute, such that the retrieving one or more additional objects includes traversing the tree structures linked to the selected object and associated with the one or more other attributes to identify the one or more additional objects. | 02-07-2013 |
20130054839 | Synchronizing Time Across A Plurality Of Devices Connected To A Network - Methods, apparatuses, and computer program products for synchronizing time across a plurality of devices connected to a network are provided. Embodiments include detecting, by a particular device, a synchronization initiation event; in response to detecting the synchronization initiation event, broadcasting, by the particular device to each device of the plurality of devices, a synchronization request; receiving, by the particular device, a plurality of time acknowledgments from the plurality of devices, each time acknowledgement indicating a current time of a device and a device initialization time indicating a time that the device last set the current time of the device; selecting, from the plurality of time acknowledgements the time acknowledgement with the shortest duration between an indicated device initialization time and an indicated current time of a device; and setting a current time of the particular device based on the current time indicated in the selected time acknowledgment. | 02-28-2013 |
20130055206 | Synchronously Debugging A Software Program Using A Plurality Of Virtual Machines - Methods, apparatuses, and computer program products for synchronously debugging a software program using a plurality of virtual machines are provided. Embodiments include controlling, by a master debugging module operating on a first virtual machine, execution of the software program within the first virtual machine; controlling, by a slave debugging module operating on a second virtual machine, execution of the software program within the second virtual machine including delaying execution of the software program within the second virtual machine relative to the execution of the software program within the first virtual machine; detecting, by the master debugging module, an error in the execution of the software program within the first virtual machine; and in response to the detection of the error, capturing, by a hypervisor, a snapshot of the second virtual machine. | 02-28-2013 |
20130066889 | Obscuring Search Results to Increase Traffic to Network Sites - According to an embodiment of the present invention, a system alters search results to increase traffic at network sites, and comprises a computer system including at least one processor. The system processes a search query including an inquiry to determine corresponding search results and an answer to the inquiry, wherein the search results include one or more network sites and a corresponding description of content. The search results are filtered to remove from view the answer from the description of content for the network sites. The filtered search results are displayed to enable access of the network site having a corresponding description of content indicating the network site contains the answer. Alternatively, the answer is highlighted for readily viewing by the user. Embodiments of the present invention further include a method and computer program product for altering search results in substantially the same manners described above. | 03-14-2013 |
20130080669 | Dynamically Determining A Primary Or Slave Assignment Based On An Order Of Cable Connection Between Two Devices - Methods, apparatuses, and computer program products for dynamically determining a primary or slave assignment based on an order of cable connection between two devices are provided. Embodiments include detecting, by a first device, insertion of one end of a cable into a port of the first device; determining, by the first device, whether a power signal is received from the cable at the port of the first device; if the power signal is received, performing, by the first device, a data transfer operation over the cable as a slave device to a second device that is coupled to the other end of the cable; and if the power signal is not received, performing, by the first device, a data transfer operation over the cable as a primary device to the second device that is coupled to the other end of the cable. | 03-28-2013 |
20130080953 | MULTI-AREA WIDGET MINIMIZING - A method for multi-area widget minimization, including: detecting a user selection action at a predetermined area within a widget in a user interface, wherein the widget includes a plurality of minimization policies that each correspond to a different predetermined area within the widget, wherein the user interface is displayed on a display device; selecting a policy corresponding to the predetermined area in which the user selection action is detected; and minimizing the widget in a manner determined by the policy for the predetermined area in which the user selection action is detected. | 03-28-2013 |
20130103788 | Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation. | 04-25-2013 |
20130104248 | Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation. | 04-25-2013 |
20130111495 | Load Balancing Servers | 05-02-2013 |
20130117206 | DYNAMIC TRAINING AND TAGGING OF COMPUTER CODE - System, method, device and article of manufacture are provided wherein software code is sorted between optional pools using attributes of software in the target pools. Training for subsequent sorts can take place when attributes of already sorted code is considered and used when sorting previously unclassified code. Manual intervention may also be used to sort code and to verify the accuracy of previous sorts. | 05-09-2013 |
20130147970 | Camera Based Information Exchange Mechanism - Mechanisms, in a portable computing device comprising a camera, for exchanging information between a user and a provider are provided. With these mechanisms, an image is captured using the camera of the portable computing device and an identifier of a physical object associated with the captured image is determined. The portable computing device transmits the identifier of the physical object, and user information describing a user of the portable computing device, to a separate computing device associated with a provider of the physical object. The portable computing device receives information associated with the physical object from the separate computing device associated with the provider of the physical object. A storage device of the portable computing device stores the physical object information in association with at least one of the captured image or the identifier of the physical object. | 06-13-2013 |
20130159111 | CUSTOMIZING BROWSING CONTENT BASED ON USER DATA INFERRED FROM TARGETED ADVERTISEMENTS - A system comprising a web server containing website content, where the web server is configured for receiving requests from IP addresses for the website content and delivering the requested website content from the web server to the requesting IP address. The system further comprises an inspector tool that is configured for inspecting an advertising feed targeted to a first IP address and inferring user data from the advertising feed, and also a supplemental content generator configured for generating supplemental content according to the user data inferred from the advertising feed and providing the supplemental content to the first IP address. | 06-20-2013 |
20130159114 | CUSTOMIZING BROWSING CONTENT BASED ON USER DATA INFERRED FROM TARGETED ADVERTISEMENTS - Methods are provided for inferring user data based on a third-party advertising feed provided to a user while browsing a website hosted by a web server. One method includes receiving, at a web server, a request from a first user at a first IP address for content hosted on the web server, and delivering the requested content from the web server to the first IP address. An advertising feed targeted to the first IP address is inspected and user data from the advertising feed is inferred. The method then generates supplemental content according to the user data inferred from the advertising feed, and provides the supplemental content to the first IP address. | 06-20-2013 |
20130162241 | DETECTING MALICIOUS HARDWARE BY MEASURING RADIO FREQUENCY EMISSIONS - A method of testing an electronic device comprises measuring radio frequency emissions at a plurality of positions relative to a trusted unit of a particular electronic device during operation of the trusted unit, and measuring radio frequency emissions at the same plurality of positions relative to a second unit of the particular electronic device. For each of the plurality of positions, the radio frequency emissions measured from the second unit are compared to the radio frequency emissions measured from the trusted unit. The method then determines whether there is any frequency at which the measured amplitude of the radio frequency emissions from the second unit and the measured amplitude of the radio frequency emissions from the trusted unit exhibit a statistically significant difference. | 06-27-2013 |
20130167062 | TOUCHSCREEN GESTURES FOR SELECTING A GRAPHICAL OBJECT - A two-finger selection method is implemented on a touchscreen of an electronic device. One embodiment involves sensing the touch positions of two fingers on the touchscreen. In response to sensing the two simultaneous touch positions, a selection graphic is displayed and dynamically positioned on the touchscreen as a function of the two touch positions. A specific graphical object, such as a command button having an associated function, is selected in response to a separate selection input received while the selection graphic is positioned on the specific graphical object. | 06-27-2013 |
20130185807 | End User License Agreement Detection and Monitoring - An approach is provided for detecting and monitoring end user license agreement (EULA) compliance is provided. A request to access a executable software code is received from an end user. A EULA version corresponding to the requested executable software code is identified. A determination is made as to whether the end user has accepted the identified EULA. If the end user has not accepted the identified EULA, then an out of date EULA notification is sent to the end user, the EULA is sent to the end user requesting an acceptance to the EULA. A EULA response is received from the end user. If the end user accepts the EULA, then the end user is allowed access to the executable software code. | 07-18-2013 |
20130253757 | Maintaining A Dynamic Service Registry For A Self-Diagnosing Device - Maintaining a dynamic service registry for a self-diagnosing device, including: detecting, by the self-diagnosing device, a fault condition, wherein the fault condition indicates that the self-diagnosing device needs to be serviced; detecting, by the self-diagnosing device, that the fault condition has been resolved; determining, by the self-diagnosing device, the geographic location of the self-diagnosing device upon detecting that the fault condition was resolved; and entering, by the self-diagnosing device, the fault condition and the geographic location of the self-diagnosing device when the fault condition was resolved into the dynamic service registry. | 09-26-2013 |
20130268827 | ENSURING USER INTERFACE SPECIFICATION ACCURATELY DESCRIBES USER INTERFACE AFTER UPDATES TO USER INTERFACE - A method, system and computer program product for ensuring a user interface specification accurately describes its corresponding user interface. The system links sections of the user interface code with corresponding user interface objects. Furthermore, the system links these sections of the user interface code with corresponding sections of the user interface specification. Upon detecting a modification to the user interface code which reflects an update to the user interface, the system notifies the user that the user interface specification needs to be updated. By linking the user interface objects to the user interface code and linking the user interface code to the corresponding sections of the user interface specification, appropriate modifications to the user interface specification can be recommended or implemented based on the modifications to the corresponding sections of the user interface code, which reflect the changes to the corresponding objects on the user interface. | 10-10-2013 |
20130275408 | Presenting Unique Search Result Contexts - Presenting unique search result contexts, including: receiving, by a search result presentation module, a plurality of search results generated in response to a search query, wherein each search result includes context information associated with the search result; identifying, by the search result presentation module for each search result, a displayable portion of the context information associated with the search result; determining, by the search result presentation module for each search result, whether the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result; and responsive to determining that the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result, updating, by the search result presentation module, the displayable portion of the context information for the search result. | 10-17-2013 |
20140025465 | Tracking Pre-Purchase/Post-Purchase Shopping Activity - A mechanism is provided for tracking and facilitating pre-shopping/post-purchase activity. An indication is received that a user has completed a task in a set of tasks of a quest, where the quest is a pre-purchase/post-purchase shopping activity quest. Verification is made as to whether the task has been completed. Responsive to verifying the task has been completed, a determination is made as to whether all of the set of tasks of the quest have been completed. Responsive to all of the set of tasks being completed, a presentation is initiated of an agreed-upon reward to the user. All information from quest is then submitted to a sponsor of the quest. | 01-23-2014 |
20140046932 | PRESENTING UNIQUE SEARCH RESULT CONTEXTS - Presenting unique search result contexts, including: receiving, by a search result presentation module, a plurality of search results generated in response to a search query, wherein each search result includes context information associated with the search result; identifying, by the search result presentation module for each search result, a displayable portion of the context information associated with the search result; determining, by the search result presentation module for each search result, whether the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result; and responsive to determining that the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result, updating, by the search result presentation module, the displayable portion of the context information for the search result. | 02-13-2014 |
20140050370 | OCULAR BIOMETRIC AUTHENTICATION WITH SYSTEM VERIFICATION - A biometric authentication system includes an image database and a user database containing user profiles. Each user profile is associated with a selected image in the image database as an image key and with an ocular biometric data record obtained from an eye of the associated user. A user input terminal receives asserted user credentials, an eye scanning module obtains ocular biometric data, and a position detection module detects an eye position or eyelid position. An access control module communicates with the user database for obtaining a user profile associated with the asserted user credentials, communicates with a display device for displaying the image key associated with the obtained user profile, communicates with the position detection module for verifying the biometric authentication system by detecting whether the user is viewing the image key, and communicates with the eye scanning module for obtaining ocular biometric data and authenticating the user. | 02-20-2014 |
20140050371 | OCULAR BIOMETRIC AUTHENTICATION WITH SYSTEM VERIFICATION - A biometric user authentication method and computer program product includes receiving asserted user credentials from a user into a biometric authentication system, and obtaining a digitally-stored image key and ocular biometric data both associated with the asserted user credentials from memory within the biometric authentication system. The biometric authentication system is verified by simultaneously displaying the image key and at least one image other than the image key to the user and detecting that the user has selected the image key. The user is authenticated by scanning an eye of the user to obtain ocular biometric data and matching the scanned ocular biometric data to the digitally stored ocular biometric data. If the biometric system is verified and the user is authenticated, then the user is provided access to a protected area. | 02-20-2014 |
20140059420 | APPENDING A UNIFORM RESOURCE IDENTIFIER (URI) FRAGMENT IDENTIFIER TO A UNIFORM RESOURCE LOCATOR (URL) - Embodiments of the present invention disclose a method, computer program product, and system for dynamically appending a Uniform Resource Identifier (URI) fragment identifier to a Uniform Resource Locator (URL). A web browser on a client device is displaying a webpage, and is accessing the HyperText Markup Language (HTML) coding for the webpage. HTML identification attributes are detected for the content that is being rendered within the web browser. A URI fragment identifier corresponding to the HTML identification attribute that is being rendered at the top of the web browser window is determined and is appended to the end of the URL of the webpage that is displayed in the URL box of the web browser. In an embodiment, the detection of the content that is being rendered at the top of the web browser window occurs responsive to a command to scroll to a new section of the webpage. | 02-27-2014 |
20140074927 | CACHING CONTENT BASED ON SOCIAL NETWORK RELATIONS - Various embodiments provide for use of social networking postings to predict (e.g., where and when) caching of content (e.g., social network related content) would be beneficial (e.g., to speed access). In one example, the caching may be performed by one or more Internet Service Providers (ISPs), one or more content providers and/or one or more content distributors. In one specific example, one or more Internet Service Providers (ISPs), one or more content providers and/or one or more content distributors may be local ISPs. | 03-13-2014 |
20140086563 | ACCESSING AND STORING ORIGINAL BROADCAST CONTENT - In a method for accessing and storing original content without an overlay of interruption content, a computer receives original content with an overlay of interruption content during an interruption period from a content provider. The computer receives a notification that the interruption period is complete. The computer accesses original content without the overlay of interruption content. The computer stores the original content without the overlay of interruption content. | 03-27-2014 |
20140101422 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101428 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101430 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140101431 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140108774 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140108779 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140109220 | TRUST RETENTION - A method, system and computer program product for retaining trust. A computer receives a correct password for administrative access. The computer sets a trust to a maximum level. The computer detects at least one period of inactivity. The computer adjusts a trust based on the at least one period of inactivity. The computer receives a request to access an privileged function. The computer, responsive to receiving the request, determines that the trust is below a trust threshold. The computer, responsive to determining that the trust is below the trust threshold, challenges the user to authenticate. The computer receives a authentication attempt. The computer determines whether the authentication attempt is correct. The computer, responsive to a determination that the authentication attempt is correct, grants access to the administrative function. | 04-17-2014 |
20140123164 | MANAGING DISPLAY OF CONTENT IN A CONTENT FEED - A method includes generating a content feed, wherein the content feed includes a dynamically-generated set of content items electronically fed to one or more device for selectively displaying on the one or more device. A priority content item and a plurality of related content items in the content feed are identified, wherein the plurality of related content items include subject matter that is common with the priority content item. A display status of the priority content item is monitored indicating whether the priority content item has been displayed for a user. The visibility of the related content items on the one or more device is then controlled according to the display status of the priority content item. | 05-01-2014 |
20140129231 | AUTHENTICATION BASED ON SOUND PROXIMITY - A computer program product comprises computer usable program code for receiving data describing a proposed electronic transaction between first and second communications devices. Additional computer usable program code is provided for generating a first audio signal by sound detected by a first microphone of the first communications device, and for generating a second audio signal by sound detected by a second microphone that is part of the second communications device. Still further computer usable program code provides for authenticating that the first communications device and the second communications device are in the same proximity in response to determining that the first and second audio signals were produced by the same sound event, and for completing the proposed electronic transaction between the first and second communications device in response to authenticating that the first and second communications devices are in close proximity. | 05-08-2014 |
20140137221 | IMAGE META DATA DRIVEN DEVICE AUTHENTICATION - Embodiments of the present invention address deficiencies of the art in respect to image based authentication and provide a novel and non-obvious method, system and computer program product for image meta data driven device authentication. In an embodiment of the invention, a method for image meta data driven device authentication is provided. The method includes acquiring an image in a computing device on behalf of an end user and generating a set of keywords describing the image in image recognition logic coupled to the computing device. The method additionally includes comparing the set of keywords describing the image to keywords in a keyword list stored in connection with the end user. Finally, the method includes authenticating the end user if a threshold number of keywords in the set match keywords in the keyword list, but otherwise denying the end user access to the computing device. | 05-15-2014 |
20140157037 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer program product includes computer usable program code for: detecting a stability change in a computer system; identifying a first set of at least one capability of the computer system that is affected by the stability change; identifying, in response to detecting the stability change, a software application that was installed or updated prior to the stability change; identifying a second set of at least one capability that is utilized by the identified software application; comparing the first set to the second set to determine a degree of similarity; comparing a first time that the stability change was detected to a second time that the identified software application was installed or updated to determine a temporal proximity; and identifying the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157040 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a computer system, and identifies a first set of at least one capability of the computer system that is affected by the stability change. In response to detecting the stability change, the method identifies a software application that was installed prior to the stability change, and identifies a second set of at least one capability of the computer system that is utilized by the identified software application. The method compares the first and second capability sets to determine a degree of similarity, and compares the time that the stability change was detected to the time that the identified software application was installed to determine a temporal proximity. The method then identifies the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157056 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer program product including computer usable program code embodied on a tangible computer usable storage medium, includes: computer usable program code for detecting a stability change in a first computer system; computer usable program code for comparing a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems in communication with a management module; computer usable program code for identifying a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application; and computer usable program code for identifying the given software application as the cause of the stability change in the first computer system. | 06-05-2014 |
20140157058 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a first computer system, and compares a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems. The method then identifies a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application. The given software application is then identified as the cause of the stability change in the first computer system. The computer systems are preferably virtual machines being managed by a management module, such as a provisioning manager. The method may be used to detect both increases in stability and instability. | 06-05-2014 |
20140157096 | SELECTING VIDEO THUMBNAIL BASED ON SURROUNDING CONTEXT - Some embodiments of the inventive subject matter include a computer program product for determining a thumbnail image for a video. The computer program product can include computer usable program code configured to analyze the video. The computer usable program code can be further configured to determine video themes based on the analyzing the video. The computer usable program code can be further configured to produce a first group of thumbnail images for the video themes. The computer usable program code can be further configured to determine a forum theme for an electronic forum in which the video will be accessible. The computer usable program code can be further configured to choose, from the first group of thumbnail images, a matching thumbnail image that is thematically consistent with the forum theme. The computer usable program code can be further configured to present the matching thumbnail image in the forum. | 06-05-2014 |
20140157097 | SELECTING VIDEO THUMBNAIL BASED ON SURROUNDING CONTEXT - Some embodiments of the inventive subject matter include a method for embedding, in a website, a video and a thumbnail image associated with the video. The method can include requesting, over a network, the video from a video source. The method can include transmitting, to the video source, theme information indicating a theme of the website. The method can include receiving the video and the thumbnail image, wherein the thumbnail image is thematically consistent with the theme of the website. The method can include embedding the video in the website. The method can include presenting the thumbnail image in association with the video. | 06-05-2014 |
20140157348 | AUTOMATIC TRANSMISSION CONTENT SELECTION - A processor-implemented method, system, and/or computer program product automatically selects broadcast content at a broadcast receiver. A first broadcast content on a first channel of a broadcast receiver is received and presented aurally and/or visually. A second broadcast content on a second channel of the broadcast receiver is evaluated to determine if it is rated higher than the first broadcast content. A determination is also made as to whether the first broadcast content can be interrupted by the second broadcast content. If the second broadcast content has a higher rating than the first broadcast content, and if it is deemed permissible to interrupt the first broadcast content, then the broadcast receiver automatically switches to the second channel. | 06-05-2014 |
20140172413 | SHORT PHRASE LANGUAGE IDENTIFICATION - A computer receives a short phrase. The short phrase is transmitted in a query to a search engine. The computer receives one or more search results from the search engine in response to the query, and parses one or more longer phrases that include the short phrase from each of the one or more search results. The computer transmits the one or more longer phrases to a language identification engine for identification of the language of the one or more longer phrases, and receives from the language identification engine the language of each of the one or more the longer phrases. The computer then determines the most likely language of the short phrase, based at least in part on the language of each of the one or more the longer phrases. | 06-19-2014 |
20140173329 | CASCADING FAILOVER OF BLADE SERVERS IN A DATA CENTER - Cascading failover of blade servers in a data center implemented by transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring by the system management server the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server. | 06-19-2014 |
20140173332 | Cascading Failover Of Blade Servers In A Data Center - Cascading failover of blade servers in a data center implemented by transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring by the system management server the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server. | 06-19-2014 |
20140173336 | CASCADING FAILOVER OF BLADE SERVERS IN A DATA CENTER - Cascading failover of blade servers in a data center that includes transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server, including transferring the workload to the subsequent replacement blade server only if the data processing cost of the transfer of the workload to the subsequent replacement blade is less than the value of a transfer cost threshold. | 06-19-2014 |
20140278745 | SYSTEMS AND METHODS FOR PROVIDING RETAIL PROCESS ANALYTICS INFORMATION BASED ON PHYSIOLOGICAL INDICATOR DATA - Systems and methods for providing retail process analytics information based on physiological indicator data are disclosed herein. According to an aspect, a method may include using a processor and memory for receiving physiological indicator data associated with a person. The processor and memory may also be used for determining a retail environment condition at a time associated with the physiological indicator data. Further, the processor and memory may be used for generating retail process analytics information for user presentation based on the physiological indicator data and the retail environment condition. | 09-18-2014 |
20140283025 | SYSTEMS AND METHODS FOR MONITORING ACTIVITY WITHIN RETAIL ENVIRONMENTS USING NETWORK AUDIT TOKENS - Systems and methods for monitoring activity within retail environments using network audit tokens are disclosed herein. According to an aspect, a method may include using a processor and memory of a first computing device for determining information associated with an activity of the first computing device within a network environment. The method also includes receiving a network audit token from a second computing device within the retail environment. Further, the method includes communicating the information associated with the activity to a third computing device in response to receipt of the network audit token. | 09-18-2014 |
20140363046 | PRIORITIZATION OF FACIAL RECOGNITION MATCHES BASED ON LIKELY ROUTE - Prioritizing facial recognition matches includes obtaining identification information and a facial image for each visitor entering the monitored environment, the monitored environment having a plurality of cameras at known locations including entry and exit points; obtaining itineraries of the visitors. Itineraries of the visitors are obtained, and based on the entry points and the itineraries of the visitors, likely routes of the visitors are determined through the monitored environment. Responsive to receiving an image captured by a first camera at a first location at an image capture time, the database records are sorted for facial recognition matching with the image from the first camera based on the visitors who routes are likely to place the visitors in proximity to the first camera at the time of image capture. | 12-11-2014 |
20150039536 | Clarification of Submitted Questions in a Question and Answer System - Mechanisms for clarifying an input question are provided. A question is received for generation of an answer. A set of candidate answers is generated based on an analysis of a corpus of information. Each candidate answer has an evidence passage supporting the candidate answer. Based on the set of candidate answers, a determination is made as to whether clarification of the question is required. In response to a determination that clarification of the question is required, a request is sent for user input to clarify the question. User input is received from the computing device in response to the request and at least one candidate answer in the set of candidate answers is selected as an answer for the question based on the user input. | 02-05-2015 |
20150058329 | Clarification of Submitted Questions in a Question and Answer System - Mechanisms for clarifying an input question are provided. A question is received for generation of an answer. A set of candidate answers is generated based on an analysis of a corpus of information. Each candidate answer has an evidence passage supporting the candidate answer. Based on the set of candidate answers, a determination is made as to whether clarification of the question is required. In response to a determination that clarification of the question is required, a request is sent for user input to clarify the question. User input is received from the computing device in response to the request and at least one candidate answer in the set of candidate answers is selected as an answer for the question based on the user input. | 02-26-2015 |
20150065172 | GEOGRAPHIC AREA AND CATEGORY SPECIFIC CONTENT SHARING BETWEEN MOBILE DEVICES - A method, system, and/or computer program product automatically shares content between mobile devices. Permissible geographic areas for sharing digital content from a user's mobile device are received, where the digital content is from a user-approved category of digital content. A determination is made as to whether an authorized mobile receiving device is within a specific permitted geographic area from the permissible geographic areas. In response to determining that the authorized mobile receiving device is within the specific permitted geographic area, the digital content is automatically shared between the user's mobile device and the authorized mobile receiving device. | 03-05-2015 |
20150113516 | ASSIGNING SEVERITY TO A SOFTWARE UPDATE - Assigning severity to a software update, including: receiving, by an update manager, version information for a software application from a computing system, the version information describing a version of the software application installed on the computing system; determining, by the update manager, a severity level of one or more available updates for the software application in dependence upon the version information and update version information; and providing, by the update manager to the computing system, the severity level for each of the one or more available updates. | 04-23-2015 |
20150113517 | Assigning Severity To A Software Update - Assigning severity to a software update, including: receiving, by an update manager, version information for a software application from a computing system, the version information describing a version of the software application installed on the computing system; determining, by the update manager, a severity level of one or more available updates for the software application in dependence upon the version information and update version information; and providing, by the update manager to the computing system, the severity level for each of the one or more available updates | 04-23-2015 |
20150135089 | ADJUSTMENT OF USER INTERFACE ELEMENTS BASED ON USER ACCURACY AND CONTENT CONSUMPTION - Systems and methods for adjusting user interface elements based on user accuracy and content consumption are disclosed. According to an aspect, a method includes receiving user input for interacting with one or more elements presented by a user interface. The method also includes determining an estimate of user accuracy for correctly selecting the one or more elements. Further, the method includes determining a rate of consumption of content presented by the user interface. The method also includes adjusting one of a position and size of at least one of the elements based on the estimate of user accuracy and the rate of consumption of content. | 05-14-2015 |
20150143158 | Failover In A Data Center That Includes A Multi-Density Server - Failover in a data center that includes a multi-density server, where the multi-density server includes multiple independent servers, includes; detecting, by a management module, a failure of one of the independent servers of the multi-density server; identifying, by the management module, a failover target; determining, by the management module, whether the failover target is a non-failed independent server included in the multi-density server; and responsive to determining that the failover target is a non-failed independent server included in the multi-density server, migrating, by the management module, the failed independent server's workload to another server that is not included in the multi-density server. | 05-21-2015 |
20150143159 | FAILOVER IN A DATA CENTER THAT INCLUDES A MULTI-DENSITY SERVER - Failover in a data center that includes a multi-density server, where the multi-density server includes multiple independent servers, includes; detecting, by a management module, a failure of one of the independent servers of the multi-density server; identifying, by the management module, a failover target; determining, by the management module, whether the failover target is a non-failed independent server included in the multi-density server; and responsive to determining that the failover target is a non-failed independent server included in the multi-density server, migrating, by the management module, the failed independent server's workload to another server that is not included in the multi-density server. | 05-21-2015 |
20150161495 | GENERATING A HYBRID QUICK RESPONSE (QR) CODE - An apparatus supporting hybrid quick response (QR) codes may include: a computer chassis; a dynamic display on the exterior of the computer chassis, the dynamic display configured to render dynamic QR code portions; and a static display that includes static QR code portions, where the static display is adapted to the chassis such that the static QR code portions and dynamic QR code portions rendered by the dynamic display comprise a single, hybrid scannable QR code. | 06-11-2015 |
20150161496 | GENERATING A HYBRID QUICK RESPONSE (QR) CODE - An apparatus supporting hybrid quick response (QR) codes may include: a computer chassis; a dynamic display on the exterior of the computer chassis, the dynamic display configured to render dynamic QR code portions; and a static display that includes static QR code portions, where the static display is adapted to the chassis such that the static QR code portions and dynamic QR code portions rendered by the dynamic display comprise a single, hybrid scannable QR code. | 06-11-2015 |
20150163067 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 06-11-2015 |
20150163068 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 06-11-2015 |
20150163356 | TIME STAMPING ENTRIES IN AN ADDRESS BOOK OF A MOBILE COMMUNICATIONS DEVICE - Administering text message communications, including: maintaining, by a service provider, an account age for a plurality of phone numbers; receiving, by the service provider from a mobile communications device, a text message intended to be delivered to a target device associated with a phone number, the text message including metadata describing an address book age of the phone number in an address book of the mobile communications device; determining, by the service provider, whether the address book age of the phone number is older than an account age of the phone number; and responsive to determining that the address book age information of the phone number is older than the account age of the phone number, performing, by the service provider, one or more message administration actions. | 06-11-2015 |
20150193074 | SYSTEM AND METHOD FOR ALTERING INTERACTIVE ELEMENT PLACEMENT BASED AROUND DAMAGED REGIONS ON A TOUCHSCREEN DEVICE - An apparatus for avoiding a damaged region on a touchscreen is disclosed. A method and a computer program product also perform the functions of the apparatus. The apparatus includes a damage location module that determines a location of an area of damage on a touchscreen of a computing device. The area of damage includes damage to the touchscreen. The apparatus, in one embodiment, includes a display location module that determines a location of one or more display items commanded to be displayed on the touchscreen. Each display item includes a location to be displayed on the touchscreen. The apparatus includes, in one embodiment, a rearrangement module that alters a location of a display item to be displayed in the area of damage where the display item is moved to a location on the touchscreen outside the area of damage on the touchscreen. | 07-09-2015 |
20150193422 | VALIDATION OF FORMULAS WITH EXTERNAL SOURCES - A method, system, and/or computer program product validates a formula within a spreadsheet. A formula type, of an identified formula from a spreadsheet, is identified. A database of known accurate formulas, whose type matches a formula type of the identified formula within the spreadsheet, is identified and located. A determination is made as to whether the identified formula from the spreadsheet matches a known accurate formula from the database. In response to the identified formula from the spreadsheet failing to match the known accurate formula from the database, a predefined action is initiated. | 07-09-2015 |
20150232064 | LIMITATIONS ON THE USE OF AN AUTONOMOUS VEHICLE - A computer program product is provided for controlling an autonomous vehicle, where the computer program product comprises a computer readable storage medium having program instructions embodied therewith and executable by a processor to cause the processor to perform a method. The method includes determining whether a primary user is present in an autonomous vehicle, allowing use of a plurality of functions of the autonomous vehicle in response to determining that the primary user is present in the autonomous vehicle, and receiving and storing preferences input by the primary user, wherein the preferences limit a function of the autonomous vehicle if the primary user is not present. The method further includes limiting use of the one or more of the plurality of functions of the autonomous vehicle as specified by the preferences in response to determining that the primary user is not present in the autonomous vehicle. | 08-20-2015 |
20150233719 | LIMITATIONS ON THE USE OF AN AUTONOMOUS VEHICLE - A method for controlling an autonomous vehicle includes determining whether a primary user is present in an autonomous vehicle, allowing use of a plurality of functions of the autonomous vehicle in response to determining that the primary user is present in the autonomous vehicle, and receiving and storing preferences input by the primary user, wherein the preferences identify a limitation on one or more of the plurality of functions of the autonomous vehicle that should be enforced during use of the autonomous vehicle if the primary user is not present in the autonomous vehicle. The method further includes limiting use of the one or more of the plurality of functions of the autonomous vehicle as specified by the preferences in response to determining that the primary user is not present in the autonomous vehicle. | 08-20-2015 |
20150235480 | Administering A Recall By An Autonomous Vehicle - Administering a recall by an autonomous vehicle, including: receiving, by a vehicle management module, a recall message identifying a component of the autonomous vehicle that is subject to the recall; adjusting, by the vehicle management module, a vehicle capability in dependence upon the component of the autonomous vehicle that is subject to the recall; determining, by the vehicle management module, a recall response plan in dependence upon the adjusted vehicle capability; and executing, by the vehicle management module, the recall response plan. | 08-20-2015 |
20150241241 | IDENTIFYING COST-EFFECTIVE PARKING FOR AN AUTONOMOUS VEHICLE - Identifying cost-effective parking for an autonomous vehicle, including: identifying, by a vehicle parking module, a plurality of available parking spots for parking the autonomous vehicle; determining, by the vehicle parking module, a total cost associated with each of the plurality of available parking spots for parking the autonomous vehicle; and selecting, by the vehicle parking module, a target parking spot in dependence upon the total cost associated with each of the plurality of available parking spots for parking the autonomous vehicle. | 08-27-2015 |
20150265919 | GAME INCENTIVIZED OPTIMIZATION OF RESOURCE UTILIZATION - Embodiments of the present invention provide a method, system and computer program product for game incentivized resource utilization optimization in a multiplayer gaming environment. In an embodiment of the invention, a method for game incentivized resource utilization optimization in a multiplayer gaming environment is provided. The method includes hosting a multiplayer gaming environment providing a game amongst a selection of servers in a cluster and detecting overutilization of a resource in one of the servers. A remedial action likely to reduce the overutilization can be identified as can an incentive of the game likely to provoke the identified remedial action. Thereafter, the identified game incentive can be provided to a player in the multiplayer gaming environment. | 09-24-2015 |
20150276412 | Global Positioning System Routing Based On Altering Arrival Time - GPS routing that: (i) determines a desired arrival time, based on expected completion time of an in-vehicle activity and a destination, for a trip being made by a vehicle; and (ii) performs GPS routing to determine a first route so that a first arrival time corresponding to the first route will be substantially the same as the desired arrival time. When the vehicle travels the first route to reach the destination the in-vehicle will generally be completed at about the same time the trip is completed. In many cases, the first route will not correspond to any of the following: (i) a shortest distance route, (ii) a least fuel consumptive route; and/or (iii) a quickest route. | 10-01-2015 |
20150308837 | REGIONAL DRIVING TREND MODIFICATION USING AUTONOMOUS VEHICLES - Embodiments of the present invention disclose a method, computer program product, and a computer system for modifying regional driving habits. A computer determines a first value associated with a regional driving habit for a region. The computer determines a second value associated with a target driving habit, wherein the second value is not substantially equivalent to the first value. The computer determines that a number of at least semi-autonomous vehicles in an area is above a threshold value. The computer transmits information instructing the number of at least semi-autonomous vehicles to operate based on the second value. | 10-29-2015 |
20150309512 | REGIONAL OPERATION MODES FOR AUTONOMOUS VEHICLES - A computer receives data detailing operation of a plurality of at least partially manually operated automobiles. The computer determines one or more trends in the operation of the plurality of at least partially manually operated automobiles, based at least in part on the data detailing the operation of the plurality of manually operated vehicles. The computer generates one or more operational rules, based, at least in part, on the one or more trends. The computer transmits the one or more operational rules to one or more at least semi-autonomous vehicles. | 10-29-2015 |
20150309791 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 10-29-2015 |
20150310608 | Method And Apparatus For Locating Unit In Assembly - The present embodiments disclose a method and apparatus for locating a unit in an assembly. According to the embodiments, a unit in an assembly is located. An identification of the target unit in the assembly is obtained. An image of at least a part of the assembly is acquired. The image includes a visual code associated with the part. The visual code is decoded to obtain an identification of at least one unit in the part. It is determined if the target unit is included in the part responsive to identification of a match of the target unit with the identification of the at least one unit. There is further disclosed a corresponding apparatus, assembly, and fault diagnosis device. | 10-29-2015 |
20150360129 | MANAGING A POPULATION OF PLAYERS OF ONLINE GAMES - A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players. | 12-17-2015 |
20150360130 | MANAGING A POPULATION OF PLAYERS OF ONLINE GAMES - A method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players. A target population of players may be determined, for example, by correlating a parameter of player satisfaction, such as player duration in-game, with the population of players in the game. | 12-17-2015 |
20150364039 | REGIONAL DRIVING TREND MODIFICATION USING AUTONOMOUS VEHICLES - Embodiments of the present invention disclose a method, computer program product, and a computer system for modifying regional driving habits. A computer determines a first value associated with a regional driving habit for a region. The computer determines a second value associated with a target driving habit, wherein the second value is not substantially equivalent to the first value. The computer determines that a number of at least semi-autonomous vehicles in an area is above a threshold value. The computer transmits information instructing the number of at least semi-autonomous vehicles to operate based on the second value. | 12-17-2015 |
20160004684 | VALIDATION OF FORMULAS WITH EXTERNAL SOURCES - A method validates a formula within a spreadsheet. A formula type, of an identified formula from a spreadsheet, is identified. A database of known accurate formulas, whose type matches a formula type of the identified formula within the spreadsheet, is identified and located. A determination is made as to whether the identified formula from the spreadsheet matches a known accurate formula from the database. In response to the identified formula from the spreadsheet failing to match the known accurate formula from the database, a predefined action is initiated. | 01-07-2016 |
20160042490 | ACCELERATED FRAME RATE ADVERTISING-PRIORITIZED VIDEO FRAME ALIGNMENT - In response to detection of a selection of an accelerated frame rate operation associated with a video advertisement, a quantity of individual prioritized video frames of the video advertisement to render based upon a selected accelerated frame rate is determined. Accelerated frame rate rendering priority values assigned to the individual prioritized video frames of the video advertisement are identified. Based upon differences among the identified accelerated frame rate rendering priority values assigned to the individual prioritized video frames, a prioritized video frame subset of the individual prioritized video frames is determined. The prioritized video frame subset of the individual prioritized video frames is equal in number to the determined quantity of individual prioritized video frames of the video advertisement and is determined to yield a maximized cumulative set of the identified accelerated frame rate rendering priority values. | 02-11-2016 |
20160042506 | Method For Locating A Unit In An Assembly - The present embodiments disclose a method for locating a unit in an assembly. According to the embodiments, a unit in an assembly is located. An identification of the target unit in the assembly is obtained. An image of at least a part of the assembly is acquired. The image includes a visual code associated with the part. The visual code is decoded to obtain an identification of at least one unit in the part. It is determined if the target unit is included in the part responsive to identification of a match of the target unit with the identification of the at least one unit. There is further disclosed a corresponding apparatus, assembly, and fault diagnosis device. | 02-11-2016 |
20160044343 | ACCELERATED FRAME RATE ADVERTISING-PRIORITIZED VIDEO FRAME ALIGNMENT - In response to detection of a selection of an accelerated frame rate operation associated with a video advertisement, a quantity of individual prioritized video frames of the video advertisement to render based upon a selected accelerated frame rate is determined. Accelerated frame rate rendering priority values assigned to the individual prioritized video frames of the video advertisement are identified. Based upon differences among the identified accelerated frame rate rendering priority values assigned to the individual prioritized video frames, a prioritized video frame subset of the individual prioritized video frames is determined. The prioritized video frame subset of the individual prioritized video frames is equal in number to the determined quantity of individual prioritized video frames of the video advertisement and is determined to yield a maximized cumulative set of the identified accelerated frame rate rendering priority values. | 02-11-2016 |