Patent application number | Description | Published |
20090043864 | Method and System for Generating Globally Unique Identifiers - There is disclosed a system for assigning a GUID to a resultant entity generated by converting a source entity, in a GUID assignment system having a processing means and a storage device. Information about the source entity corresponding to the resultant entity and the origin of the source entity into is inputted into the processing means from the storage device. The processing means generates an origin unique ID using the information about the origin of the source entity, and a source entity unique ID using the information about the source entity. The processing means then concatenates the origin unique ID and the entity unique ID and calculates the hash of said concatenation result to generate a GUID and tags the generated GUID to the resultant entity. | 02-12-2009 |
20090271180 | DICTIONARY FOR TEXTUAL DATA COMPRESSION AND DECOMPRESSION - A dictionary for compressing and decompressing textual data has a number of keys. Each key is associated with an identifier. The keys include static word or phrase keys, where each static word or phrase key lists one or more unchanging words in a particular order. The keys further include dynamic phrase keys, where each dynamic phrase key lists a number of words and one or more placeholders in a particular order, and each placeholder denotes a place where a word or phrase other than the words of the dynamic phrase key is to be inserted. At least one of the dynamic phrase keys may identify one or more of the words by identifiers for corresponding static words or phrase keys. At least one of the static word or phrase keys may identify one or more of the words by identifiers for corresponding other static words or phrase keys. | 10-29-2009 |
20090271181 | DICTIONARY FOR TEXTUAL DATA COMPRESSION AND DECOMPRESSION - A dictionary for compressing and decompressing textual data has a number of keys. Each key is associated with an identifier. The keys include static word or phrase keys, where each static word or phrase key lists one or more unchanging words in a particular order. The keys further include dynamic phrase keys, where each dynamic phrase key lists a number of words and one or more placeholders in a particular order, and each placeholder denotes a place where a word or phrase other than the words of the dynamic phrase key is to be inserted. At least one of the dynamic phrase keys may identify one or more of the words by identifiers for corresponding static words or phrase keys. At least one of the static word or phrase keys may identify one or more of the words by identifiers for corresponding other static words or phrase keys. | 10-29-2009 |
20090307244 | ENCODING AND DECODING OF XML DOCUMENT USING STATISTICAL TREE REPRESENTING XSD DEFINING XML DOCUMENT - A statistical tree representing an extensible Markup Language (XML) Schema document (XSD) is generated. The statistical tree captures information defined by the XSD by representing elements, attributes, and enumerations of the XSD as branches, nodes, and leaves of the statistical tree. The statistical tree has bits corresponding to nodes of the statistical tree. An XML document defined by the XSD is adaptively encoded, or compressed, as a number of bits based on the statistical tree that has been generated. The number of bits encoding the XML document are decoded, or decompressed, to yield the XML document also based on the statistical tree that has been generated. | 12-10-2009 |
20090313638 | Correlated message identifiers for events - A message identifier of a first event is provided to a correlation engine. The correlation engine is to correlate the first event to one or more second events according to a predetermined correlation technique. The message identifiers of the second events are received from the correlation engine. A correlated message identified for the first event is generated based on the message identifier of the first event and on the message identifiers of the second events. The correlated message identifier for the first event is output. | 12-17-2009 |
20100031249 | METHOD FOR POLICY BASED ENFORCEMENT OF BUSINESS REQUIREMENTS FOR SOFTWARE INSTALL - A method for policy-based enforcement of business requirements for a software install. The method includes identifying installation prerequisites and business prerequisites based on business policies of a software solution, where the software solution may be installed on a computing machine; identifying software prerequisites required for the software solution; determining whether the business prerequisites and installation prerequisites can be complied without compromising the software prerequisites; on determining that the business prerequisites can he complied, installing the software solution on the computing machine; and on negative determining notifying a user regarding non-compliance of the business prerequisites. | 02-04-2010 |
20100049727 | COMPRESSING XML DOCUMENTS USING STATISTICAL TREES GENERATED FROM THOSE DOCUMENTS - Compressing data from a markup language document such as an XML document includes the steps of creating from the document a path based statistical tree built according to a given set of rules, and compressing the document by using the statistical tree. In an embodiment, the statistical tree includes a multitude of paths, and a single bit represents each of said paths. Also, the document may include both enumerated data and non-enumerated data, and the enumerated data is compressed by using the statistical tree. In an embodiment, the document includes a multitude of document nodes, and the step of creating the path based statistical tree includes the step of forming said tree with a multitude of tree nodes, each of the tree nodes representing one of the document nodes. | 02-25-2010 |
20100100369 | Translating Source Locale Input String To Target Locale Output String - A dictionary mapping source locale strings to target locale strings is constructed. A tree is constructed from the dictionary. The tree has nodes including a start node, end nodes, and string nodes. The nodes form node chains of the tree that correspond to the source locale strings. Each node chain links a collection of the nodes from the start node to a string node. Each node other than the start node has a parent node and corresponds to a character of the source locale strings. Each node other than the end nodes has one or more child nodes. Each string node ends a node chain, and corresponds to a mapping within the dictionary of a source locale string to a target locale string. An input string having the source locale is processed against the tree to generate an output string having the target locale. | 04-22-2010 |
20110082883 | INTELLIGENT EVENT-BASED DATA MINING OF UNSTRUCTURED INFORMATION - A method, system and computer program product is disclosed for intelligent data mining. The method comprises receiving an event from an application, assigning property weights to properties of the event, and building a query from these properties based on the property weights. The method further comprises assigning search engine weights to a group of search engines, selecting at least some of the search engines based on the search engine weights, and sending the built query to the selected search engines. Results from the selected search engines are stored in a knowledge repository and used to adjust the property weights and the search engine weights. The invention may be used to provide an analysis with information about a problem, and to manage a solutions database which can be used for problem determination. The invention provides a low cost solution for collecting relevant information from online sources. | 04-07-2011 |
20110119315 | Generating a Statistical Tree for Encoding/Decoding an XML Document - A method and apparatus for generating a statistical tree representing an extensible markup language Schema (XSD) is disclosed. Components of the XSD are prioritized according to predefined rules. A root node representing said XSD is created. Pairs of child nodes are generated from the root node. Each pair comprises at least one genuine node, and each pair of generated child nodes is appended to a parent node which is a genuine node. The path to each of said child nodes from a respective parent genuine node is represented with a binary sequence. At least one genuine node is allocated to a corresponding component of said XSD, the allocation being based on the prioritization of the component. Methods, apparatus and computer program products for generating a statistical tree representing an extensible markup language Schema (XSD), for encoding an extensible markup language (XML) document utilizing a statistical tree representing an extensible markup language Schema (XSD), and for decoding an XML document represented by a binary encoded sequence also are disclosed. | 05-19-2011 |
20120173535 | Allowing External Access to Private Information of a Local Data Store - Techniques provided for allowing external access by other users to private information that is maintained on local storage of a computer and owned by an information owner. The private information is uploaded from the local storage to an externally accessible information source that is accessible by the other users. A request from a user to access the private information is received by the owner, who determines whether to allow access the private information. If so, the owner sends a private information sharing authorization to a collaboration orchestrator, which retrieves the private information from the external source and provides the private information to the user. The owner optionally requests to collaborate with the user before deciding whether to allow access to the private information. One or both of the identities of the owner and user can remain anonymous until agreeing on revealing identities. A system and program product is also provided. | 07-05-2012 |
20120209885 | Allowing External Access to Private Information of a Local Data Store - Techniques provided for allowing external access by other users to private information that is maintained on local storage of a computer and owned by an information owner. The private information is uploaded from the local storage to an externally accessible information source that is accessible by the other users. A request from a user to access the private information is received by the owner, who determines whether to allow access the private information. If so, the owner sends a private information sharing authorization to a collaboration orchestrator, which retrieves the private information from the external source and provides the private information to the user. The owner optionally requests to collaborate with the user before deciding whether to allow access to the private information. One or both of the identities of the owner and user can remain anonymous until agreeing on revealing identities. A system and program product is also provided. | 08-16-2012 |
20120284697 | CODE EVALUATION BASED ON FAILURE PREDICTION - A method and apparatus for evaluating code. A likelihood that a set of segments of the code will not run as desired based on a policy is identified. A risk of the code not performing as desired is evaluated based on a result from a code coverage test and the likelihood that the set of segments of the code will not run as desired. | 11-08-2012 |
20130103982 | LOG FILE COMPRESSION - A compression system identifies one or more fields in a log file based on at least one field rule from among multiple field rules specified in a log file framework. The compression system extracts contents of the log file associated with the one or more fields. The compression system passes the contents associated with the one or more fields to corresponding compression engines from among a multiple compression engines each specified for performing a separate type of compression from among multiple types of compression for each of the one or more fields, wherein each of the one or more fields corresponds to one or more compression engines from among the multiple compression engines. | 04-25-2013 |
20140006455 | ATTRIBUTE-BASED LINKED TRIES FOR RULE EVALUATION | 01-02-2014 |
20140006456 | ATTRIBUTE-BASED LINKED TRIES FOR RULE EVALUATION | 01-02-2014 |
20140006656 | Optimizing an Operating System I/O Operation that Pertains to a Specific Program and File | 01-02-2014 |
20140006657 | OPTIMIZING AN OPERATING SYSTEM I/O OPERATION THAT PERTAINS TO A SPECIFIC PROGRAM AND FILE | 01-02-2014 |
20140281755 | Identify Failed Components During Data Collection - A mechanism is provided for identifying failed components during data collection. For each data source combination in a plurality of data sources, a determination is made as to whether a standard deviation (σ) for an estimated collection interval of the data source is above a predetermined standard deviation threshold (σ | 09-18-2014 |
20140282966 | PREVENTION OF PASSWORD LEAKAGE WITH SINGLE SIGN ON IN CONJUNCTION WITH COMMAND LINE INTERFACES - Provided are techniques for transmitting a lightweight domain access protocol (LDAP) request from an user interface application (UIA) to a LDAP server receiving, at the UIA, a LTPA token in response to the transmitting of the LDAP request; transmitting, from the UIA, to a command line interface associated with an application, the LTPA token in conjunction with a command to be executed by the application; verifying by the application the LTPA token; and in response to the verifying, executing, by the application the command. The techniques also include transmitting, from the application, to a second command line interface associated with a second application, the LTPA token in conjunction with a second command to be executed by the second application; verifying by the second application the LTPA token; and in response to the verifying by the second application, executing, by the second application the second command. | 09-18-2014 |
20140379981 | APPLICATION DISCOVERY USING STORAGE SYSTEM SIGNATURES - Exemplary embodiments of the present invention disclose a method and system for identifying one or more applications stored on a storage system that is shared by one or more computer systems. In a step, an exemplary embodiment accesses the storage system. In another step, an exemplary accesses one or more file tables associated with the storage system. In another step, an exemplary embodiment analyzes the one or more file tables and one or more files on the storage system that are associated with the one or more applications to identify the one or more applications. In another step, an exemplary embodiment analyzes the one or more file tables and the one or more files to identify a respective dependency of the one or more applications. | 12-25-2014 |
20150026673 | ENFORCING EXTERNAL INSTALL REQUIREMENTS DURING SOFTWARE DEPLOYMENT - A method, system and article of manufacture are disclosed for policy-based enforcement of business requirements for a software install. The method comprises the steps of determining a policy infrastructure analogous to one or more business requirements; and embedding the policy infrastructure in a software installation process for installing a given software application. The software installation process is used to install the given software application into a computer system while ensuring that all installation prerequisites of the software application are met during the install. In a preferred embodiment of the invention, the determining step includes the step of preparing one or more policies for the business requirements, each of the policies including a condition part that evaluates either to true or false, and an action part that specifies one or more actions to be taken if the condition part evaluates to true. | 01-22-2015 |
20150067501 | METHOD TO GENERATE DYNAMIC CUSTOMIZED CONTEXT-SENSITIVE HELP - Embodiments of the present invention disclose a method, computer program product, and system for customizing help screens. A computer receives a request for help content. The computer identifies an annotated help file that corresponds to the request for help content. The computer identifies one or more variables in the identified annotated help file. The computer retrieves a value for each of the one or more variables from a software product. The computer replaces each of the one or more variables in the identified annotated help file with the retrieved value to generate customized help content. | 03-05-2015 |
20150067645 | METHOD TO GENERATE DYNAMIC CUSTOMIZED CONTEXT-SENSITIVE HELP - Embodiments of the present invention disclose a method, computer program product, and system for customizing help screens. A computer receives a request for help content. The computer identifies an annotated help file that corresponds to the request for help content. The computer identifies one or more variables in the identified annotated help file. The computer retrieves a value for each of the one or more variables from a software product. The computer replaces each of the one or more variables in the identified annotated help file with the retrieved value to generate customized help content. | 03-05-2015 |
20150074229 | DYNAMIC HELP PAGES USING LINKED DATA - Help page techniques including: (i) sending, by a customer computer, heterogeneous software context data to a central registry over a communication network; (ii) receiving, by the customer computer, from a registry server over the communication network, a set of network address information including at least a first network address information for contacting a first provider server relating to the first software product and a second network address information for contacting a second provider server relating to the second software product; and (iii) linking, by the customer computer, the first and second network address information on a single set of help page(s). | 03-12-2015 |
20150074231 | DYNAMIC HELP PAGES USING LINKED DATA - Help page techniques including: (i) sending, by a customer computer, heterogeneous software context data to a central registry over a communication network; (ii) receiving, by the customer computer, from a registry server over the communication network, a set of network address information including at least a first network address information for contacting a first provider server relating to the first software product and a second network address information for contacting a second provider server relating to the second software product; and (iii) linking, by the customer computer, the first and second network address information on a single set of help page(s). | 03-12-2015 |
20150074290 | BROWSER BASED HOSTNAME RESOLUTION FOR NON-DNS (DOMAIN NAME SERVICE) AND/OR DIFFERENT DNS ENVIRONMENTS - Communication between (at least) two domains where domain name resolution for the first domain is not going to be available to clients in the second domain “as a service” but more as a “capability” available inherently in web containers. This can be accomplished as follows: (i) connecting a first server computer in direct data communication with a first domain and a second domain; (ii) storing domain name system (DNS) mapping information for the second domain on the first server computer; (iii) storing a first network page related to a network application on the first server computer; and (iv) sending, from the first server computer to a client computer on the first domain, the first network page and the DNS mapping information for the second domain. | 03-12-2015 |
20150089405 | INTEGRATED USER INTERFACE USING LINKED DATA - A computer receives user input regarding at least a first and a second resource. The computer retrieves navigational content for the first and second resource. The computer displays the retrieved navigational content in a single interface. The computer receives user selection of at least one element of the retrieved navigational content. The computer then retrieves page content associated with the selected at least one element of the retrieved navigational content. | 03-26-2015 |
20150089412 | INTEGRATED USER INTERFACE USING LINKED DATA - A computer receives user input regarding at least a first and a second resource. The computer retrieves navigational content for the first and second resource. The computer displays the retrieved navigational content in a single interface. The computer receives user selection of at least one element of the retrieved navigational content. The computer then retrieves page content associated with the selected at least one element of the retrieved navigational content. | 03-26-2015 |