Patent application number | Description | Published |
20090006967 | LIVE COPY-PASTE - Copying and pasting information from one application to another allows identical information to be present in multiple locations. Pasted information can be updated based on changes to the source of the pasted information. With updating pasted information, the information can remain identical in both locations even if a change takes place after the paste. | 01-01-2009 |
20090094543 | Web service user experience without upfront storage expense - A method is provided for allocating resources for users of a service based on whether a user has expressed intent to fully utilize capabilities of the service. If the intent is expressed by a user, an infrastructure is created that enables the user to maintain, via a user interface, artifacts associated with an account of the user on the service. A user that has not yet expressed such intent is presented with a prospective user interface simulating the user interface without enabling the prospective user to maintain the artifacts associated with an account of the prospective user. | 04-09-2009 |
20090164664 | SECURE FEDERATION OF DATA COMMUNICATIONS NETWORKS - Techniques for secure federation of data communications networks are provided. The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other networks, servers, other devices, or users. In Automatic federation mode, an edge proxy server may accept all incoming messages from entities that have a valid certificate. In Clearinghouse federation mode, the edge proxy server forwards all outgoing messages to a specified, trusted clearinghouse server. | 06-25-2009 |
20090199288 | DISTRIBUTED AUTHENTICATION IN A PROTOCOL-BASED SPHERE OF TRUST IN WHICH A GIVEN EXTERNAL CONNECTION OUTSIDE THE SPHERE OF TRUST MAY CARRY COMMUNICATIONS FROM MULTIPLE SOURCES - A distributed authentication model that operates within a protocol-based sphere of trust. Rather than being able to communicate with any one of the computing systems internal to the sphere of trust, the amount of authentication is reduced by having the external computing systems initially communicate with a specific edge internal computing system. Many if not all of the internal computing systems then delegate the task of authentication to the edge computing system, and will rely on any authentication performed by the edge computing system. This allows the task of authentication to scale well for large protocol-based spheres of trust. | 08-06-2009 |
20090254336 | PROVIDING A TASK DESCRIPTION NAME SPACE MAP FOR THE INFORMATION WORKER - Providing for generation of a task oriented data structure that can correlate natural language descriptions of computer related tasks to application level commands and functions is described herein. By way of example, a system can include an activity translation component that can receive a natural language description of an application level task. Furthermore, the system can include a language modeling component that can generate the data structure based on an association between the description of the task and at least one application level command utilized in executing the computer related task. Once generated, the data structure can be utilized to automate computer related tasks by input of a human centric description of those tasks. According to further embodiments, machine learning can be employed to train classifiers and heuristic models to optimize task/description relationships and/or tailor such relationships to the needs of particular users. | 10-08-2009 |
20090254390 | COMMUNICATION WORKSPACE - Multiple pieces of information can be arranged into a single construct that allows the employee to ascertain information quickly while at her workstation. Selection of information for placement into the construct can employ various statistical models and the like. Selective pieces of information can be masked for a user's construct based upon access rights of the user. Constructs can be configured by a user based on personal preferences as well as by an administrator. Population of metadata upon the construct can be performed automatically through an instruction of the administrator or be overridden by a user request. In addition, various types of synchronization can be implemented between constructs, such that identical or near-identical information is populated upon multiple constructs. | 10-08-2009 |
20090327871 | I/O FOR CONSTRAINED DEVICES - Systems and methodologies for providing improved input and output capabilities for computing devices are provided herein. An output manager is provided that can determine an appropriate layout for a user interface at a display area based on size and shape parameters associated with the display area. The output manager can additionally sense alterations to the display area and dynamically adjust a determined layout based on the sensed alterations. Further, the output manager can facilitate the connection of an associated device to one or more external display devices to facilitate the combined use of the external display devices and resident display areas at the associated device. An input manager is additionally provided that can obtain input from a target user by sensing patterns associated with the target user and select an appropriate input based on the sensed patterns. | 12-31-2009 |
20110307777 | WEB SERVICE USER EXPERIENCE WITHOUT UPFRONT STORAGE EXPENSE - A system and method is provided for creating accounts for users of a service. An infrastructure associated with an invited user enables the invited user to view a document that is stored in association with another user. A server computer is capable of receiving an indication to associate a second infrastructure with the invited user, which enables the creation of a document to be stored in association with the invited user. | 12-15-2011 |
20120079014 | METHOD AND SYSTEM FOR DELAYED ALLOCATION OF RESOURCES - The present invention allows a server to delay allocating resources to a client's request. When the client requests a feature that requires server resources, the server accepts and acknowledges the client's request, but the client is prohibited from using the requested feature until further notice from the server. For example, during an authorization process, the server allocates only the minimum resources required to maintain the session and to authorize the client. Thereafter, the server allocates the resources necessary to support the client's request only when the resources become available. Until then, the server maintains the communications session without supporting the request. Thus, the server shepherds its resources rather than committing them at the whim of a client. Also, a client need not repeat its request if the server cannot immediately satisfy it; instead, the server accepts the request and then later begins to support it when adequate resources become available. | 03-29-2012 |