Patent application number | Description | Published |
20090106768 | SYSTEM AND METHOD FOR ACCESSING REALLY SIMPLE SYNDICATION (RSS) ENABLED CONTENT USING SESSION INITIATION PROTOCOL (SIP) SIGNALING - A system and associated method for subscribing Really Simple Syndication (RSS) enabled content using the Session Initiation Protocol (SIP) are disclosed. An application server intermediates a SIP message and a request for a RSS feed. An end device requests subscription of the RSS feed in a SIP message. The application server processes the SIP message, register the RSS feed, and tracks changes in the RSS feed over the Internet. The application server retrieves a web content linked to the RSS feed responsive to finding changes in the RSS feed. The application server stores update of the web content in a media cache. The end device subscribing the RSS feed fetches the web content from the media cache in later part of the subscription. | 04-23-2009 |
20090177536 | DYNAMIC, SUBSCRIBER DRIVEN CHARGING MODELS FOR MEDIA DISTRIBUTION - A system and method is provided to implement charging models for subscriber driven media agnostic content delivery across same or different networks. The method includes receiving content of a first media type over a network from a sending client. The method further includes sending the content or a reference to the content to a receiving client in a preferred media type and to a preferred device in accordance with at least one preference of the receiving client. The method also includes generating a billing record based on the content and user preferences of a sending client and/or a receiving client. | 07-09-2009 |
20090177794 | SUBSCRIBER DRIVEN MEDIA AGNOSTIC CONTENT DELIVERY ACROSS NETWORKS - A system and method is provided to facilitate subscriber driven media agnostic content delivery across same or different networks. The method includes receiving preferences from a sending client and a receiving client and receiving content of a first media type over a network. The method further includes sending the content or a reference to the content to the receiving client in a preferred media type and to a preferred device in accordance with at least one preference of the receiving client. The method also includes notifying at least the receiving client that the content is to be received by the preferred device. | 07-09-2009 |
20090193069 | SYSTEM AND METHOD FOR OPTIMIZING DATA TRAFFIC IN SIGNALING STREAM OF IP MULTIMEDIA SUBSYSTEM SERVICE - A system and associated method for optimizing media data in signaling stream of a network system. A client subscribed for a presence service sends a signaling message embedding media data in an Extensible Markup Language file. An optimizer gateway in the network system intercepts the signaling message, extracts and keeps the media data, replaces the media data in the signaling message with a reference pointer to the media data, asynchronously processes the media data, retransmits the media data to another client subscribing to the presence service, or reinstate the media data from the reference pointer to the media data. | 07-30-2009 |
20090248686 | SYSTEM AND METHOD FOR RETRIEVING INFORMATION FROM THE INTERNET BY MEANS OF AN INTELLIGENT SEARCH AGENT - A system and associated method for retrieving information from the Internet by an end user through use of an Intelligent Search Agent. Creating an index comprising a least one data structure corresponding to a respective forum. Next, submitting a query to at least one search engine located on a respective Internet server. After submitting the query, posting a question to at least one forum located on a respective Internet server. After posting the question, subscribing to at least one web syndication corresponding to at least one respective forum. After subscribing to at least one web syndication, receiving information from at least one web syndication. Finally, sending the information to said end user. | 10-01-2009 |
20090286553 | SYSTEM AND METHOD OF USING LOCATION BASED SYSTEMS FOR PROVIDING SERVICES - A location based system is provided for providing messages to a user and, in particular, to a location based advertising system using multiple geo-boundaries and which is configured to provide advertisements to a user and to track the effectiveness of such advertisements. The method includes defining a zone with a plurality of geo-boundaries and detecting when a mobile user has crossed a first boundary of the plurality of geo-boundaries and a second boundary of the plurality of geo-boundaries. The method further includes sending a message to the mobile user upon the determining that the mobile user has crossed the first boundary. | 11-19-2009 |
20090323953 | SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION - A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset originated location information to third parties. The system includes a location platform to determine location information of a remote user, and an encryption service configured to secure the location information of the remote user and send the secure location information to a content provider. | 12-31-2009 |
20100009657 | SYSTEM AND METHOD FOR PROVIDING PRIVACY AND LIMITED EXPOSURE SERVICES FOR LOCATION BASED SERVICES - A system and method is provided for providing privacy and limited exposure services for location based services. The system includes at least one module configured to provide fictitious location or route information of a mobile user to selected users or group of users based on a mobile user provided profile. | 01-14-2010 |
20100020727 | SYSTEM AND METHOD OF USING DIAMETER BASED SIGNALING TO ACTIVATE AND DEACTIVATE SUBSCRIBER CENTRIC, VISUALLY RENDERED, SERVICES - A system and method is provided for providing using Diameter based signaling to activate and deactivate subscriber centric, visually rendered, services. The system is implemented in a computer infrastructure which includes computer executable code tangibly embodied on a computer readable medium. The executable code is operable to activate and deactivate subscriber centric, visually rendered, services using a Diameter based signaling protocol and support home subscriber server (HSS) based subscriber profiles that pertain to visual characteristics. | 01-28-2010 |
20100030609 | INTELLIGENT SYSTEM AND FUZZY LOGIC BASED METHOD TO DETERMINE PROJECT RISK - A method, service, and product for changing project length based on fuzzy logic techniques where a subject matter expert assigns a pre-determined risk rating to each of a set of tasks. A fuzzy engine assigns a human grammar to each of the pre-determined risk ratings for each of the set of tasks, the human grammar being defined by a numeric range and assigned to the risk rating for each value falling within the numeric range. The fuzzy engine determines which rules from a set of rules apply to the task with the assigned human grammar, the set of rules being preprogrammed into the fuzzy engine, which then evaluates the tasks with the assigned human grammar using the determined rules. The fuzzy engine thereafter creates an adjusted-time allocation for each task and creates an adjusted-task-length for the set of tasks based from all of the created adjusted time allocations. | 02-04-2010 |
20100036608 | GEOBOUNDARIES USING RECTANGULAR FENCING AND COUPLING OF GPS/LBS SYSTEMS - A method for establishing a geographic boundary and monitoring an object within the boundary is provided. At least one first entity provides a second entity a request to form the geographic boundary and monitor the object within the boundary. The request may include parameters including at least a first set of coordinates of a geographic location associated with the geographic boundary to be formed. The method includes determining if the parameters provided include additional sets of coordinates for additional geographic locations associated with the geographic boundary to be formed. A footprint of the geographic boundary is selected dependent on whether the parameters provided include additional sets of coordinates. A rectangular footprint may be selected if the parameters include additional sets of coordinates and the coordinates form an isosceles triangle. The method includes forming the geographic boundary having the selected footprint. The object may be monitored within the geographic boundary. | 02-11-2010 |
20100041369 | SYSTEM AND METHOD OF USING DIAMETER BASED SIGNALING TO SUPPORT BILLING MODELS FOR VISUALLY RENDERED SERVICES - A system and method of using Diameter based signaling is provided to track usage to support multiple billing models for visually rendered revenue generating services in an IP Multimedia subsystem based network. The system includes a computer system includes first program instructions to provide usage information to an accounting platform for processing charging information for visually rendered services in an IP Multimedia subsystem based network. The computer system also comprises a computer readable media which stores the first program instructions and a central processing unit to execute the first program instructions. | 02-18-2010 |
20100042519 | SYSTEM AND METHOD FOR PROVIDING LOCATION BASED SERVICES USING COLLABORATIVE NETWORKS - A system and method is provided for providing location based services. The system includes at least one module configured to publish location information of a mobile user using a publish subscribe format based on a user preference mode of notification. | 02-18-2010 |
20100073373 | SYSTEM AND METHOD TO MODEL APPLICATION MATURITY - A system and method is provided for modeling an application and, more particularly, to a system and method for providing a maturity model of an application (e.g., web 2.0 maturity model). The system is implemented in a computer infrastructure and includes a computer executable code tangibly embodied on a computer readable medium and operable to graphically compare at least a current state of a plurality of technology areas based on a normalized score for each of the plurality of technology areas. | 03-25-2010 |
20100075610 | SYSTEM AND METHOD FOR REDUCING LATENCY OF LOCATION BASED INFORMATION RETRIEVED FROM A LOCATION SERVICE - A system and method is provided for reducing latency when providing user location information services. The system is implemented in a computer infrastructure which comprises computer executable code tangibly embodied on a computer readable medium. The executable code is operable to trigger a location based service to obtain user location information prior to the user registering for location services. | 03-25-2010 |
20100094984 | METHOD FOR OPTMIZING A PRESENCE ENABLED MANAGED SERVICE - Methods, systems, processes and devices are provided for optimizing throughput and quality of service of a presence enabled managed service. The method includes at least a first entity requesting from an aggregator of presence services presence information of a second entity. The method includes looking up a profile of the aggregator stored in a cache of a presence server hosted by the presence enabled managed service. The method includes determining from the profile an aggregator level of service the aggregator has subscribed to from the presence enabled managed service, wherein the aggregator level of service is one of high level service, medium level service, and low level service. The method includes storing presence information of the second entity on a presence document on the cache and returning the presence information to the first entity based upon the aggregator level of service. | 04-15-2010 |
20100112990 | SYSTEM AND METHODS FOR LOCATION BASED ROUTING AND ADVERTISING FOR STREAMED MEDIA AND MEDIA BLOCKING - A location based service configured to route local advertising for streamed media and media blocking based on a location of the recipient. The method include detecting a location of a mobile user and routing streaming media of a local affiliate to a mobile device of the mobile user based on the detected location of the mobile user. | 05-06-2010 |
20100113065 | GPS DRIVEN ARCHITECTURE FOR DELIVERY OF LOCATION BASED MULTIMEDIA AND METHOD OF USE - An architecture, system and method of use sends location based multimedia to participants of a geo-tour or other application using geo-boundaries and/or other location information. The method includes detecting when a user has crossed within a geo-boundary. The method further includes determining a content type to be sent to a mobile device based on preferences provided by the user. Additionally, the method includes sending user location specific content of the determined content type to the mobile device when the user has crossed within the geo-boundary. | 05-06-2010 |
20100113066 | GEO-BOUNDARY TRIGGERED MESSAGING AND SCHEDULE SYSTEM AND METHOD OF USE - A location based system is provided is configured to provide messages to a recipient based on time and location based information. The a method includes detecting when a mobile user has crossed within a predefined geo-boundary. The method further includes sending a message to the mobile user when the mobile user has crossed within the predefined geo-boundary during a predetermined time period set by an originator of the message. | 05-06-2010 |
20100124236 | SYSTEM AND METHOD OF LEVERAGING SIP TO INTEGRATE RFID TAG INFORMATION INTO PRESENCE DOCUMENTS - A system and method is provided for converting RFID tag information into presence documents and, in particular, a system, topologies and a method is provided for leveraging session initiation protocol (SIP) to integrate RFID tag information into presence documents. The method is implemented in a computing environment, which includes receiving RFID information from a RFID gateway and converting the RFID information into a SIP message. The SIP message is published to a presence server. | 05-20-2010 |
20100135278 | SYSTEM AND METHOD TO INITIATE A PRESENCE DRIVEN PEER TO PEER COMMUNICATIONS SESSION ON NON-IMS AND IMS NETWORKS - An architecture and method is provided for call routing using both IMS and non-IMS frameworks. The method includes receiving presence information of a third party from a non-IP Multimedia Subsystem (IMS) network device. The method further includes routing the third party to at least one callee designated device based on configurable preferences provided by the callee and correlated to presence information using an IMS compliant component. The method additionally includes providing a charging record for the routing on an IMS complaint charging platform. | 06-03-2010 |
20100203903 | SYSTEM AND METHODS FOR PROVIDING LOCATION INFORMATION USING LOCATION BASED QUEUES - A location based service and method configured to provide a mechanism for delivering location to a subscribing user using a location queuing system. The method is implemented on a computing infrastructure and includes receiving one or more SIP (Session Initiation Protocol) messages with location information of a user. The method further includes publishing the location information to a location system queue with related timestamp information | 08-12-2010 |
20100205169 | SYSTEM AND METHODS FOR PROVIDING CONTENT USING CUSTOMIZED RSS AGGREGATION FEEDS - A system and methods are provided for aggregating content and sending the same using customized RSS aggregation feeds. The method is implemented on a computing infrastructure. The method includes indexing items from at least one of multiple RSS sources and non-RSS sources and aggregating two or more of the items from the indexed items associated with one or more user preferences. The method further includes sending an aggregated RSS feed to a user which includes the aggregated two or more of the items associated with the one or more user preferences. | 08-12-2010 |
20100205662 | SYSTEM AND METHOD TO SUPPORT IDENTITY THEFT PROTECTION AS PART OF A DISTRIBUTED SERVICE ORIENTED ECOSYSTEM - A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in information management systems (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device. | 08-12-2010 |
20100211300 | SYSTEM AND METHODS FOR GEOBOUNDARY BASED TRAFFIC MONITORING USING QUICK TEAR DOWN BOUNDARIES - A location based service and method configured to provide a mechanism for delivering traffic information to a subscribing user. The method is implemented on a computing infrastructure and includes setting up geo-boundaries at one or more predefined intervals. The method further includes receiving a signal from an active mobile device as it passes at least two of the geo-boundaries at the one or more predefined intervals, and determining a traffic incident from the received signal. | 08-19-2010 |
20100215157 | Callee Centric Location and Presence Enabled Voicemail Using Session Initiated Protocol Enabled Signaling for IP Multimedia Subsystem Networks - An architecture and method of voicemail based on session initiated protocol presence and location information of a callee is disclosed. A method of providing voicemail includes determining a location and a presence of a callee, and playing a customized voicemail greeting to a caller based on preferences defined by the callee and also based on at least one of the location and the presence. | 08-26-2010 |
20100215163 | SYSTEM AND METHOD OF LOCATION SENSITIVE CALLER AND CALLEE BASED CALL PRIORITIZATION - A system and method of call prioritization and, in particular, a system and method of location sensitive caller and callee based voice call prioritization are disclosed. A method includes: determining that an incoming call is designated as priority by a caller; determining that the caller is contained in a whitelist; and handling the incoming call as a priority call at a callee telephone when the incoming call is designated as priority by the caller and the caller is contained in the whitelist. | 08-26-2010 |
20100217449 | SYSTEM AND METHOD TO MANAGE POWER CONSUMPTION - A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to detect an occurrence of at least one of a geoboundary event, a radio frequency identification (RFID) event; and a local area network (LAN) event. Additionally, the programming instructions are operable to adjust one or more power consumption settings of an environment based on the occurrence. | 08-26-2010 |
20100217632 | MANAGING SERVICE ORIENTED ARCHITECTURE SHARED SERVICES ESCALATION - An approach that manages a service oriented architecture (SOA) shared service that fails to meet a set of objectives of the SOA shared service is provided. In one embodiment, there is a management tool, including an evaluation component configured to receive a SOA shared service that is developed as part of a potential SOA shared services project, and evaluate whether a set of objectives of the SOA shared service has been met; and a determination component configured to determine whether the SOA shared service should be developed in the case that the set of objectives of the SOA shared service has not been met. | 08-26-2010 |
20100217634 | TRANSITIONING TO MANAGEMENT OF A SERVICE ORIENTED ARCHITECTURE SHARED SERVICE - An approach that transitions to management of a service oriented architecture (SOA) shared service is provided. In one embodiment, there is a service transition tool, including a project component configured to provide a SOA shared service developed as part of a SOA shared services project, and a planning component configured to plan a transition from development of the SOA shared service to management of the SOA shared service. | 08-26-2010 |
20100217636 | MANAGEMENT OF A SERVICE ORIENTED ARCHITECTURE SHARED SERVICE - An approach that manages a service oriented architecture (SOA) shared service is provided. In one embodiment, there is a service management tool, including an identification component configured to identify a SOA shared service that needs to be revised; and a revision component configured to develop a revision procedure to address the SOA shared service that needs to be revised, and implement the revision procedure for the SOA shared service. | 08-26-2010 |
20100218010 | MODULAR POWER CONTROL SYSTEM TO MANAGE POWER CONSUMPTION - A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to receive an indication of a geoboundary event and determine an occurrence of at least one of a radio frequency identification (RFID) event and a local area network (LAN) event. Additionally, the programming instructions are operable to adjust one or more power consumption settings of an environment based on at least one of the receiving of the indication of the geoboundary event and the determination of the occurrence of the at least one of the RFID event and the LAN event. | 08-26-2010 |
20100228546 | SYSTEM AND METHODS FOR PROVIDING VOICE TRANSCRIPTION - A system and methods is provided for providing SIP based voice transcription services. A computer implemented method includes: transcribing a Session Initiation Protocol (SIP) based conversation between one or more users from voice to text transcription; identifying each of the one or more users that are speaking using a device SIP_ID of the one or more users; marking the identity of the one or more users that are speaking in the text transcription; and providing the text transcription of the speaking user to non-speaking users. | 09-09-2010 |
20100228587 | SERVICE ORIENTED ARCHITECTURE LIFECYCLE ORGANIZATION CHANGE MANAGEMENT - An approach that manages an SOA lifecycle organization change is provided. In one embodiment, there is a change management tool, including a retrieval component configured to retrieve a proposed change; a lifecycle defining component configured to define an SOA lifecycle based on the proposed change; a services portfolio component configured to identify a plurality of SOA shared services in services portfolio that addresses the proposed change; a stakeholder component configured to identify stakeholders having an interest in the proposed change; an impact component configured to determine impacts of the proposed change on the stakeholders; a deployment planning component configured to develop a service deployment plan and communication plan related to the proposed change; and an implementation component configured to implement the plurality of SOA shared services that addresses the proposed change. | 09-09-2010 |
20100235213 | HUMAN TASK INTEGRATION INTO BPEL PROCESS VIA PRESENCE DRIVEN DELIVERY - An approach that provides presence driven notification to a subscriber when a business process automation chain requires manual intervention is provided. In one embodiment, there is a notification tool, including a routing component configured to transmit a message to the subscriber based on data gathered relating to subscriber presence, location and preferences. | 09-16-2010 |
20100250293 | SOA POLICY VERSIONING - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for controlling versioning of a service. A programmable policy broker is configured to communicate with a service registry and a policy repository comprising different service levels of a service. A location lookup is centralized in the service registry for different versions of the service. A call for a service by a consumer is mediated by causing the policy broker to select and return a correct service level from the policy repository as a function of a requirement of the consumer, look up a proper version of the service in the service registry from the different versions as a function of the returned correct service level, and call the looked-up proper service from a location associated with the proper service in the service registry. | 09-30-2010 |
20100250295 | SOA LIFECYCLE GOVERNANCE AND MANAGEMENT - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for implementing a service-oriented architecture governance framework. A programmable device configured by a logic component identifies a gap within a service-oriented architecture service orientation enterprise of concern as a function of a service-oriented architecture governance dimension. The service-oriented architecture governance dimension may be a service-oriented architecture business and information technology alignment dimension, a service-oriented architecture ownership and decision rights dimension, a service-oriented architecture asset lifecycle enablement and management dimension or a service-oriented architecture operational management and monitoring dimension. Some methods also identify and select a process within a service-oriented architecture governance dimension applicable to an identified enterprise of concern, apply the selected process against a stage of a service-oriented architecture business service lifecycle management component of the enterprise of concern, and customize and enable a change management process and capability corresponding to the enterprise of concern. | 09-30-2010 |
20100250296 | CALIBRATION FRAMEWORK FOR EFFORT ESTIMATION - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for calibrating and customizing an estimation model as a function of a service-oriented architecture environment. A programmable calibration engine device configured by a logic component generates a service-oriented architecture solution effort estimate as a function of a business available resource input and a required business functionality input. Some methods also include managing a calibration constraint, a policy, an end-user access control, an output scope and an output format and providing a programmable effort estimation engine, providing a set of a predefined constraint, a boundary value and historical calibration data to the effort estimation engine, and generating a service-oriented architecture solution effort estimate as a function of the provided set, the policy and an input of a solution parameter within the scope of a service-oriented architecture transformation. | 09-30-2010 |
20100250297 | CAPABILITY AND MATURITY-BASED SOA GOVERNANCE - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for a service-oriented architecture governance model. Each of a plurality of governance dimension attributes of a service-oriented architecture are calibrated and mapped to each of a plurality of governance evolution element attributes. A maturity and capability assessment is performed for the service-oriented architecture as a function of the mapping, and a maturity-based and capability-based governance model is generated for the service-oriented architecture as a function of the maturity and capability assessment. In one aspect a programmable device is configured to perform at least one of the calibrating, the mapping, the performing the maturity and capability assessment and the generating the maturity-based and capability-based governance model. | 09-30-2010 |
20100250299 | SELECTING A SERVICE ORIENTED ARCHITECTURE SERVICE - An approach that selects a service oriented architecture (SOA) service is provided. In one embodiment, there is a service selection tool, including an identification component configured to identify a process that affects a business objective, and identify a set of functional capabilities of the process. A selection component is configured to select a set of candidate SOA services based on the set of functional capabilities of the process. | 09-30-2010 |
20100250314 | SERVICE PORTFOLIO APPROACH FOR SOA GOVERNANCE - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for implementing a business services portfolio-centric, service-oriented architecture governance framework. Business stakeholders are enabled to manage a business services portfolio, and information technology stakeholders are enabled to manage realization components of the business services portfolio through a service-oriented architecture governance framework. The business stakeholders influence the service-oriented architecture governance framework through interaction with the business services portfolio and an enterprise business portfolio. Some interactions with business services and enterprise business portfolios include establishing a current state of organizational processes of the service-oriented architecture governance framework, assessing a strategic need for enablement of the business services portfolio as a function of the current state, defining a management construct for the business services portfolio as a function of the strategic need, and defining measurement criteria for the business services portfolio as a function of the construct. | 09-30-2010 |
20100250316 | DEVELOPING A SERVICE ORIENTED ARCHITECTURE SHARED SERVICES PORTFOLIO - An approach that develops a service oriented architecture (SOA) shared services portfolio is provided. In one embodiment, there is a portfolio tool, including a decomposition component configured to decompose a business architecture of an enterprise into a set of SOA shared services, and a development component configured to develop a SOA shared service portfolio that is populated with the set of SOA shared services. | 09-30-2010 |
20100250320 | ENABLING SOA GOVERNANCE USING A SERVICE LIFECYCLE APPROACH - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for creating and using shared services through service-oriented architecture governance and a services lifecycle process. Service lifecycle steps are identified within a service-oriented architecture shared services model. Service stakeholders, decision-making touch-points and service state transition touch-points are identified in the shared services model, and service state-based lifecycle governance checkpoints within the shared services model are defined as a function of the identified service lifecycle steps, service stakeholders, decision-making touch-points and state transition touch-points. Further, integration points to existing processes are defined as a function of defined service state-based lifecycle governance checkpoints, governance fit-gap analyses are performed as a function of defined service state-based lifecycle governance checkpoints and identified service stakeholders, and services lifecycle gap touch-points are implemented as a function of the governance fit-gap analysis. | 09-30-2010 |
20100251327 | SOA POLICY ENGINE FRAMEWORK - Methods, including service methods, articles of manufacture, systems, articles and programmable devices provide a policy engine framework. A consumer policy request for a web service is mediated through a functional web service or a policy web service. A single unified method call is made to policy adapters in response to the mediated customer request, each of the policy adapters in communication with a policy server. The policy adapters transform the single unified method call into formats acceptable by each associated policy servers and place the transformed requests to the associated servers. Results from the policy servers are formatted by policy adapters and a policy is selected from a policy registry repository as a function of the formatted results and returned to a requesting consumer. | 09-30-2010 |
20100259386 | SYSTEM AND METHODS FOR LOCATING MOBILE DEVICES USING LOCATION AND PRESENCE INFORMATION - A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device. | 10-14-2010 |
20100262645 | SYSTEM AND METHOD OF OPTIMIZING DIGITAL MEDIA PROCESSING IN A CARRIER GRADE WEB PORTAL ENVIRONMENT - A computer implemented method includes storing generated digital media created by each portal server of a plurality of portal servers in a destination accessible by at least one of a plurality of HTTPD servers in response to a request for web content including the generated digital media. Additionally, the method includes determining that a subsequent request for digital media received by an HTTPD server of the plurality of HTTPD servers is for generated digital media created by any of the plurality of portal servers in the destination and accessible by the HTTPD server. Furthermore, the method includes serving the generated digital media from the HTTPD server to a browser. | 10-14-2010 |
20100280856 | IDENTIFYING SERVICE ORIENTED ARCHITECTURE SHARED SERVICE OPPORTUNITIES - An approach that identifies a service oriented architecture (SOA) shared service opportunity is provided. In one embodiment, there is an opportunity tool, including an identification component configured to identify a plurality of projects from each of a plurality of lines of business; a selection component configured to select a set of projects common to more than one line of business from the plurality of lines of business; and an evaluation component configured to evaluate the set of projects common to more than one line of business from the plurality of lines of business to identify a SOA shared service opportunity. | 11-04-2010 |
20100306074 | SYSTEM AND METHOD TO SUPPORT CODEC DELIVERY MODELS FOR IMS NETWORKS - An architecture (system) and method is provided for transcoding codec information to be sent in a Session Initiation Protocol (SIP) signaling stream for rendering rich digital media content. The method is implemented on a computer infrastructure and includes: determining a codec associated with content to be sent to one or more requesting devices; determining that at least one of the one or more requesting devices do not have the codec associated with the content to be sent to the one or more requesting devices; providing codec information to the at least one of the one or more requesting devices; and sending the content to the one or more requesting devices. | 12-02-2010 |
20110131197 | OPTIMIZING CACHING PERIOD OF LOCATION DATA FOR NETWORK BASED LOCATION SERVICES - A system and associated method for optimizing caching period of location data for network based location services. A location caching server receives a location request from a mobile device. The location caching server calculates, pursuant to a predefined calculation rule, a caching period of a location cache entry for the mobile device based on a precision level requested by the mobile device and a service precision level assigned for a type of location service for which the location request was made. The location caching server obtains real location data of the mobile device of the calculated caching period is expired. The location caching server subsequently adjusts the caching period based on a distance traveled by the mobile device pursuant to a predefined adjustment rule, and updates the location cache entry. | 06-02-2011 |
20110252054 | SYSTEMS AND METHODS OF NETWORKING ENHANCEMENTS USING LOCATION BASED SERVICES - A location based service and method configured to provide a mechanism for information to a subscribing user. The method is implemented on a computing infrastructure and includes querying one or more databases for matching information of a third party that is associated with one or more mobile devices that pass within a predefined location at one or more predefined intervals. The method further includes providing location information to a subscribing user of the one or more mobile devices that have the matching information and pass within the predefined location. | 10-13-2011 |
20110289200 | Mobile Device Workload Management For Cloud Computing Using SIP And Presence To Control Workload And Method Thereof - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP). | 11-24-2011 |
20110289271 | SYSTEM AND METHOD FOR OPTIMIZING DATA RAMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data ramanence over hybrid disk clusters using various storage technologies. The programming instructions are operable to determine one or more data storage technologies accessible by a file system. The programming instructions are operable to determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 11-24-2011 |
20110295666 | OPERATIONAL MANAGEMENT OF MULTI-MEDIA GAMING DEVICES - Operational management of a multi-media system includes assessing end user performance with respect to operation of a multi-media device in the multi-media system. Upon determining a performance value derived from assessment of the end user performance exceeds a pre-defined threshold value, the operational management further includes identifying accommodation options that specify modifications to the operation of the multi-media device and/or operations of another multi-media device in the multi-media system that is engaged in a media activity concurrent with the end user of the multi-media device. | 12-01-2011 |
20120072744 | SYSTEMS AND METHODS TO IMPROVE POWER EFFICIENCY IN HYBRID STORAGE CLUSTERS - Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the systems and methods for reducing power consumption select a particular cache (memory) technology in hybrid storage clusters based on performance requirements and/or other parameters associated with an application (file or process). The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to monitor access patterns of one or more applications in one or more memory technologies in a computing system. The program instructions are also operable to select a memory technology to store the one or more applications based on the access patterns of one or more applications. | 03-22-2012 |
20120072767 | RECOVERY OF FAILED DISKS IN AN ARRAY OF DISKS - A disk recovery system and method is provided for recovering data from a redundant array of independent (or inexpensive) disks. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The computer readable storage medium is operable to: determine input/output (I/O) characteristics of one or more disks in an array; monitor the one or more disks in the array to determine when any of the one or more of the disks have failed in the array; and automatically rebuild the failed disk from a standby pool by nominating a disk in the standby pool based on the I/O characteristics of the one or more failed disks prior to failure. | 03-22-2012 |
20120078643 | GEOGRAPHIC GOVERNANCE OF DATA OVER CLOUDS - Methods and systems for controlling a geographic region of data in cloud computing are described. A method implemented in a computer infrastructure including a combination of hardware and software includes: receiving a request from a local computing device to save data on a network including a plurality of data storage locations in a plurality of different geographic regions; determining a specified geographic region of the plurality of different geographic regions by analyzing at least one of: (i) file attributes associated with the data, and (ii) predefined rules; identifying one of the plurality of data storage locations within the specified geographic region based on the determining step; and routing the data to the identified one of the plurality of data storage locations within the specified geographic region. | 03-29-2012 |
20120078858 | De-Duplicating Data in a Network with Power Management - A method, computer system, and computer program product for managing copies of data objects in a network data processing system. The computer system identifies copies of a data object stored on storage devices. The computer system places the storage devices into groups. Each storage device in a group has a smallest distance from the storage device to a center location for the group as compared to distances to center locations for other groups within the groups. The computer system selects a portion of the copies of the data object for removal from the storage devices based on a management of power for the storage devices such that remaining set of storage devices in each group is capable of handling concurrent requests that have been made historically for the copies of the data object. The computer system removes the portion of the copies of the data object from the storage devices. | 03-29-2012 |
20120110044 | DATA STORAGE IN A CLOUD - Methods and systems for managing storage of data in a cloud by receiving a request, wherein the request includes information to store data within a cloud, environment comprising a plurality of data storages coupled to each other over a network; routing the data to be stored within a specific location of storage within the cloud environment by checking for any regulatory compliance. Other embodiments are also disclosed. | 05-03-2012 |
20120117149 | REDUCING CARBON FOOTPRINT AND PROVIDING POWER SAVINGS IN SESSION INITIATED PROTOCOL CONFERENCING - A method includes determining a first subset of a plurality of links to be set to a first power state and a second subset of the plurality of links to be set to a second power state, different from the first power state, based on estimated data transmission. The method also includes instructing at least one network apparatus to set the first subset of the plurality of links to the first power state and to set the second subset of the plurality of links to the second power state different from the first power state. | 05-10-2012 |
20120123984 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Embodiments of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a datasize of a defined retrieval pattern is larger than a permissible memory resource threshold. | 05-17-2012 |
20120124135 | DELIVERY IN SESSION INITIATED PROTOCOL (SIP) CONFERENCING - A method includes determining conference data associated with a conference and determining an optimum congestion control technique for a call leg of the conference based on the conference data. The determining the conference data includes obtaining or receiving the conference data from at least one of: a Home Subscriber Service (HSS), a presence server, and a conference object. The conference is a Session Initiated Protocol (SIP) conference | 05-17-2012 |
20120130902 | WIRELESS ESTABLISHMENT OF IDENTITY VIA BI-DIRECTIONAL RFID - A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure. | 05-24-2012 |
20120131028 | DETERMINING POINTS OF INTEREST USING INTELLIGENT AGENTS AND SEMANTIC DATA - A method, a system, and a computer program product are provided for determining points of interest using intelligent agents and semantic data. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for receiving a media data comprising a location data comprising where media was captured. The instructions are also operable for determining at least one point of interest based on the media data, tying the media data to the at least one point of interest, and providing the media data tied to the at least one point of interest to an end user. | 05-24-2012 |
20120131159 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 05-24-2012 |
20120135717 | FACILITATING CONTEXT DELIVERY DURING COMMUNICATION SESSIONS - An approach is disclosed that facilitates context delivery during communication sessions. The approach may be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: render at least one service to a user device through a communication session; collect information of the communication session; and send the information of the communication session to a service provider when a call is setup between the user device and the service provider. The service provider renders the information of the communication session for viewing by the service provider. | 05-31-2012 |
20120136907 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 05-31-2012 |
20120173252 | SUBSCRIBER-DRIVEN SYSTEM FOR MANAGING EVENTS IN AN ELECTRICAL GRID - A system and a method are provided for managing events in a smart grid. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: receive a Session Initiation Protocol (SIP) notify message comprising a monitored state of at least one electrical device, from a smart meter; send a SIP publish message comprising the monitored state of the at least one electrical device, to at least one client device for management of the at least one electrical device; and determine and send a rule comprising at least one action to take in response to the monitored state of the at least one electrical device, to the smart meter. | 07-05-2012 |
20120185573 | SYSTEM AND METHOD FOR ACCESSING REALLY SIMPLE SYNDICATION (RSS) ENABLED CONTENT USING SESSION INITIATION PROTOCOL (SIP) SIGNALING - A system and associated method for subscribing Really Simple Syndication (RSS) enabled content using the Session Initiation Protocol (SIP) are disclosed. An application server coupled to a Hypertext Transfer Protocol (HTTP) server in the Internet intermediates a SIP message and a request for a RSS feed. An end device requests subscription of the RSS feed in a SIP message. The HTTP server enables the application server to subscribe the RSS feed and to track changes in the RSS feed over the Internet by use of a Serving Call/Session Control Function (S-CSCF) servicing the SIP message. The HTTP server enables the end device subscribing the RSS feed to fetch the web content from the media cache in later part of the subscription by providing updates to the application server. | 07-19-2012 |
20120190327 | System and Methods for Locating Mobile Devices Using Location and Presence Information - A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device. | 07-26-2012 |
20120190328 | GPS Driven Architecture for Delivery of Location Based Multimedia and Method of Use - An architecture, system and method of use sends location based multimedia to participants of a geo-tour or other application using geo-boundaries and/or other location information. The method includes detecting when a user has crossed within a geo-boundary. The method further includes determining a content type to be sent to a mobile device based on preferences provided by the user. Additionally, the method includes sending user location specific content of the determined content type to the mobile device when the user has crossed within the geo-boundary. | 07-26-2012 |
20120196619 | SYSTEM AND METHODS FOR LOCATING MOBILE DEVICES USING LOCATION AND PRESENCE INFORMATION - A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device. | 08-02-2012 |
20120209995 | SYSTEM AND METHOD TO ENHANCE USER PRESENCE MANAGEMENT TO ENABLE THE FEDERATION OF RICH MEDIA SESSIONS - A method and system is provided to enhance user presence management to enable the federation of rich media sessions. The method is implemented on a system and includes a presence manager server receiving a notification of user activity of one or more users taking place on one or more participating ecosystem sites in a participant ecosystem. The method further includes processing the user activity of the one or more users based on preferences of the one or more participating ecosystem sites established during a registration process and stored in a preference repository. The method further includes sending a notification of the user activity of the one or more users to the one or more participating ecosystem sites in the participant ecosystem to enable the participating ecosystem sites to at least one of communicate the user activity of the one or more users to one or more users and maintain a session of the one or more users. | 08-16-2012 |
20120210147 | MODULAR POWER CONTROL SYSTEM TO MANAGE POWER CONSUMPTION - A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to receive an indication of a geoboundary event and determine an occurrence of at least one of a radio frequency identification (RFID) event and a local area network (LAN) event. Additionally, the programming instructions are operable to adjust one or more power consumption settings of an environment based on at least one of the receiving of the indication of the geoboundary event and the determination of the occurrence of the at least one of the RFID event and the LAN event. | 08-16-2012 |
20120222098 | WIRELESS ESTABLISHMENT OF IDENTITY VIA BI-DIRECTIONAL RFID - A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure. | 08-30-2012 |
20120222100 | ADVANCED CAPTCHA USING INTEGRATED IMAGES - An embodiment of the invention is a CAPTCHA program to determine if a user of a computer is a human or a computer program. The program sends to the computer an image and a portion of the image for display. The program receives from the user an indication of where the portion is located within the image. The portion, as displayed, may be altered in various ways. In response to the user properly indicating the location, the program determines that the user of the computer is a human. In response to the user not properly indicating the location, the program determines that the user of the computer is a computer program. In response to determining that the user of the computer is a human, the program grants the user access to information (database, application, program). In response to determining that the user is a computer program, the program denies access. | 08-30-2012 |
20120226674 | SYSTEM AND METHOD TO SUPPORT CODEC DELIVERY MODELS FOR IMS NETWORKS - An architecture (system) and method is provided for transcoding codec information to be sent in a Session Initiation Protocol (SIP) signaling stream for rendering rich digital media content. The method is implemented on a computer infrastructure and includes: determining a codec associated with content to be sent to one or more requesting devices; determining that at least one of the one or more requesting devices do not have the codec associated with the content to be sent to the one or more requesting devices; providing codec information to the at least one of the one or more requesting devices; and sending the content to the one or more requesting devices. | 09-06-2012 |
20120230478 | CALLEE CENTRIC LOCATION AND PRESENCE ENABLED VOICEMAIL USING SESSION INITIATED PROTOCOL ENABLED SIGNALING FOR IP MULTIMEDIA SUBSYSTEM NETWORKS - An architecture and method of voicemail based on session initiated protocol presence and location information of a callee is disclosed. A method of providing voicemail includes determining a location and a presence of a callee, and playing a customized voicemail greeting to a caller based on preferences defined by the callee and also based on at least one of the location and the presence. | 09-13-2012 |
20120233249 | SUBSCRIBER DRIVEN MEDIA AGNOSTIC CONTENT DELIVERY ACROSS NETWORKS - A system and method is provided to facilitate subscriber driven media agnostic content delivery across same or different networks. The method includes receiving preferences from a sending client and a receiving client and receiving content of a first media type over a network. The method further includes sending the content or a reference to the content to the receiving client in a preferred media type and to a preferred device in accordance with at least one preference of the receiving client. The method also includes notifying at least the receiving client that the content is to be received by the preferred device. | 09-13-2012 |
20120233673 | System and Method to Support Identity Theft Protection as Part of a Distributed Service Oriented Ecosystem - A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device. | 09-13-2012 |
20120233683 | System and Method to Support Identity Theft Protection as Part of a Distributed Service Oriented Ecosystem - A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device. | 09-13-2012 |
20120246322 | MOBILE DEVICE WORKLOAD MANAGEMENT FOR CLOUD COMPUTING USING SIP AND PRESENCE TO CONTROL WORKLOAD AND METHOD THEREOF - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP). | 09-27-2012 |
20120268061 | REAL TIME SYSTEM AND METHOD FOR OPTIMIZING AND MANAGING A LOAD IN AN ELECTRICAL GRID - A system and a method are provided for optimizing and managing a load in an electrical grid. The method includes receiving an event notification associated with a mobile device requiring a charge and determining charging station information of at least one charging station in an electrical grid based on the event notification, the at least one charging station operable to charge the mobile device. The charging station information of the at least one charging station is sent to a user of the mobile device. | 10-25-2012 |
20120276931 | SYSTEMS AND METHODS OF NETWORKING ENHANCEMENTS USING LOCATION BASED SERVICES - A location based service and method configured to provide a mechanism for information to a subscribing user. The method is implemented on a computing infrastructure and includes querying one or more databases for matching information of a third party that is associated with one or more mobile devices that pass within a predefined location at one or more predefined intervals. The method further includes providing location information to a subscribing user of the one or more mobile devices that have the matching information and pass within the predefined location. | 11-01-2012 |
20120282890 | METHODS AND SYSTEMS OF CALL MANAGEMENT - A method implemented in a computer infrastructure includes: determining a current location of a mobile communication device; determining a route of a user associated with the mobile communication device; and determining mobile call rates for the user at locations along the route. | 11-08-2012 |
20120284314 | JOURNALING AND INTEGRITY IN MOBILE CLOUDED COLLABORATIVE SPACES - Methods and systems for journaling and integrity in mobile clouded collaborative spaces are provided. A method includes receiving input data of a mobile device, caching the input data to a remote device, and receiving information associated with the mobile device. The method further includes sending a journaling mode command to the mobile device which instructs the mobile device to journal the input data, based on the information associated with the mobile device. | 11-08-2012 |
20120284527 | METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING - Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk. | 11-08-2012 |
20120291133 | SECURITY COMPLIANT DATA STORAGE MANAGEMENT - An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level. | 11-15-2012 |
20120297021 | SYSTEM AND METHOD TO SUPPORT CODEC DELIVERY MODELS FOR IMS NETWORKS - An architecture (system) and method is provided for transcoding codec information to be sent in a Session Initiation Protocol (SIP) signaling stream for rendering rich digital media content. The method is implemented on a computer infrastructure and includes: determining a codec associated with content to be sent to one or more requesting devices; determining that at least one of the one or more requesting devices do not have the codec associated with the content to be sent to the one or more requesting devices; providing codec information to the at least one of the one or more requesting devices; and sending the content to the one or more requesting devices. | 11-22-2012 |
20120314861 | SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION - A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset originated location information to third parties. The system includes a location platform to determine location information of a remote user, and an encryption service configured to secure the location information of the remote user and send the secure location information to a content provider. | 12-13-2012 |
20120323815 | CAPABILITY AND MATURITY-BASED SOA GOVERNANCE - Each of a plurality of governance dimension attributes of a service-oriented architecture governance model are calibrated and mapped to each of a plurality of governance evolution element attributes. A maturity and capability assessment is performed for the service-oriented architecture as a function of the mapping, and a maturity-based and capability-based governance model is generated for the service-oriented architecture as a function of the maturity and capability assessment. | 12-20-2012 |
20120330543 | SYSTEM AND METHOD FOR PROVIDING PRIVACY AND LIMITED EXPOSURE SERVICES FOR LOCATION BASED SERVICES - A system and method is provided for providing privacy and limited exposure services for location based services. The system includes at least one module configured to provide fictitious location or route information of a mobile user to selected users or group of users based on a mobile user provided profile. | 12-27-2012 |
20130007835 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 01-03-2013 |
20130007872 | SYSTEM AND METHOD FOR CONTEXUALLY INTERPRETING IMAGE SEQUENCES - A system and method for contextually interpreting image sequences are provided. The method comprises receiving video from one or more video sources, and generating one or more questions associated with one or more portions of the video based on at least one user-defined objective. The method further comprises sending the one or more portions of the video and the one or more questions to one or more assistants, receiving one or more answers to the one or more questions from the one or more assistants, and determining a contextual interpretation of the video based on the one or more answers and the video. | 01-03-2013 |
20130013833 | LOCK WAIT TIME REDUCTION IN A DISTRIBUTED PROCESSING ENVIRONMENT - Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed. The amount of time the first plurality of transactions will wait for the second plurality of transactions is reduced based on the historical transaction data. | 01-10-2013 |
20130031640 | ADVANCED CAPTCHA USING IMAGES IN SEQUENCE - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |
20130031641 | ADVANCED AUDIO CAPTCHA - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents to the user a set of audio clips. At least a portion of the set of audio clips suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |
20130035063 | SYSTEM AND METHOD FOR PREVENTING AND/OR LIMITING USE OF A MOBILE DEVICE - A system and a method for preventing and/or limiting use of mobile devices are provided. The method includes receiving, by a mobile device, a message indicating that the mobile device is in a certain location, and determining a user-configured security policy of the mobile device based on the certain location. The method further includes at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy. | 02-07-2013 |
20130047233 | DATA MANAGEMENT WITH A NETWORKED MOBILE DEVICE - A tool for establishing a wireless connection from a mobile device to another device in proximity to the mobile device. The mobile device receives requests for data, such as a user profile, medical records, etc. from the device. The mobile device has the ability to register/preapprove the requesting device allowing the device to access the requested data. The mobile device also has the ability to give varying devices different authorization levels. The mobile device has the ability to store the data on another system, and in response to the request, validate the requesting device and the device's authorization level, request the data from the other system through a network, and return the data to the requesting device. | 02-21-2013 |
20130063272 | SYSTEM AND METHOD FOR DETECTING AND LOCALIZING ABNORMAL CONDITIONS AND ELECTRICAL FAULTS IN AN ELECTRICAL GRID - A system and a method for detecting and localizing abnormal conditions and electrical faults in an electrical grid are provided. A method includes receiving a notification message including a state of an electrical component on an electrical grid. The method further includes displaying, by a computing system, an alarm message indicating the state of the electrical component to a system operator responsible for the electrical component such that system operator is able to determine at least one action to take in response to the state of the electrical component. | 03-14-2013 |
20130063273 | FAULT ISOLATION AND SERVICE RESTORATION IN AN ELECTRIC GRID - Fault isolation and service restoration in an electrical grid are provided. An approach for receiving a notification message including a state of an electrical component on an electrical grid, and determining, by a computing system, a command message including at least one action to take in response to the state of the electrical component, is described. The approach further includes sending the command message to at least one of the electrical component and other electrical components on the electrical grid. | 03-14-2013 |
20130066481 | SYSTEM AND METHOD FOR ENABLING EFFECTIVE WORK FORCE MANAGEMENT OF A SMART GRID - A system and a method are provided for enabling effective work force management of a smart grid. The method includes receiving a first Session Initiation Protocol (SIP) message comprising a state of an electrical component on an electrical grid; and notifying a third party of the state of the electrical component by sending a second SIP message. | 03-14-2013 |
20130080621 | HYBRID STORAGE DEVICES - Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method and system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 03-28-2013 |
20130120105 | MONITORING AND OPTIMIZING AN ELECTRICAL GRID STATE - Monitoring and optimizing a state of an electrical grid are provided. An approach for synchronizing state information associated with one or more electrical devices on an electrical grid, with time information is described. The approach further includes notifying one or more subscribing devices of the synchronized state information such that the one or more subscribing devices monitors and controls the one or more electrical devices based on the synchronized state information. | 05-16-2013 |
20130124001 | MONITORING AND OPTIMIZING AN ELECTRICAL GRID STATE - Monitoring and optimizing a state of an electrical grid are provided. An approach for synchronizing state information and context information, associated with one or more electrical devices on an electrical grid, with time information is provided. The state information is from one or more phasor measurement units (PMUs) associated with the one or more electrical devices, and the context information is from one or more third party servers. The approach further includes notifying one or more subscribing devices of the synchronized state information and the synchronized context information such that the one or more subscribing devices monitors and controls the one or more electrical devices based on the synchronized state information and the synchronized context information. | 05-16-2013 |
20130144845 | REMOVAL OF DATA REMANENCE IN DEDUPLICATED STORAGE CLOUDS - A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to securely delete a file. The method also includes determining the file is deduplicated. The method further includes determining one of: the file is referred to by at least one other file, and the file is not referred to by another file. The method additionally includes securely deleting links associating the file with the local computing device without deleting the file when the file is referred to by at least one other file. The method also includes securely deleting the file when the file is not referred to by another file. | 06-06-2013 |
20130144846 | MANAGING REDUNDANT IMMUTABLE FILES USING DEDUPLICATION IN STORAGE CLOUDS - A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy. | 06-06-2013 |
20130144978 | DATA RELOCATION IN GLOBAL STORAGE CLOUD ENVIRONMENTS - Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user. The method further includes transferring data of the user from a home data server near a home location of the user to the data server near the travel location. | 06-06-2013 |
20130151701 | METHOD FOR ALLOCATING A SERVER AMONGST A NETWORK OF HYBRID STORAGE DEVICES - Methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 06-13-2013 |
20130185645 | DETERMINING REPEAT WEBSITE USERS VIA BROWSER UNIQUENESS TRACKING - An approach for determining repeat website users via browser uniqueness tracking includes receiving browser information from a server based on a browser accessing a website. The approach includes creating a browser identifier based on the browser information. The approach includes determining the browser is one of a new visitor and a repeat visitor to the website by comparing the browser identifier to other browser identifiers associated with the website. The approach includes transmitting a message to the server indicating the browser is one of a new visitor and a repeat visitor to the website based on the determining. | 07-18-2013 |
20130219021 | PREDICTIVE CACHING FOR TELECOMMUNICATION TOWERS USING PROPAGATION OF IDENTIFICATION OF ITEMS OF HIGH DEMAND DATA AT A GEOGRAPHIC LEVEL - Method, computer program product and computer system for predictive caching for telecommunication towers having associated local servers, using propagation of identification of items of high demand data at a geographic level comprising the steps of: receiving within a region at least one request for an item of data made by a user device to a local server associated with a telecommunication tower within the region; and determining if the request is for an item of high demand data. If the item is identified as high threshold data, instructing the local servers within the region to cache the item of data; and if the item is identified as second threshold high demand data, sending an indication to at least one centralized server in an adjacent region, such that the centralized server in the adjacent region causes the local servers within the adjacent region to cache the item of data. | 08-22-2013 |
20130231967 | STRUCTURED COMMUNICATION FOR AUTOMATED DATA GOVERNANCE - The invention is directed to a communication flow for automated data governance. A structured communication model defines and manages information flow between data governance stakeholders (DGS) to provide an integrated workflow leveraging multiple data integration applications. The communication model defines the roles and responsibilities of each DGS, and governs information flow from a source application, through a shared data repository, and onward to multiple reporting environments. The process interacts with middle-ware to manage various aspects of metadata such as the context and meaning of terms and data within systems to enable automated data governance according to the communication model. | 09-05-2013 |
20130238672 | SPECIFYING DATA IN A STANDARDS STYLE PATTERN OF SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS - An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF. | 09-12-2013 |
20130245843 | REAL-TIME MONITORING, CONTROLLING, AND OPTIMIZING ELECTRICAL GENERATION ASSETS BASED ON EMISSION LEVEL MEASUREMENTS - A method is implemented in a computer infrastructure and includes receiving data defining a detected gas emission level of a power generation facility. The method also includes communicating the data defining the detected gas emission level to at least one subscriber device using one of Service Oriented Architecture (SOA) based communication and Session Initial Protocol (SIP) based communication. | 09-19-2013 |
20130252639 | GPS DRIVEN ARCHITECTURE FOR DELIVERY OF LOCATION BASED MULTIMEDIA AND METHOD OF USE - An architecture, system and method of use sends location based multimedia to participants of a geo-tour or other application using geo-boundaries and/or other location information. The method includes detecting when a user has crossed within a geo-boundary. The method further includes determining a content type to be sent to a mobile device based on preferences provided by the user. Additionally, the method includes sending user location specific content of the determined content type to the mobile device when the user has crossed within the geo-boundary. | 09-26-2013 |
20130262590 | RECIPIENT CHANGES IN EMAIL THREADS - A tool for notifying a recipient of an email message, belonging to an email thread, that a recipient address has been added to or dropped from the thread. Address fields of the email message received are compared to the address fields of the most recent prior email message in the thread. Addressed that are determined to be added or dropped are stored in the metadata of the email message received so the added or dropped recipient addresses can be accessed to notify recipients of subsequent emails in the email thread. The metadata of previous email messages in the email thread are accessed to notify the recipient of recipient addresses added or dropped between any two consecutive email messages in the thread. | 10-03-2013 |
20130263242 | TENANT DRIVEN SECURITY IN A STORAGE CLOUD - Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider. The method further includes allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot. | 10-03-2013 |
20130282771 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 10-24-2013 |
20130288710 | SYSTEM AND METHODS FOR LOCATING MOBILE DEVICES USING LOCATION AND PRESENCE INFORMATION - A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device. | 10-31-2013 |
20130290274 | ENHANCED RELIABILITY IN DEDUPLICATION TECHNOLOGY OVER STORAGE CLOUDS - Methods and systems for enhancing reliability in deduplication over storage clouds are provided. A method includes: determining a weight for each of a plurality of duplicate files based on parameters associated with a respective storage device of each of the plurality of duplicate files; and designating one of the plurality of duplicate files as a master copy based on the determined weight. | 10-31-2013 |
20130290387 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 10-31-2013 |
20130290599 | LEVERAGING A HYBRID INFRASTRUCTURE FOR DYNAMIC MEMORY ALLOCATION AND PERSISTENT FILE STORAGE - Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure. | 10-31-2013 |
20130295968 | SYSTEMS AND METHODS OF NETWORKING ENHANCEMENTS USING LOCATION BASED SERVICES - A location based service and method configured to provide a mechanism for information to a subscribing user. The method is implemented on a computing infrastructure and includes querying one or more databases for matching information of a third party that is associated with one or more mobile devices that pass within a predefined location at one or more predefined intervals. The method further includes providing location information to a subscribing user of the one or more mobile devices that have the matching information and pass within the predefined location. | 11-07-2013 |
20130308631 | SYSTEM AND METHOD TO INITIATE A PRESENCE DRIVEN PEER TO PEER COMMUNICATIONS SESSION ON NON-IMS AND IMS NETWORKS - An architecture and method is provided for call routing using both IMS and non-IMS frameworks. The method includes receiving presence information of a third party from a non-IP Multimedia Subsystem (IMS) network device. The method further includes routing the third party to at least one callee designated device based on configurable preferences provided by the callee and correlated to presence information using an IMS compliant component. The method additionally includes providing a charging record for the routing on an IMS complaint charging platform. | 11-21-2013 |
20130339279 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a data size of a defined retrieval pattern is larger than a permissible memory resource threshold. | 12-19-2013 |
20130339848 | DEDUPLICATING SIMILAR IMAGE OBJECTS IN A DOCUMENT - Systems and methods for image deduplication in a file are provided. A method includes identifying a plurality of similar images (e.g., similar intent images) in an electronic document. The method also includes designating one of the plurality of similar images as a master copy. The method also includes replacing each remaining one of the plurality of similar images, other than the master copy, with one of (i) a duplicate copy of the master copy and (ii) a soft link pointing to the master copy. | 12-19-2013 |
20130344895 | DETERMINING POINTS OF INTEREST USING INTELLIGENT AGENTS AND SEMANTIC DATA - A method, a system, and a computer program product are provided for determining points of interest using intelligent agents and semantic data. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for receiving a media data comprising a location data comprising where media was captured. The instructions are also operable for determining at least one point of interest based on the media data, tying the media data to the at least one point of interest, and providing the media data tied to the at least one point of interest to an end user. | 12-26-2013 |
20130346611 | SYSTEM AND METHOD OF USING DIAMETER BASED SIGNALING TO ACTIVATE AND DEACTIVATE SUBSCRIBER CENTRIC, VISUALLY RENDERED, SERVICES - A system and method are provided for providing using Diameter based signaling to activate and deactivate subscriber centric, visually rendered, services. The system is implemented in a computer infrastructure which includes computer executable code tangibly embodied on a computer readable medium. The executable code is operable to activate and deactivate subscriber centric, visually rendered, services using a Diameter based signaling protocol and support home subscriber server (HSS) based subscriber profiles that pertain to visual characteristics. | 12-26-2013 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 01-09-2014 |
20140026191 | SECURITY MODEL FOR A MEMORY OF A NETWORK INFORMATION SYSTEM - Systems and methods for providing information services are disclosed. A method includes passing an instance an object, invoked by a user, to a memory device at a hardware layer of a network information system, the object being hosted for a tenant of a network information service. The method further includes determining by a processing unit of the memory device that storage of the object is not authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes preventing storage of the instance in the memory device based on the result of the determining. | 01-23-2014 |
20140188601 | INTEGRATION BETWEEN BRICK-AND-MORTAR ESTABLISHMENTS AND WEB BASED ESTABLISHMENTS - Approaches are provided for quick response (QR) code and barcode based integration between brick-and-mortar stores and web store fronts. Specifically, an approach is provided that is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine whether an item is in inventory at a physical location of a user, one or more alternate locations, or an on-line store of a merchant, by leveraging a scanned SQ code or bar code of the item. The program instructions are operable to add the item to a virtual cart associated with a mobile device of a user based on the scanned SQ code or bar code. The program instructions are operable to complete an order of the item at one of the physical location of the user, the one or more alternate locations, and the on-line store of a merchant. | 07-03-2014 |
20140250089 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 09-04-2014 |
20140304330 | SYSTEM AND METHOD FOR REDUCING LATENCY OF LOCATION BASED INFORMATION RETRIEVED FROM A LOCATION SERVICE - A system and method is provided for reducing latency when providing user location information services. The system is implemented in a computer infrastructure which includes computer executable code tangibly embodied on a computer readable medium. The executable code is operable to trigger a location based service to obtain user location information prior to the user registering for location services. | 10-09-2014 |
20140325075 | MOBILE DEVICE WORKLOAD MANAGEMENT FOR CLOUD COMPUTING USING SIP AND PRESENCE TO CONTROL WORKLOAD AND METHOD THEREOF - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP). | 10-30-2014 |
20140348310 | CALLEE CENTRIC LOCATION AND PRESENCE ENABLED VOICEMAIL USING SESSION INITIATED PROTOCOL ENABLED SIGNALING FOR IP MULTIMEDIA SUBSYSTEM NETWORKS - An architecture and method of voicemail based on session initiated protocol presence and location information of a callee is disclosed. A method of providing voicemail includes determining a location and a presence of a callee, and playing a customized voicemail greeting to a caller based on preferences defined by the callee and also based on at least one of the location and the presence. | 11-27-2014 |
20150032275 | REAL-TIME MONITORING, CONTROLLING, AND OPTIMIZING ELECTRICAL GENERATION ASSETS BASED ON EMISSION LEVEL MEASUREMENTS - A method is implemented in a computer infrastructure and includes receiving data defining a detected gas emission level of a power generation facility. The method also includes communicating the data defining the detected gas emission level to at least one subscriber device using one of Service Oriented Architecture (SOA) based communication and Session Initial Protocol (SIP) based communication. | 01-29-2015 |
20150032678 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by monitoring usage of a data retrieval point with respect to a defined unit of work. A multilayer feed-forward neural network is used to predict, as a function of training sets composed of historical data generated by the monitored usage of the data retrieval point, a future value of a data size of results from an eager fetch setting for the data retrieval point. The eager fetch is automatically revised to a lazy fetch setting in response to determining that the future data size value of the eager fetch setting results is larger than a permissible memory resource threshold. | 01-29-2015 |
20150039148 | FAULT ISOLATION AND SERVICE RESTORATION IN AN ELECTRIC GRID - Fault isolation and service restoration in an electrical grid are provided. An approach for receiving a notification message including a state of an electrical component on an electrical grid, and determining, by a computing system, a command message including at least one action to take in response to the state of the electrical component, is described. The approach further includes sending the command message to at least one of the electrical component and other electrical components on the electrical grid. | 02-05-2015 |
20150039570 | MANAGING REDUNDANT IMMUTABLE FILES USING DEDUPLICATION IN STORAGE CLOUDS - A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy. | 02-05-2015 |
20150039729 | SYSTEM AND METHOD OF OPTIMIZING DIGITAL MEDIA PROCESSING IN A CARRIER GRADE WEB PORTAL ENVIRONMENT - A computer implemented method includes storing generated digital media created by each portal server of a plurality of portal servers in a destination accessible by at least one of a plurality of HTTPD servers in response to a request for web content including the generated digital media. Additionally, the method includes determining that a subsequent request for digital media received by an HTTPD server of the plurality of HTTPD servers is for generated digital media created by any of the plurality of portal servers in the destination and accessible by the HTTPD server. Furthermore, the method includes serving the generated digital media from the HTTPD server to a browser. | 02-05-2015 |
20150043778 | SYSTEM AND METHOD FOR CONTEXUALLY INTERPRETING IMAGE SEQUENCES - A system and method for contextually interpreting image sequences are provided. The method comprises receiving video from one or more video sources, and generating one or more questions associated with one or more portions of the video based on at least one user-defined objective. The method further comprises sending the one or more portions of the video and the one or more questions to one or more assistants, receiving one or more answers to the one or more questions from the one or more assistants, and determining a contextual interpretation of the video based on the one or more answers and the video. | 02-12-2015 |
20150046410 | ENHANCED RELIABILITY IN DEDUPLICATION TECHNOLOGY OVER STORAGE CLOUDS - Methods and systems for enhancing reliability in deduplication over storage clouds are provided. A method includes: determining a weight for each of a plurality of duplicate files based on parameters associated with a respective storage device of each of the plurality of duplicate files; and designating one of the plurality of duplicate files as a master copy based on the determined weight. | 02-12-2015 |
20150046974 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 02-12-2015 |