ACCENTURE GLOBAL SERVICES LIMITED Patent applications |
Patent application number | Title | Published |
20160117623 | DATABASE MANAGEMENT AND PRESENTATION PROCESSING OF AGRAPHICAL USER INTERFACE - A system for database management and presentation processing of a graphical user interface includes a network interface interfacing with multiple data sources comprising internal systems and external systems, one or more processors, and an application service integration and communication layer to receive data including a live data feed. A data storage device stores schemas of data structures, and the data structures may include tables based on types and fields. The application service integration and communication layer normalizes and formats the live data feed according to the predetermined schemas, and stores the normalized and formatted procurement data in the database. A graphical user interface of true conditions assigned to procurement data in the live data feed is displayed. | 04-28-2016 |
20160117303 | ELECTRONIC DOCUMENT SYSTEM - An electronic document system, for example, includes a network portal that connects to end user devices via a network and generates graphical user interfaces on the end user devices. A database server stores data extracted by data capture entities (DCEs) associated with submitted electronic documents and approval routes for each DCE. An approval route includes steps identifying users and approval actions to be performed by the users. An application server determines an approval route from the stored approval routes for each submitted electronic document, and generates notifications for the users on the approval routes to execute the approval actions, and generates a visual representation of the approval routes in status pages via the network portal. Visual representations in the status pages are updated in real-time to indicate status information for the submitted electronic documents as the submitted electronic documents traverse respective approval routes. | 04-28-2016 |
20160104033 | SYSTEM AND METHOD FOR FACE CAPTURE AND MATCHING - According to an example, a face capture and matching system may include a memory storing machine readable instructions to receive captured images of an area monitored by an image capture device, and detect one or more faces in the captured images. The memory may further store machine readable instructions to track movement of the one or more detected faces in the area monitored by the image capture device, and based on the one or more tracked detected faces, select one or more images from the captured images to be used for identifying the one or more tracked detected faces. The memory may further store machine readable instructions to select one or more fusion techniques to identify the one or more tracked detected faces using the one or more selected images. The face capture and matching system may further include a processor to implement the machine readable instructions. | 04-14-2016 |
20160088157 | CONNECTION ROUTING SYSTEM - According to an example, connections may be routed in a contact center by determining if a current connection from a customer terminal to the contact center is a repeat connection or a first connection. In response to determining that the connection is a repeat connection, the repeat connection is routed to an originating agent terminal when an originating agent is verified as employed, logged-in, and available. In response to determining that the connection is a first connection, the first connection is routed to a best available agent terminal. | 03-24-2016 |
20160086129 | ROOM INVENTORY MANAGEMENT - According to an example, a method for room inventory management may include generating inventory records for rooms for a predetermined time period. An inventory record may include an inventory record index representing a physical property of an associated room, and an inventory record attribute representing a modifiable attribute of the associated room. The method may further include generating keys to identify one or more of the inventory records based on attributes associated with the keys. A key may include a key index that matches the inventory record index for one or more of the inventory records. The method may also include receiving selections of the keys from the generated keys, and generating, by a processor, virtual room pools by grouping the selected keys for each of the selections and the inventory records identified by the selected keys for each of the selections. | 03-24-2016 |
20160055690 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND VALIDATION SYSTEM FOR ZONE-BASED VALIDATION - A secure short-distance-based communication and validation system validates users in a validation area. The system may include multiple zones in the validation area and beacons in each zone. A run-time mobile device identifier and keys that may be location-specific, device-specific and time-specific are generated and utilized for secure communication between mobile devices and a zone computer in a zone. The validation area may be in a vehicle, and validation may include deducting a fare. | 02-25-2016 |
20160055689 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND ACCESS CONTROL SYSTEM - A secure short-distance-based communication and access control system controls access to a restricted area. A run-time mobile device identifier and keys that may be location-specific, device-specific and time-specific are generated and utilized for secure communication between mobile devices and zone computers. The zone computers can validate users via their mobile devices to allow or deny access to the restricted area. | 02-25-2016 |
20160055428 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND ENFORCEMENT SYSTEM - A secure short-distance-based communication and enforcement system validates users in a validation and enforcement area and can check if users in the validation and enforcement area have been validated. Run-time IDs and keys that may be location-specific and device-specific may be generated and utilized for secure communication between mobile devices and zone computers and enforcement computers that execute validation and inspection. | 02-25-2016 |
20160048460 | REMOTE LOAD AND UPDATE CARD EMULATION SUPPORT - Remote load and update card emulation support may include providing emulation support for an emulated card by executing a command set from command sets that include an encrypted read write command set that uses a secure communication read write (SCRW) key, a plain read write command set that uses a plain communication read write (PCRW) key, and an encrypted read command set that uses a secure communication read only (SCR) key. | 02-18-2016 |
20160004984 | SERVICE ORIENTED ARCHITECTURE OPTIMIZATION SYSTEM AND METHOD - A service oriented architecture (SOA) system and method for optimizing an application service composition are provided. The system includes an interface to receive attributes for an experiment, a hardware processor, and a storage device storing instructions to cause the hardware processor to modify a service component of the application service composition based on the received attributes, execute the experiment using the application service composition including the modified service component, generate a unique identifier (UID) to associate with output data generated from the modified service component, and store the UID, the received attributes, and the output data of the experiment in an instance cache. | 01-07-2016 |
20150366486 | INTERACTIVE VIRTUAL CARE - An interactive virtual care system may include a user sensory module to acquire multi-modal user data related to user movement. A data analysis module may compare the multi-modal user data to predetermined historical user data and/or statistical norm data for users to identify an anomaly in the user movement. | 12-24-2015 |
20150365438 | Method and System for Automated Incident Response - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response. | 12-17-2015 |
20150347540 | DATA CONSTRUCTION FOR EXTRACT, TRANSFORM AND LOAD OPERATIONS FOR A DATABASE - An extract, transform and load (ETL) data construction system provides an extensible, interim platform for transitioning data from a legacy database or other data sources to a target database. The data construction system performs data construction operations which may include creating data that can be used for data transformation in ETL operations. The data construction system provides check-in-check-out procedures for controlling multi-user data access and data editing, and also provides multi-level user access checks. | 12-03-2015 |
20150347201 | ANALYTICS FOR APPLICATION PROGRAMMING INTERFACES - API analytics systems and methods are provided. Frequently occurring API usage patterns may be determined from API call data collected from across an API ecosystem. Alternatively or in addition, a classification structure, such as a decision tree, may be generated from the API usage patterns. A type of activity that resulted in a set of API calls being invoked may be determined from the classification structure. A similarity or difference between the set of API calls and the frequently occurring API usage patterns may also be determined and/or identified. | 12-03-2015 |
20150341379 | NETWORK ANOMALY DETECTION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity. | 11-26-2015 |
20150341211 | PERFORMANCE OPTIMIZATIONS FOR WIRELESS ACCESS POINTS - In an example, a performance of an access point in a wireless network is optimized based on a statistical ranking of independent variables. A device analyzer may calculate a dependent variable for the performance of the access point and independent variables that impact the dependent variable from a set of independent variables based on real-time access point data received from a plurality of access points. A predictive modeler may generate a model to forecast the performance of the access point and to determine an impact ranking for the independent variables from the dependent and independent variables. The impact ranking may sequence the independent variables according to their impact on the dependent variable. Accordingly, a configuration circuit may adjust a controllable parameter of the access points according to the impact ranking. | 11-26-2015 |
20150331892 | Minimize Downtime with Immediate Upgrade of Data in Databases - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for updating data stored within the database. In some implementations, actions include providing a plurality of cut-off dates, for each cut-off date in the plurality of cut-off dates determining a total time based on respective times associated with a plurality of tasks to provide a plurality of total times, each total time corresponding to a respective cut-off date, selecting an actual cut-off date based on the plurality of total times, and updating data within the database using the actual cut-off date. | 11-19-2015 |
20150326461 | NETWORK USAGE MONITORING AND ANALYTICS FOR DIFFERENTIATED DATA SERVICES - A system for discovery and analysis of network data usage of users of a communication network may collect information related to data usage over a network. The system may determine network data usage patterns for users from the data usage information. The network usage data, usage patterns and additional information may be analyzed to create user segments, and to analyze network data usage for the user segments. Differentiated data services may be created and implemented based on the network data usage for the user segments. | 11-12-2015 |
20150324433 | COMBINING INTERNAL AND EXTERNAL SEARCH RESULTS - A device may receive information that identifies a search query. The device may use the search query to cause a search of internal and external documents to be performed to identify internal and external search results. The device may cause the internal search results and the external search results to be presented for display. The internal search results may be presented for display to visually distinguish the internal search results from the external search results. The device may receive an indication that an external search result has been flagged for review, and may provide a notification that the external search result has been flagged for review. The device may determine that the external search result has been approved for presentation as an internal search result, and may store an indication that the external search result is to be identified as an internal search result for a future search. | 11-12-2015 |
20150294171 | MULTIMODAL BIOMETRIC PROFILING - Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image based on cover image intensity associated with the predetermined bit position. | 10-15-2015 |
20150278076 | SMART TESTER APPLICATION FOR TESTING OTHER APPLICATIONS - A device may be configured to receive, from a first device, first test scripts for testing an application. The first test scripts may include information for reproducing interactions with the application on the first device. The device may generate second test scripts, for testing the application on a second device, that reproduce the interactions with the application on the second device. The second test scripts may be generated based on the first test scripts and mapping information that maps resources of the first device to resources of the second device. The first device and the second device may be different device types. The device may provide the second test scripts to the second device. The device may receive and store test results of executing the second test scripts on the second device that indicate results of reproducing the interactions on the second device. | 10-01-2015 |
20150271234 | MANIFEST RE-ASSEMBLER FOR A STREAMING VIDEO CHANNEL - A device is configured to receive a playlist identifying content assets to be played on a streaming video channel. Each of the content assets may include segments. The device may add segment addresses associated with a content asset into a queue. The segment addresses may identify memory locations at which the segments included in the content asset are stored. However, the segments themselves may not be stored by the device or added to the queue. The device may generate a batch of segment addresses from the segment addresses in the queue. The device may publish a channel manifest for the streaming video channel including the batch of segment addresses. The content assets may be accessible via the streaming video channel through a single network address. The device may periodically update the channel manifest based on the segment addresses in the queue. | 09-24-2015 |
20150264573 | SECURE DISTRIBUTION OF ELECTRONIC CONTENT - The invention concerns a method of accessing electronic content received by a mobile device, the method comprising: determining a current location of the mobile device; comparing the current location with a zone within which an instance of electronic content may be accessed; when the result of the comparison indicates that the mobile device is located within the zone, accessing by the mobile device the instance of electronic content and providing at least part of the instance of electronic content for display on the mobile device; determining a new current location of the mobile device while the instance of electronic content is being accessed; and checking that the new current location of the mobile device is with the zone, wherein if the mobile device is no longer within the zone, terminating by the mobile device the access to the instance of electronic content. | 09-17-2015 |
20150254158 | EVENT CORRELATION - Event correlation may include identifying a feature set for each log file of a plurality of log files, and extracting the feature set for each event of a plurality of events in each log file of the plurality of log files. Event correlation may further include determining a plurality of trace event pairs linkage strength values for an event from a first log file of the plurality of log files and a plurality of events from a second log file of the plurality of log files. The trace event pairs linkage strength values may represent an overlap of the feature set for the event from the first log file and the feature set for each of the plurality of events from the second log file. | 09-10-2015 |
20150244563 | DIFFERENTIATED SERVICE-BASED GRACEFUL DEGRADATION ERROR - The differentiated service-based graceful degradation layer (DSGDL) allows cloud-based architectures to operate through and recover from periods of limited capability. The DSGDL protects and continues serving higher priority requests with the best possible response even as the underlying cloud-based services deteriorate. The DSGDL offloads lower priority requests to lower-grade secondary capability that can be dynamically provisioned in order to reserve the best capability for maintaining high priority service (e.g., by re-directing lower priority requests to a slightly out-of-date cached dataset, and reserve the primary consistent database for higher priority requests). The DSGDL 1) implements an overlay network over existing cloud services to route and enforce priority requests, and 2) provisions on-demand computing nodes and sites to provide secondary capability for service requests as needed. | 08-27-2015 |
20150242493 | USER-GUIDED SEARCH QUERY EXPANSION - A device may receive information that identifies a search query to be used to search a text. The device may provide information that identifies multiple search query expansion techniques for expanding the search query. The device may receive a selection of one or more search query expansion techniques, of the multiple search query expansion techniques, to be performed to expand the search query. The device may perform the one or more search query expansion techniques to generate a set of expanded search queries based on the search query and the text. The device may search the text, using the set of expanded search queries, to identify multiple sections of the text that include an expanded search query included in the set of expanded search queries. The device may provide search results that identify the multiple sections of the text based on searching the text. | 08-27-2015 |
20150234387 | UNMANNED VEHICLE (UV) CONTROL SYSTEM - Unmanned vehicle (UV) control may include receiving a UV work order and generating a mission request based on the UV work order. The mission request may identify an objective of a mission, assign a UV and a sensor to the mission from a fleet of UVs and sensors, and assign a first movement plan to the mission based on the identified objective of the mission. The assigned UV may be controlled according to the assigned first movement plan, and communication data may be received from the assigned sensor. The communication data may be analyzed to identify an event related to the mission. The identified event and the first movement plan may be analyzed to assign a second movement plan to the mission based on the analysis of the identified event and the first movement plan to meet the identified objective of the mission. | 08-20-2015 |
20150229582 | Performance Interference Model for Managing Consolidated Workloads in QoS-Aware Clouds - The workload profiler and performance interference (WPPI) system uses a test suite of recognized workloads, a resource estimation profiler and influence matrix to characterize un-profiled workloads, and affiliation rules to identify optimal and sub-optimal workload assignments to achieve consumer Quality of Service (QoS) guarantees and/or provider revenue goals. The WPPI system uses a performance interference model to forecast the performance impact to workloads of various consolidation schemes (e.g., consolidation strategies) usable to achieve cloud provider and/or cloud consumer goals, and uses the test suite of recognized workloads, the resource estimation profiler and influence matrix, affiliation rules, and performance interference model to perform off-line modeling to determine the initial assignment selections and consolidation strategy to use to deploy the workloads. The WPPI system uses an online consolidation algorithm, the offline models, and online monitoring to determine virtual machine to physical host assignments responsive to real-time conditions to meet cloud provider and/or cloud consumer goals. | 08-13-2015 |
20150205544 | THREE-DIMENSIONAL OBJECT STORAGE, CUSTOMIZATION, AND DISTRIBUTION SYSTEM - A method for routing object data that defines a 3-dimensional (3D) object to a 3D printer includes receiving the object data at a server and determining, by the server, object attributes associated with the object defined by the object data. The server searches a database that stores 3D printer attributes for one or more 3D printers capable of printing objects that possess the determined object attributes. If one or more capable printers are identified, the server communicates a list that identifies the one or more capable printers to a user. | 07-23-2015 |
20150199112 | SYSTEMS AND METHODS FOR CONFIGURING TILES IN A USER INTERFACE - Methods and systems are disclosed for configuring a plurality of tiles displayed in a graphical user interface. In some embodiments, the method comprises receiving an initial state of the tiles, wherein the initial state includes two overlapping tiles; deriving, via the one or more computer processors, one or more secondary states from the initial state by rearranging the tiles in the initial state; calculating one or more scores for the initial state and the secondary states; and determining, based on the scores, a selected state from among the initial state and the one or more secondary states as a display state to be displayed on the user interface. | 07-16-2015 |
20150193218 | ENHANCED UPGRADE PATH - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for establishing upgrade paths. In one aspect, a method includes establishing an interim environment and platform, migrating the data from the legacy environment and platform to the interim environment and platform, and migrating the data from the interim environment and platform to the upgraded environment and platform. | 07-09-2015 |
20150145692 | SYSTEM FOR PROVIDING REAL TIME LOCATING AND GAS EXPOSURE MONITORING - A system, method, and apparatus for gas exposure monitoring of a work area are described. The apparatus may include a processor; a memory to store a map of a work area; and a communication interface to communicate with sensor devices in the work area. The sensor devices may detect and transmit information identifying a concentration of gas in the work area. The processor may determine coverage of gas detection in the work area by the sensor devices. The processor may determine accuracy of gas detection in the work area by the sensor devices. The processor may generate a report depicting the coverage and accuracy of gas detection in the work area by the sensor devices. | 05-28-2015 |
20150145686 | SYSTEM FOR PROVIDING REAL TIME LOCATING AND GAS EXPOSURE MONITORING - A system, method, and apparatus for gas exposure monitoring of a work area are described. The system may include components that receive an alarm data item from a sensor device. The alarm data item may be generated in response to a first user being exposed to a gas concentration measured by the sensor device. A processor may receive a location of the sensor device in the work area based on a location identifier of the sensor device. A second user located within a predetermined vicinity of the sensor device may be identified. The second user may be identified by the processor. The system may transmit an indication of the alarm data item received from the first user and the location of the sensor device in the work area to the second user. The transmission may be automatic on detection of the second user's location. | 05-28-2015 |
20150137983 | SYSTEM FOR PROVIDING REAL TIME LOCATING AND GAS EXPOSURE MONITORING - A system, method, and apparatus for gas exposure monitoring of a work area are described. The system may include a processor; an interface to communicate with a first device and a second device; and a memory to store first and second gas exposure identifiers and first and second location identifiers received from the first and second devices, respectively. The system may identify a concentration of gas detected by the first device in a work zone. The system may be operable to transmit alert information to the second device when the second device is in the work zone and the concentration of gas detected by the first device in the work zone is above the set amount. | 05-21-2015 |
20150135012 | NETWORK NODE FAILURE PREDICTIVE SYSTEM - In an example, network node failures may be predicted by extracting performance metrics for the network nodes from a plurality of data sources. A fail condition may be defined for the network nodes and input variables related to the fail condition for the network nodes may then be derived from the extracted performance metrics. A plurality of models may then be trained to predict the fail condition for the network nodes using a training set from the extracted performance metrics with at least one of the identified input variables. Each of the plurality of trained models may be validated using a validation set from the extracted performance metrics and may be rated according to predefined criteria. As a result, a highest rated model of the validated models may be selected to predict the fail condition for the network nodes. | 05-14-2015 |
20150120075 | ANALYTICS FOR CONSUMER POWER CONSUMPTION - A system and method for centralized statistical analysis and control of power consumption is provided. The centralized statistical analysis, performed by a centralized power utility management system, may then be compared with one or more goals of the customer. Based on the comparison of the statistical analysis with the one or more goals of the customer, one or more actions may be taken including controlling one or more appliances resident at the customer premises. | 04-30-2015 |
20150109915 | NETWORK TRAFFIC MANAGEMENT - In an aspect, the present application is directed to managing traffic in a network. A capacity request is received, wherein the capacity request comprises a request for capacity on the network. The capacity request is evaluated to determine whether the capacity requested by the capacity request in view of a measure of currently in-use network capacity on the network would exceed a threshold level. If the threshold level would not be exceeded, the capacity request is fulfilled so that a corresponding network request can be granted for transmission over the network; and if the threshold level would be exceeded, retrieving and analyzing real-time capacity data to determine an available network capacity of the network to be compared to the capacity requested in the capacity request. | 04-23-2015 |
20150106324 | CONTEXTUAL GRAPH MATCHING BASED ANOMALY DETECTION - Contextual graph matching based anomaly detection may include evaluating computer-generated log file data to create a master directed graph that specifies known events and transitions between the known events. The master directed graph may be processed to determine a plurality of decomposed master graph walks. Incoming computer-generated log file data may be evaluated to create an incoming directed graph that specifies unknown events and transitions between the unknown events. The incoming directed graph may be processed to determine a decomposed incoming walk. Overlap, distance difference, and correlation scores may be determined for each walk pair of a plurality of walk pairs including each of the plurality of decomposed master graph walks and the decomposed incoming walk. One of the decomposed master graph walks may be selected based on the overlap score, the difference score, and the correlation score, to detect an anomaly. | 04-16-2015 |
20150095895 | TESTING FRAMEWORK FOR POLICY-BASED WORKFLOWS - A system comprehensively tests each feasible path in a policy-based Extensible Markup Language (XML) workflow. The system may receive an input workflow and parse workflow (or proxy code of the workflow) to construct a policy control flow graph. The system may identify paths in the policy control flow graph, such as each feasible path in the policy control flow graph. The system may determine path constraints for the identified paths, where the path constraints identify path conditions for traversing the identified path in the policy control flow graph. Then, the system may generate a set of test inputs for the workflow using the path constraints that, when input into the policy-based XML workflow, cause the workflow to traverse the identified paths. | 04-02-2015 |
20150082275 | EXPRESSION EDITOR SYSTEM - An expression editor system allows a user to build an expression specifying an action that may occur during execution of a target application. The expression editor system includes an expression editor tool used to create, manage, and store action point definitions that include an action point identifier that specifies an action point located in target application program code. The expression editor system determines from the action point definition a dataset that is in-context at the action point in the application program code, obtains data field selections from the dataset that is in-context at the action point in the application program code, graphically builds an expression, and an outcome that executes depending the expression, links the outcome and the expression to form an action point rule for the action point, and saves the action point rule in the database for execution when the application program code reaches the action point. | 03-19-2015 |
20150078547 | CONNECTION ROUTING SYSTEM - According to an example, connections may be routed in a contact center by determining if a current connection from a customer terminal to the contact center is a repeat connection or a first connection. In response to determining that the connection is a repeat connection, the repeat connection is routed to an originating agent terminal when an originating agent is verified as employed, logged-in, and available. In response to determining that the connection is a first connection, the first connection is routed to a best available agent terminal. | 03-19-2015 |
20150067890 | IDENTIFICATION SYSTEM - The invention concerns a method of identification of a person to be identified, comprising: receiving, from an input device ( | 03-05-2015 |
20150066939 | GROUPING SEMANTICALLY RELATED NATURAL LANGUAGE SPECIFICATIONS OF SYSTEM REQUIREMENTS INTO CLUSTERS - A device may analyze text to identify a set of text portions of interest, and may analyze the text to identify a set of terms included in the set of text portions. The device may perform a similarity analysis to determine a similarity score. The similarity score may be determined between each term, included in the set of terms, and each text portion, included in the set of text portions, or the similarity score may be determined between each term and each other term included in the set of terms. The device may determine a set of dominant terms based on performing the similarity analysis. The set of dominant terms may include at least one term with a higher average degree of similarity than at least one other term. The device may provide information that identifies the set of dominant terms. | 03-05-2015 |
20150066581 | DEVICE FOR INCREASING SELF-SERVICE ADOPTION - A device is configured to receive customer information associated with a set of customers and determine a set of self-service customers, of the set of customers, based on the customer information. The set of self-service customers may be associated with a likelihood, of participating in future self-service transactions, that is greater than a first threshold. The device is configured to determine attribute information associated with the set of self-service customers and identify a set of target customers, of the set of customers, based on the attribute information. The set of target customers may be associated with a likelihood, of participating in future self-service transactions, that is less than a second threshold. The device is configured to determine target information based on identifying the set of target customers, and to provide the target information. The target information may include information that identifies the set of target customers. | 03-05-2015 |
20150058349 | IDENTIFYING AND CLASSIFYING NON-FUNCTIONAL REQUIREMENTS IN TEXT - A device may obtain text to be categorized, and may determine rules for categorizing portions of the text. A rule may specify text patterns to be used to categorize the portions of the text into a category, and may specify a relationship, between at least two text patterns, to be used to categorize the portions of the text into the category. The device may determine that the text patterns and the relationship between the at least two text patterns exist in a text portion. The device may categorize the text portion into the category based on determining that the text patterns and the relationship between the at least two text patterns exist in the text portion. The device may provide an indication of an association between the text portion and the category based on categorizing the text portion into the category. | 02-26-2015 |
20150058247 | SYSTEM FOR DETERMINING A RELATIVE LOCATION OF A PLURALITY OF ITEMS UPON A PLURALITY OF PLATFORMS - A system is described for determining a relative location of a plurality of items upon a plurality of platforms. The system may include a memory, an interface, and a processor. The memory may store a first item, a second item, a first period of time and a second period of time. The interface may be operative to communicate with a user and an antenna. The antenna may be able to detect an item for a period of time. The processor may be operative to receive from the antenna, via the interface, the first item, the first period of time, the second item and the second period of time. The processor may determine whether the periods of time overlap. If the periods of time overlap the processor may communicate to the user that the items are upon the same platform, otherwise that the items are on consecutive platforms. | 02-26-2015 |
20150046083 | DYNAMIC ETA AND STA TRANSPORTATION SYSTEM - A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or geo-section. | 02-12-2015 |
20150045646 | INTERACTIVE VIRTUAL CARE - An interactive virtual care system may include a user sensory module to acquire multi-modal user data related to user movement. A data analysis module may compare the multi-modal user data to predetermined historical user data and/or statistical norm data for users to identify an anomaly in the user movement. | 02-12-2015 |
20150012634 | Performance Interference Model for Managing Consolidated Workloads In Qos-Aware Clouds - The workload profiler and performance interference (WPPI) system uses a test suite of recognized workloads, a resource estimation profiler and influence matrix to characterize un-profiled workloads, and affiliation rules to identify optimal and sub-optimal workload assignments to achieve consumer Quality of Service (QoS) guarantees and/or provider revenue goals. The WPPI system uses a performance interference model to forecast the performance impact to workloads of various consolidation schemes usable to achieve cloud provider and/or cloud consumer goals, and uses the test suite of recognized workloads, the resource estimation profiler and influence matrix, affiliation rules, and performance interference model to perform modeling to determine the initial assignment selections and consolidation strategy to use to deploy the workloads. The WPPI system uses an online consolidation algorithm, the offline models, and online monitoring to determine virtual machine to physical host assignments responsive to real-time conditions to meet cloud provider and/or cloud consumer goals. | 01-08-2015 |
20150012530 | DETERMINING AN EMERGENT IDENTITY OVER TIME - A device may receive identity information associated with an identity, and may determine a relationship between at least one of: the identity and another identity, or the identity and an attribute. The device may determine a credibility score, associated with the relationship, that indicates a likelihood that the relationship is an accurate representation of the identity. The device may determine a confidence score based on the identity information and the credibility score, and may output or store the confidence score. | 01-08-2015 |
20140380441 | SECURE AND AUTOMATED CREDENTIAL INFORMATION TRANSFER MECHANISM - A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the central server sends it a secret text string. The virtual machine requests the credentials from the central server by transmitting the secret string and its instance ID. The central server validates the secret string and source IP to determine whether they are authentic. Once verified, the central server transmits the credentials to the virtual machine in a secure channel and invalidates the secret string. The credentials can now be used to authenticate API calls. | 12-25-2014 |
20140364985 | MASTER BILL OF MATERIALS CREATION - Master BOM creation may include extracting BOM data from first and second BOMs, and determining which BOM extracted data is greater. If the first or second BOM is a CAD BOM and the other BOM is a non-CAD BOM, the CAD BOM and non-CAD BOMs may be respectively used as a first and a second source BOM data for a master BOM table. If the first and second BOMs are non-CAD BOMs, or both of the first and second BOMs are CAD BOMs, the greater and lesser of the first and second BOM extracted data may be respectively used as the first and as the second source BOM data. A master BOM may be created based on mapping of the master BOM table to the second source BOM data. | 12-11-2014 |
20140359767 | METHOD AND SYSTEM FOR APPLICATION MIGRATION DUE TO DEGRADED QUALITY OF SERVICE - A method and system for managing an application in a cloud data center by monitoring the bandwidth of a subnet of which the primary operating instance of an application is a member. If a severe deterioration in the bandwidth caused by an over consumption of the subnet resources from other subnet constituents is detected, a suitable secondary instance in an alternate, uncompromised subnet is located and primary operation of the application is transferred from the former primary operating instance to the secondary instance. The secondary instance can be pre-launched or dynamically requisitioned according to various embodiments. | 12-04-2014 |
20140359129 | Migration Assessment for Cloud Computing Platforms - Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a Platform as a Service (PaaS). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform. | 12-04-2014 |
20140358666 | CROSS-CHANNEL PERSONALIZED PROMOTION PLATFORM - A platform for providing real-time promotions determines a customer interested in a product or service. The platform identifies customer information associated with the customer, as well as a set of products of interest to the customer. The platform identifies a supplier or advertiser associated with each of the products and receives promotion bids from one or more of the suppliers or advertisers. The platform generates a score for each of the received promotion bids, selects at least one of the promotion bids for transmission to the mobile device, and transmits the selected at least one promotion bids to the mobile device. The platform tracks customer behavior associated with the at least one promotion bids and provides the tracked behavior information back to the suppliers or advertisers. | 12-04-2014 |
20140351694 | Document Analysis, Commenting and Reporting System - A document analysis, commenting, and reporting system provides tools that automate quality assurance analysis tailored to specific document types. As one example, the system may implement state machines that evaluate document structure instances to determine whether the document structure instances conform to pre-defined syntaxes. The state machines may include error states and final states, and messages may be associated with the error states for display when a state machine reaches the error state. | 11-27-2014 |
20140344783 | SYSTEMS AND METHODS FOR FINDING PROJECT-RELATED INFORMATION BY CLUSTERING APPLICATIONS INTO RELATED CONCEPT CATEGORIES - A system, method, and computer-readable medium, is described that finds similarities among programming applications based on semantic anchors found within the source code of such applications. The semantic anchors may be API calls, such as Java's package and class calls of the JDK. Latent Semantic Indexing may be used to process the application and semantic anchor data and automatically develop a similarity matrix that contains numbers representing the similarity of one program to another. | 11-20-2014 |
20140337825 | Enhanced Upgrade Path - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for establishing upgrade paths. In one aspect, a method includes establishing an interim environment and platform, migrating the data from the legacy environment and platform to the interim environment and platform, and migrating the data from the interim environment and platform to the upgraded environment and platform. | 11-13-2014 |
20140337820 | SOURCE CODE FLOW ANALYSIS USING INFORMATION RETRIEVAL - According to an example, source code flow analysis may include receiving source code for an application, and identifying virtual flow documents for the application from the source code. The virtual flow documents may represent ordered sequences of method calls for the application. The source code flow analysis may further include extracting features of the virtual flow documents, determining similarity between the virtual flow documents by estimating similarities for the extracted features to determine a flow-to-flow similarity, and clustering the virtual flow documents based on the flow-to-flow similarity. The flow-to-flow similarity may be further used, for example, to generate highest priority virtual flow documents and methods for the source code. The source code flow analysis may also include determination of flow-to-maintenance activity description (MAD) similarity, for example, to identify relevant virtual flow documents from the virtual flow documents based on the flow-to-MAD similarity to generate ordered relevant virtual flow documents. | 11-13-2014 |
20140324732 | METHOD AND SYSTEM FOR OPERATING A PROJECT PORTFOLIO MANAGEMENT TOOL AND A PRODUCT LIFECYCLE MANAGEMENT TOOL - The invention relates to a method for operating a Project Portfolio Management tool (PPM tool) and a Product Lifecycle Management tool (PLM tool). The PPM tool ( | 10-30-2014 |
20140304680 | SYSTEMS AND METHODS FOR HANDLING DATABASE DEADLOCKS INDUCED BY DATABASE-CENTRIC APPLICATIONS - Systems and methods are provided for handling database deadlocks induced by database-centric applications (DCAs). SQL statements and transactions associated with the DCAs are analyzed and parsed to generate Petri net models. A supervisory modeler generates augmented Petri net models based on the Petri net models, which are used in generating supervisory control. The supervisory control is used in handling database deadlocks. | 10-09-2014 |
20140303988 | COLLABORATIVE HEALTHCARE - According to an example, collaborative healthcare may include retrieving healthcare data for a patient from at least one data source, and generating a plurality of distinct healthcare programs for the patient based on the healthcare data. Collaborative healthcare may further include reconciling the plurality of distinct healthcare programs to generate a universal patient healthcare plan for the patient. The universal patient healthcare plan may include a universal view of the overall healthcare for the patient and healthcare provider-specific views for the patient. The reconciling may include detecting conflicts for predetermined components of the healthcare programs, and in response to the detection of the conflicts, eliminating errors related to the detected conflicts. | 10-09-2014 |
20140297335 | REUSABLE PRODUCT SYSTEM - A system is configured to allow a business user to define insurance products based upon reusable product/offering definitions. The reusable product/offerings definitions may include reusable insurance based components and templates, which permit a business user of the software to develop and configure insurance products based upon a hierarchical set of insurance product components and insurance product templates. In addition, the system combines componentization, flexible granularity and reusable product structures to permit a user to more rapidly and predictably generate insurance product configurations and flexibly tailor the insurance products or offerings to meet a specific client or market need. | 10-02-2014 |
20140288992 | IDENTIFICATION, CATEGORIZATION, AND INTEGRATION OF UNPLANNED MAINTENANCE, REPAIR AND OVERHAUL WORK ON MECHANICAL EQUIPMENT - An automated interactive method dynamically identifies an unplanned maintenance task during execution of a planned maintenance task on equipment. A user device displays a maintenance menu system for data entry and access and provides an input relating to unplanned maintenance task discovered on the equipment. The unplanned maintenance task is associated with the planned maintenance task at least with respect to a location. The automated interactive method sequentially processes unplanned maintenance task information based on the input from the user device. A user such as a technician enters component data by answering an initial tailored question. An additional tailored question chosen based on a response entered by the technician to the initial tailored question is presented. | 09-25-2014 |
20140283048 | DATA TREND ANALYSIS - According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts within the data. In response to determining that co-occurrences of term and concept pairs reach a predefined threshold, the method may include adding the term and concept pairs to an ontology. The method may include logging occurrences of terms in the ontology within the data with respect to associated data times, identifying a plurality of time periods, and for one of the plurality of time periods and for the logged terms, determining a first score indicative of a weighted term frequency metric for a logged term within the data during the one time period, and determining a second score indicative of a commonality of a presence of the logged term within the data among the plurality of time periods. | 09-18-2014 |
20140282473 | Software Upgrade Analysis System - A system may include computer code for analyzing an upgrade from a first version to a second version of a software program that has been customized without performing the upgrade. The system may provide default state information of default program objects. The default program objects would be included in a default installation of the second version of the software program. The computer code may retrieve current state information of current program objects from an application database. The software program that has been customized may include the current program objects. The system may generate upgrade information based on a comparison between the current state information and the default state information. The upgrade information may identify a subset of the current program objects that would be impacted by the upgrade. | 09-18-2014 |
20140282407 | TEST SCRIPT GENERATION SYSTEM - A test script generation system may generate end-to-end test scripts to test a software application. A workflow generator may generate recommendations of suggested modules corresponding to domain-specific reference application maps to include in a workflow. A visual representation of the workflow may be generated and provide an indication of suggested modules that have not been included in the workflow. A script generator may generate the end-to-end test scripts based on the workflow. | 09-18-2014 |
20140282379 | COMPUTER-IMPLEMENTED METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING A USER INTERFACE COMPONENT - A user interface component is displayed according to an implementation language independent description. An implementation language dependent specification for the user component is created from the implementation language independent description. The user interface component is created and displayed according to the implementation language dependent specification. | 09-18-2014 |
20140281676 | SYSTEM-LEVEL ISSUE DETECTION AND HANDLING - Issue detection and handling technology in which issue definitions that enable detection of issues at different devices of an enterprise level system that operate different applications are maintained. Solution definitions that relate to resolving issues detected based on the issue definitions are also maintained. Issue detection logic based on the issue definitions is provided to each of the different devices of the enterprise level system. Issue detection information collected based on the issue detection logic is received from at least one of the different devices of the enterprise level system. Based on the issue detection information, an issue at the at least one device is determined. A solution definition related to resolving the determined issue is accessed from the solution definitions. Based on the accessed solution definition, an operation directed to handling the determined issue is performed. | 09-18-2014 |
20140281645 | ENCHANCED GRID RELIABILITY THROUGH PREDICTIVE ANALYSIS AND DYNAMIC ACTION FOR STABLE POWER DISTRIBUTION - A power grid stabilizing system may include a processor and a network interface executable by the processor to monitor for new event data from power consumption devices over a network. The new event data may include information such as device location, operating information, and sensor data. The system may include an estimation engine operable to analyze the new event data to determine power consumption behavior of a consumption device, and a predictor operable to anticipate an occurrence of a future event responsive to the analysis. The predictor may also predict the outcome of the future event based on analysis of the new event data in relation to past behavior data of the consumption device. The network interface may further communicate the anticipated future event and the predicted outcome to one or more of the other consumption devices. | 09-18-2014 |
20140280925 | Method And System For Client-Side Scaling Of Web Server Farm Architectures In A Cloud Data Center - A novel web server farm architecture is provided that combines various cloud components and innovatively maximizes their strengths to achieve a scalable, adaptable, load balanced computing architecture. In one embodiment, this architecture includes a storage host for static content hosting, a cluster of virtual machines (operating as web servers) for dynamic content hosting, and a dedicated application engine for monitoring the load of the virtual machines. A browser or end-application user of a web application is first routed to a static anchor page hosted on the storage host. The browser is subsequently presented with a list of virtual machines and data corresponding to their respective current loads. To access dynamic content, the browser is able to select from the virtual machines based in large part on the reported current loads of the virtual machines. Once a virtual machine is selected, the browser may communicate directly with the selected web server. | 09-18-2014 |
20140279558 | Two-Way, Token-Based Validation for NFC-Enabled Transactions - Systems, methods and computer program products that facilitate the token-based validation of contactless payment and other transactions involving NFC-enabled mobile devices are disclosed. In an aspect, the system includes a server and field-located validator devices to which consumers can present their NFC-enabled mobile devices in order to validate their purchases/payments. In one aspect, a consumer can purchase an admission ticket to a public transport system using their mobile device which communicates directly with the server to receive a token. The user can later present their mobile device to the validator device to actuate a turnstile. Advantageously, the validator devices do not have to be in real-time communication with the server, and limit the duration between the mobile device's request for a token and the time by which the token expires. Increased security is provided through two-way, token-based validation between the mobile and validator devices. | 09-18-2014 |
20140279322 | DOCUMENT TRACKING TOOL - Tracking technology, in which document information for at least one document received for processing by a document processing system is obtained. The document processing system is configured to process the at least one document in stages that are performed by at least two different applications operated by at least two separate hardware systems. Status updates indicative of processing of the at least one document in each of the stages are obtained. A progress of the processing of the at least one document in each of the stages based on the status updates is tracked. The at least one document meets one or more pre-defined processing requirements related to the processing are evaluated. Information about the stages of the processing of the at least one document based on the tracked progress and the evaluation is reported. | 09-18-2014 |
20140278931 | TIME-VARYING MODELING FOR MARKETING DRIVERS - A marketing modeling system may include a modeling engine to determine a time-varying marketing driver model to estimate marketing driver contributions to sales for marketing drivers, and determine a time-varying parameter and multiply the time varying parameter by an independent time-varying variable in the time-varying marketing driver model. A driver contribution estimation module in the system may apply the time-varying marketing driver model to consecutive fine-grained time periods to determine estimated contributions to sales for each fine-grained time period and for each marketing driver. | 09-18-2014 |
20140278798 | SYSTEM AND METHOD FOR ESTIMATING CUSTOMER LIFETIME VALUE WITH LIMITED HISTORICAL DATA AND RESOURCES - The present invention generally relates to estimating a customer's lifetime value to a company. The customer's lifetime value to the company can be based on remaining value of existing products and one or both of new purchase value and historic profitability. The remaining value and new purchase value for the customer may be estimated based on the customer's current customer segment and the customer's predicted future migration to a different customer segment. In addition, the remaining value may be estimated based on expected customer attrition, and the new purchase value may be estimated based on expected individual customer purchases. | 09-18-2014 |
20140278779 | CHURN PREDICTION AND MANAGEMENT SYSTEM - A system and method for managing churn among the customers of a business is provided. The system and method provide for an analysis of the causes of customer churn and identifies customers who are most likely to churn in the future. Identifying likely churners allows appropriate steps to be taken to prevent customers who are likely to churn from actually churning. The system included a dedicated data mart, a population architecture, a data manipulation module, a data mining tool and an end user access module for accessing results and preparing preconfigured reports. The method includes adopting an appropriate definition of churn, analyzing historical customer to identify significant trends and variables, preparing data for data mining, training a prediction model, verifying the results, deploying the model, defining retention targets, and identifying the most responsive targets. | 09-18-2014 |
20140278598 | CACHING RESERVATION OPTIONS - Caching travel options, in which a first request is received for lowest available fare data and, responsive to the first request, a determination is made that data for the lowest available fare is not included in a cache. Based on the determination, a request is provided to a core system for the data and the data for the lowest available fare is received from the core system. The received data is stored in the cache and used to respond to the first request. After storing, in the cache, the received data, a second request is received for the lowest available fare. Responsive to the second request, a determination is made that the data for the lowest available fare is included in the cache and, based on that determination, the data is accessed from the cache and used to respond to the second request. | 09-18-2014 |
20140278439 | VOICE BASED AUTOMATION TESTING FOR HANDS FREE MODULE - An electronic control unit (ECU) of a hands-free module may be tested by an automated voice based testing tool in a first device. The tool reads test input data from an Excel input file. The tool generates simulated audible voice commands in a specified language, accent, pitch, volume or speed to test the hands-free module. The voice commands are transmitted via a speaker to a hands-free module microphone. The hands-free ECU is coupled to a CAN bus and the tool receives CAN bus information corresponding to hands-free module operations. The tool outputs test verdict information and/or CAN bus message logs as text in an Excel file. | 09-18-2014 |
20140278199 | AUTOMATION OF D-BUS COMMUNICATION TESTING FOR BLUETOOTH PROFILES - An electronic control unit (ECU) is tested by an automated D-bus testing tool in a first device. The test tool establishes one or more secure shells between the first device and the ECU. The tool reads test input data from an Excel input file. The ECU comprises a software stack including a test client, a Bluetooth middle layer and a hardware abstraction layer, that communicate internally relative to the ECU, via a D-bus. The test tool sends function calls and parameters via the secure shells to the ECU to test execution of Bluetooth functions and/or Bluetooth profiles. The function calls enable simulation of a human machine interface by the test client. The tool monitors API call returns and logs D-bus communications via the one or more secure shells. The test tool outputs test verdict information and/or D-bus communication logs as text in an Excel file. | 09-18-2014 |
20140276106 | INTERACTIVE VIRTUAL CARE - An interactive virtual care system may include a user sensory module to acquire multi-modal user data related to user movement. A data analysis module may compare the multi-modal user data to predetermined historical user data and/or statistical norm data for users to identify an anomaly in the user movement. | 09-18-2014 |
20140272833 | METHOD AND SYSTEM FOR OPTIMAL CURRICULUM PLANNING AND DELIVERY - Methods and systems are disclosed for planning and delivering curricula and specifically for managing learning and development in organizations. In some embodiments, a method for conducting training in an organization comprises identifying a candidate project in the organization, wherein identifying the candidate project includes determining that the candidate project is at risk and that a level of training for the candidate project is below a training threshold conducting, by one or more processors, a marginal benefit analysis including determining a marginal success rate increase as a function of a training level increase; conducting, by the one or more processors, a learning effectiveness analysis including determining a plurality of effectiveness scores and a plurality of cost values corresponding to a plurality of training courses; and determining a training plan for an employee of the organization based on the marginal benefit analysis and the learning effectiveness analysis. | 09-18-2014 |
20140270164 | CONFIGURABLE KEY-BASED DATA SHUFFLING AND ENCRYPTION - A data shuffling and encryption system may include data storage to store a key and a coding module to shuffle and encrypt an input data sequence. The shuffling and encrypting may include determining an n-dimensional space and populating the n-dimensional space with the input data sequence. A quasi-random function may be applied to sample the n-dimensional space, and samples may be used as an index into the n-dimensional space to determine an output data sequence from the n-dimensional space. | 09-18-2014 |
20140258519 | Methods For Measuring Physical Cpu Utilization In A Cloud Computing Infrastructure - Novel techniques are provided to determine concurrent hardware resource usage as expressed in activity performed by hardware processors. A cloud computing consumer can verify the level of the quality of service provided by the physical infrastructure of a cloud, thereby allowing the consumer the ability to request a transfer of the hosting physical infrastructure to a less burdened physical machine. | 09-11-2014 |
20140258326 | MANUFACTURING QUALITY INSPECTION AND ANALYTICS SYSTEM - A quality inspection and analytics system may include a quality inspection module to receive the information for inspection lots and display the information for the inspection lots simultaneously in a scrollable screen via a user interface. The information for the inspection lots may include inspection metrics, expected values for the inspection metrics and measured values for the inspection metrics. The quality inspection module may receive a usage decision and store the usage decision. Also, the system may include a quality analytics module to execute causal analysis of rejected inspection lots based on the inspection lot information. | 09-11-2014 |
20140258301 | ENTITY DISAMBIGUATION IN NATURAL LANGUAGE TEXT - A device analyzes first text to identify a pair of terms, within the first text, that are alias terms. The device analyzes the first text by performing two or more of: a latent semantic analysis of the pair of terms, based on the pair of terms being associated with a particular tag; a tag-based analysis that determines that the pair of terms are associated with compatible tags; a transitive analysis that determines that a pair of neighbor terms, associated with the pair of terms, are associated with compatible tags; or a co-location analysis based on a distance between the pair of terms in the first text. The device generates, based on analyzing the first text, a glossary that includes the pair of terms identified as alias terms. The device replaces terms within the first text or a second text that is different from the first text, using the glossary. | 09-11-2014 |
20140257976 | APPARATUS AND METHOD FOR ENHANCING TRANSACTIONS USING RULE INFORMATION TO COMMUNICATE WITH MULTIPLE APPLICATIONS - A method and apparatus provides information to enhance at least one of: a sales, a service and an administrative transaction by communicating with a plurality of applications from a group of applications in accordance with rule information and based on at least two of the received: end user identification information, client identification information and transaction type information. In one example, the apparatus includes a rules engine, an application integrator, an integration and presentation module, and an integrated user interface. The rules engine causes the application integrator to communicate with a plurality of applications in accordance with the rule information, and at least two of: the end user identification information, the client identification information, and the transaction type information. The application integrator then generates integrated output information received from the plurality of applications to produce the integrated user interface that includes output from the plurality of applications. Based on end user input, the integrated user interface then provides interactive user response information to the application integrator which passes the interactive user response information to the rules engine. The rules engine then determines which of at least one additional supporting application of available applications to use in a next stage of the transaction, which may be the same as or different applications from the plurality of applications. The application integrator then communicates with the additional supporting applications and accordingly updates the integrated output information on the integrated user interface to include output from the at least one additional supporting application. | 09-11-2014 |
20140257887 | Minimize Downtime with Immediate Upgrade of Data in Databases - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for updating data stored within the database. In some implementations, actions include determining a cut-off date, defining a first group of data within a first table based on the cut-off date, defining a second group of data within the first table based on the cut-off date, providing the second group of data in a second table, converting the first group of data from a first data structure to a second data structure to provide converted first data within the first table, making the converted first data available for access over a network, converting the second group of data from the first data structure to the second data structure to provide converted second data in the second table, and making the converted second data available for access over the network. | 09-11-2014 |
20140256361 | METHOD FOR PASSIVE MINING OF USAGE INFORMATION IN A LOCATION-BASED SERVICES SYSTEM - A method and system for providing advertising effectiveness searching capabilities, predictive modeling capabilities and usage mining in a location-based services system is disclosed. During operation of the location-based services system, usage information for advertising campaigns placed on the location-based services system is stored. Advertisers are provided with the ability to enter a search request form on a remote terminal to mine the usage information. The search request is then transmitted to an application that searches usage information to generate a response to said search request. | 09-11-2014 |
20140250226 | SYSTEM FOR MANAGING A REMOTE DATA PROCESSING SYSTEM - A method for managing, with a base data processing system of a primary business entity, a remote data processing system of a secondary business entity via a communications network is provided. The method includes steps of the base data processing system receiving a report message on at least one technical parameter from the remote data processing system via the communications network and interpreting the report message to determine a state of interoperability between the base data processing system and the remote data processing system. | 09-04-2014 |
20140250210 | SYSTEM FOR DELAYED VIDEO VIEWING - The disclosure concerns methods of playback of a video stream comprising: receiving from a first user device ( | 09-04-2014 |
20140249865 | CLAIMS ANALYTICS ENGINE - Methods and systems for processing claims (e.g., healthcare insurance claims) are described. For example, prior to payment of an unpaid claim, a prediction is made as to whether or not an attribute specified in the claim is correct. Depending on the prediction results, the claim can be flagged for an audit. Feedback from the audit can be used to update the prediction models in order to refine the accuracy of those models. | 09-04-2014 |
20140247466 | External Device Interface Abstraction - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for executing a user interface on a computing device, generating one or more event handlers executed on the computing device, each event handler corresponding to a local device service file, receiving first data at a first event handler of a first local device service associated with a first device that is in electronic communication with the computing device, generating, using the first event handler, a first event that includes the first data, receiving, at an external device service, the first event, generating, using the external device service, a first external device event based on the first event, and performing a first action based on the external device event. | 09-04-2014 |
20140244295 | CLINICAL QUALITY ANALYTICS SYSTEM WITH RECURSIVE, TIME SENSITIVE EVENT-BASED PROTOCOL MATCHING - A clinical quality analytics system may include a data storage to store electronic medical record (EMR) data. The system may map events from the EMR data to a process map through a recursive matching process. The mapping may include recursively matching the events to nodes in threads in a map based on event times and thread times. One of the recursions may be selected as a best fit based on metrics determined for the recursions. | 08-28-2014 |
20140236812 | COMMUNICATIONS NETWORK, COMPUTER SYSTEM, COMPUTER-IMPLEMENTED METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A FEMTOCELL-BASED INFRASTRUCTURE FOR MOBILE ELECTRONIC PAYMENT - In one aspect, the present application is directed to a communications network, a computer system, a computer-implemented method, and a computer program product for providing a femtocell-based infrastructure for mobile electronic payment. In an aspect, the communications network may include a mobile operator network; a local area in the mobile operator network, wherein the local area is under coverage of at least one femtocell; and a femtocell-based payment system connected to the mobile operator network, wherein the femtocell-based payment system is operable to provide mobile electronic payment via a user device recognized by the at least one femtocell within the local area and notified by the femtocell-based payment system. | 08-21-2014 |
20140223567 | INCIDENT TRIAGE ENGINE - An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue. | 08-07-2014 |
20140222610 | INCREASED VISIBILITY DURING ORDER MANAGEMENT IN A NETWORK-BASED SUPPLY CHAIN ENVIRONMENT - A system, method and article of manufacture are provided for a first business entity to provide a network-based supply chain framework for collaborative order management between at least a second and a third independent business entity, such as a service provider, vendor, reseller, manufacturer and the like. A request for an order is received over a network with an automated system, from at least a second business entity. The order is transmitted over a network, with an automated system, to at least the third business entity. Information is received from the third business entity relating to a status of completion of the order by the third business entity using a network. The progress in completing the order is tracked based on the information received from the third business entity. Progress reports from the tracking are generated periodically; and transmitted to the second business entity using the network. | 08-07-2014 |
20140214877 | METHOD AND APPARATUS FOR GENERATING AND USING AN INTEREST GRAPH - Methods and apparatuses are provided for generating, updating, and using an interest graph. A plurality of interests representing a plurality of subjects' affinities towards a plurality of topics may be obtained. A processing device may generate an interest graph based on the obtained interests. The generated interest graph may include: (i) at least two nodes, each of the at least two nodes representing an interest of the obtained interests, wherein the obtained interests are free of any personally identifiable information associated with the plurality of subjects and (ii) at least one link connecting a first node to a second node of the at least two nodes, the at least one link representing a relatedness of the interest represented by the first node to the interest represented by the second node. | 07-31-2014 |
20140207666 | ACCOUNT AND CUSTOMER CREATION IN AN ON-LINE BANKING MODEL - A system, method and article of manufacture are provided for account and customer creation in an online banking model. An application is received from a customer. The application includes information relating to the user and also documentation relating to the user. A first computer is utilized to create a profile for the customer based on the application received from the customer. The first computer is also utilized to create an account for the customer. Information relating to the created profile and account is transmitted from the first computer to a second computer where a notification is generated. The notification indicates that the account has been created. The notification is transmitted from the second computer to the customer utilizing a network. | 07-24-2014 |
20140201541 | SECURE ONLINE DISTRIBUTED DATA STORAGE SERVICES - The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to the attacker, stores data across multiple cloud storage providers and/or parties using keys (e.g., tokens) provided by multiple parties (including the owners of the data) and maintains data confidentiality and integrity even where one or more data storage provider is compromised. The data vaporizer is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations, and backup and recovery constraints. | 07-17-2014 |
20140172782 | ENTERPRISE MIGRATION PLANNING INFORMATION REPOSITORY - A data migration tool is disclosed for allowing a data migration project to be more efficient to execute from the client standpoint. The data migration tool is able to accomplish this by offering an efficient process for receiving the client's data migration requirements and generating a migration schedule based on the client's data migration requirements. The client's data migration requirements may identify one or more migration rules relating the data to be migrated as well as the client's scheduling conflicts. Based on the data migration requirements, the data migration tool can generate a data migration schedule. The data migration schedule may include a sequence in which data entities are migrated, as well as provide migration activities that describe the specific instructions for migrating a data entity. | 06-19-2014 |
20140172707 | DYNAMIC AUTHENTICATION TECHNOLOGY - A request to perform a transaction is detected. Based on the request to perform the transaction, one or more factors related to a context in which the transaction is being requested are determined. Based on the one or more factors, one or more parameters for authenticating a user that requested performance of the transaction are determined. The user that requested performance of the transaction is authenticated based on the determined one or more parameters for authenticating the user that requested performance of the transaction. Based on to authenticating the user that requested performance of the transaction, performance of the requested transaction is allowed. | 06-19-2014 |
20140172493 | MANAGING AN INVENTORY OF SERVICE PARTS - An inventory of service parts may be managed by assessing a company's capability, optimizing the inventory and implementing a management program based on the assessment and optimization. Optimizing target stock levels for the inventory of parts may be accomplished by calculating an inventory baseline for understanding information about the currently held inventory; developing a service strategy for a set of segments; quantifying a service level for each of the segments; analyzing the segments and their service levels for identifying at least one logistically distinct business; assigning each of the segments to a “best-fit” planning model for indicating each segment's deployment, replenishment, forecasting and review characteristics; identifying a probability distribution function for estimating a demand process of each of the segments; and calculating a target stock level for each segment. | 06-19-2014 |
20140172482 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 06-19-2014 |
20140172371 | ADAPTIVE FAULT DIAGNOSIS - According to an example, an adaptive fault diagnosis system may include a memory storing machine readable instructions to receive metrics and events from an enterprise system, and use a substitution graph to determine if a received metric or a received event belongs to a cluster that includes one or more correlated metrics and/or events grouped based on similarity. If the received metric or the received event belongs to the cluster, the memory may further store machine readable instructions to use a detection graph to determine if the received metric or the received event is identifiable to form a fault pattern by traversing a fault path of the detection graph. Further, the memory may further store machine readable instructions to diagnose a fault based on the traversal of the fault path of the detection graph. The system may include a processor to implement the machine readable instructions. | 06-19-2014 |
20140163966 | IDENTIFYING GLOSSARY TERMS FROM NATURAL LANGUAGE TEXT DOCUMENTS - A device may obtain text to be analyzed to identify glossary terms. The device may analyze a linguistic unit to generate multiple linguistic units related to the linguistic unit. The device may analyze the multiple linguistic units to generate potential glossary terms. The device may perform a glossary term analysis on the potential glossary terms to generate glossary terms that include a subset of the potential glossary terms. The device may identify included terms that are included in the glossary terms. The device may identify excluded terms that are excluded from the glossary terms. The device may determine a semantic relatedness score between at least one excluded term and at least one included term. The device may selectively add the excluded linguistic term to the glossary terms to form a final set of glossary terms based on the semantic relatedness score, and may output the final set of glossary terms. | 06-12-2014 |
20140157224 | COMMUNICATIONS NETWORK, COMPUTER ARCHITECTURE, COMPUTER-IMPLEMENTED METHOD AND COMPUTER PROGRAM PRODUCT FOR DEVELOPMENT AND MANAGEMENT OF FEMTOCELL-BASED APPLICATIONS - In one aspect, the present application is directed to a communications network, a computer architecture, a computer-implemented method, and a computer program product for development and management of femtocell-based applications. In one aspect, the communications network may comprise at least one femtocell; a mobile operator network; and a computer architecture integrated in the mobile operator network, wherein the computer architecture is operable to support development and lifecycle management of at least one femtocell-based application for the at least one femtocell. | 06-05-2014 |
20140149485 | METHOD AND SYSTEM FOR MANAGING USER STATE FOR APPLICATIONS DEPLOYED ON PLATFORM AS A SERVICE (PAAS) CLOUDS - The REsilient LOosely Coupled (ReLoC) system and method implement a session-state management architecture for cloud computing that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Maintaining the state of applications and user sessions is difficult in large scale web-based software systems, particularly in the context of cloud computing (e.g., platform as a service (PaaS) vendors, do not explicitly support state management infrastructure, such as clustering). In a PaaS environment, a user has little or no access and control over the server platform and session management layer. The platform tiers are generally loosely coupled and service-oriented, which make traditional session-state management techniques non-usable. The ReLoC system and method provides a high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. In the context of PaaS Clouds, the ReLoC system provides greater scalability compared to traditional clustering environments. | 05-29-2014 |
20140149400 | DATA CONSISTENCY MANAGEMENT - A data consistency management system may include a memory storing machine readable instructions to receive a query, and determine a suitability of the query for processing by a NoSQL data store, or a RDBMS. The memory may further include machine readable instructions to rank data tables based on a combination of read queries and query patterns suitable for the NoSQL data store. Based on the ranking, the memory may further include machine readable instructions to determine data tables that are to be managed by the NoSQL data store, or by the RDBMS, determine whether the query is for a data table managed by the NoSQL data store, and based on a determination that the query is for a data table managed by the NoSQL data store, translate the query to NoSQL API calls for using the NoSQL data store to respond to the query. | 05-29-2014 |
20140143239 | DATABASE ANONYMIZATION FOR USE IN TESTING DATABASE-CENTRIC APPLICATIONS - At least one quasi-identifier attribute of a plurality of ranked attributes is selected for use in anonymizing a database. Each of the ranked attributes is ranked according to that attribute's effect on a database-centric application (DCA) being tested. In an embodiment, the selected quasi-identifier attribute(s) has the least effect on the DCA. The database is anonymized based on the selected quasi-identifier attribute(s) to provide a partially-anonymized database, which may then be provided to a testing entity for use in testing the DCA. In an embodiment, during execution of the DCA, instances of database queries are captured and analyzed to identify a plurality of attributes from the database and, for each such attribute identified, the effect of the attribute on the DCA is quantified. In this manner, databases can be selectively anonymized in order to balance the requirements of data privacy against the utility of the data for testing purposes. | 05-22-2014 |
20140142834 | SITUATION-AWARE MOBILE TRAVEL ADVISORY TO PUBLIC TRANSPORT COMMUTERS - A method for managing a public transport system comprises receiving information indicating a change of status of a component of a public transport system; identifying a commuter who is affected by the change of status; generating an alternative travel advisory for the commuter based on the change of status; and transmitting the alternative travel advisory to the commuter. In some embodiments the change of status includes a delay in an expected time of arrival of a public transport vehicle; identifying the commuter includes locating the commuter in the vehicle; and the alternative travel advisory includes a message advising the commuter to leave the vehicle. In some embodiments, locating the commuter in the vehicle is based on comparing a location of the commuter with a location of the vehicle. In some embodiments, the method further comprises receiving from the commuter information indicating that the commuter has boarded the vehicle. | 05-22-2014 |
20140141764 | INTEGRATED NUMBER MANAGEMENT MODULE AND SERVICE ORDER SYSTEM - A number inventory system is disclosed. The number inventory system manages the relationships between SIM cards, IMSI numbers, and MSISDN for a mobile telecommunications service provider. The number inventory system provides the software and hardware for receiving SIM card inventory data, including associated IMSI numbers, and efficiently stores the SIM card inventory data in a database. The number inventory system further provides for the opening of a range of available MSISDN. SIM cards, IMSI and MSISDN may be assigned to customer orders, and the number inventory system manages the associations between IMSI numbers and MSISDN and monitors the status of SIM cards, IMSI numbers and MSISDN. The number inventory system may also manage an MSISDN classification system for identifying MSISDN numbers having various desirable sequence characteristics. | 05-22-2014 |
20140136464 | DATA QUALITY MANAGEMENT FOR PROFILING, LINKING, CLEANSING, AND MIGRATING DATA - A data quality management system includes a rules repository configured to store profiling data quality rules, cleansing data quality rules, and linking data that links profiling data quality rules to cleansing data quality rules. The data quality management system also includes a rules management module configured to manage the rules repository. The data quality management system further includes a data quality job management module configured to migrate data quality rules from the rules repository to a data quality processing system and manage a data quality process performed by the data quality processing system using the migrated data quality rules. | 05-15-2014 |
20140136377 | ROOM INVENTORY MANAGEMENT - According to an example, a method for room inventory management may include generating inventory records for rooms for a predetermined time period. An inventory record may include an inventory record index representing a physical property of an associated room, and an inventory record attribute representing a modifiable attribute of the associated room. The method may further include generating keys to identify one or more of the inventory records based on attributes associated with the keys. A key may include a key index that matches the inventory record index for one or more of the inventory records. The method may also include receiving selections of the keys from the generated keys, and generating, by a processor, virtual room pools by grouping the selected keys for each of the selections and the inventory records identified by the selected keys for each of the selections. | 05-15-2014 |
20140133692 | USER EXPERIENCE ANALYSIS SYSTEM TO ANALYZE EVENTS IN A COMPUTER DESKTOP - A user experience analysis system to measure a user experience associated with a computer desktop may include an event capture subsystem and a duration analysis subsystem. The event capture subsystem may capture videos of the desktop before and after an infrastructure change. The duration analysis subsystem may analyze the videos to determine and compare durations of events occurring in the desktop that are captured in the videos, and determine changes in user experience based on the analysis. | 05-15-2014 |
20140129861 | CONTROLLING A DATA STREAM - The present application relates to a computer implemented method, a computer program product and a computer system for controlling a data stream from a server computer to a client computer. The client computer comprises a data stream client and the server computer comprises a data stream server. While receiving, by the data stream client from the data stream server, the data stream, the method may comprise generating, by the client computer, a power management decrease event, receiving, by the data stream client, the power management decrease event, sending, from the data stream client to the data stream server, a first pause request to temporarily halt the data stream, and transitioning, by the client computer, from a fully working power state to a decreased power consumption state in response to the power management decrease event. | 05-08-2014 |
20140129746 | REAL-TIME DATA MANAGEMENT FOR A POWER GRID - The present disclosure relates to real-time data management for a power grid and presents a real-time data management system, a system, method, apparatus and tangible computer readable medium for accessing data in a power grid, a system, method, apparatus and tangible computer readable medium for controlling a transmission delay of real-time data delivered via a real-time bus, and a system, method, apparatus and tangible computer readable medium for delivering real-time data in a power grid. In the real-time data management system of the present disclosure, a unified data model covering various organizations and various data resource is designed and a management scheme for clustered data is used to provide a transparent and high speed data access. Besides, multi-bus collaboration and bus performance optimization approaches are utilized to improve efficiency and performance of the buses. The real-time data management system may also include an event integration and complex event process component to provide a credible prediction on status of the power grid. With embodiments of the present disclosure, it may efficiently manage the high volume of real-time data and events, provide data transmission with a low latency, provide flexible extension of both the number of data clusters and the number of databases to ensure high volume data storage, and achieve a high speed and transparent data access, Additionally, it also enable the rapid design and development of analytical applications, and support the near real-time enterprise decision-making business. | 05-08-2014 |
20140129395 | DETECTION OF STOCK OUT CONDITIONS BASED ON IMAGE PROCESSING - Image analysis techniques, including object recognition analysis, are applied to images obtained by one or more image capture devices deployed within inventory environments. The object recognition analysis provides object recognition data (that may include one or more recognized product instances) based on stored product (training) images. In turn, a variety of functionalities may be enabled based on the object recognition data. For example, a planogram may be extracted and compared to a target planogram, or at least one product display parameter for a product can be determined and used to assess presence of the product within the inventory environment, or to determine compliance of display of the product with a promotional objective. In yet another embodiment, comparisons may be made within a single image or between multiple images over time to detect potential conditions requiring response. In this manner, efficiency and effectiveness of many previously manually-implemented tasks may be improved. | 05-08-2014 |
20140123304 | DATA ANONYMIZATION BASED ON GUESSING ANONYMITY - Privacy is defined in the context of a guessing game based on the so-called guessing inequality. The privacy of a sanitized record, i.e., guessing anonymity, is defined by the number of guesses an attacker needs to correctly guess an original record used to generate a sanitized record. Using this definition, optimization problems are formulated that optimize a second anonymization parameter (privacy or data distortion) given constraints on a first anonymization parameter (data distortion or privacy, respectively). Optimization is performed across a spectrum of possible values for at least one noise parameter within a noise model. Noise is then generated based on the noise parameter value(s) and applied to the data, which may comprise real and/or categorical data. Prior to anonymization, the data may have identifiers suppressed, whereas outlier data values in the noise perturbed data may be likewise modified to further ensure privacy. | 05-01-2014 |
20140122615 | SYSTEM FOR ANALYZING USER ACTIVITY IN A COLLABORATIVE ENVIRONMENT - A system is described for analyzing user activity in a collaborative environment. The system may include a memory, an interface, and a processor. The memory may store a plurality of data items. Each data item may be related to at least one other data item. The processor may receive a request to alert the user when an action is performed on a selected data item. The processor may also receive a relation threshold identifying at least one other data item related to the selected data item. The processor may detect the action being performed on the data item identified by the relation threshold. The processor may transform data describing the action into an alert. The alert may include the data describing the action, the data item, and a description of the relationship between the data items. The processor may provide the alert to the user via the device. | 05-01-2014 |
20140122463 | CUSTOM WEB SERVICES DATA LINK LAYER - A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation layer, as examples. The presentation layers may be graphical user interfaces that display or report complex data sets, with the data storage layer providing the source data for the presentation layers. The data interface implements a data link layer that efficiently caches, stores, and locates query results, while simultaneously handling security. The data link layer may include load balancing, efficient cache refresh, and other features. | 05-01-2014 |
20140122216 | POINT OF SALE PAYMENT METHOD - The invention concerns a method of making a payment transaction between a customer and a merchant using a payment card ( | 05-01-2014 |
20140115143 | SYSTEM FOR MANAGING ELECTRONIC ASSETS OF A SOFTWARE SERVICE DELIVERY ORGANIZATION - An asset management system (AMS) facilitates management of electronic assets of a software service delivery organization. The AMS may facilitate classification of the electronic assets according to delivery phases in which each electronic asset is usable and accordingly enables users to identify and download the suitable assets usable in a desired delivery phase. The AMS also may receive from the users, usage data for (representing an extent of use of) the downloaded electronic assets and generate a set of utilization characteristics of the electronic asset based on the usage data. In addition, the AMS may facilitate classification of the assets according to a set of technology areas in which each electronic asset is applicable. On identifying that a new user is expected to operate in a specific technology area, the AMS may determine and provide suitable assets applicable to the specific technology area. | 04-24-2014 |
20140114898 | DETERMINATION OF DOCUMENT CREDIBILITY - A plurality of topics encompassed in a document are determined and, for each such topic, a sentiment for that topic is likewise determined. Thereafter, credibility of the document is determined based on the resulting plurality of sentiments. In one embodiment, credibility of at least one target document is established by first determining, for each of a plurality of portions of the at least one target document, at least one topic encompassed in the portion to provide a plurality of target topics. Likewise, sentiment scores are determined for each portion. Thereafter, for each prior topic of a plurality of prior topics, a topic-sentiment score is determined based on sentiment scores corresponding to those portions of the plurality of portions having a target topic corresponding to the prior topic. A credibility index is determined based on the resulting plurality of topic-sentiment scores. | 04-24-2014 |
20140114743 | System For Individualized Customer Interaction - A method and system for using individualized customer models when operating a retail establishment is provided. The individualized customer models may be generated using statistical analysis of transaction data for the customer, thereby generating sub-models and attributes tailored to customer. The individualized customer models may be used in any aspect of a retail establishment's operations, ranging from supply chain management issues, inventory control, promotion planning (such as selecting parameters for a promotion or simulating results of a promotion), to customer interaction (such as providing a shopping list or providing individualized promotions). | 04-24-2014 |
20140108083 | TASK MANAGEMENT FOR A PLURALITY OF TEAM MEMBERS - Each of a plurality of team members may define a task by providing data concerning a task to a centralized controller, wherein each task may be assigned any other team member of the plurality of team members. The controller may receive task event information from a first team member of the plurality of team members regarding a task, which task is associated within the controller with the first team member and a second team member. The controller subsequently sends updated task information, based on the task event information, to both the first team member and the second team member. Relevant to any given task, the task event information may comprise a task delegation indication, which may further comprise a non-delegation indication such that further delegation of the task in not permitted. | 04-17-2014 |
20140101111 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 04-10-2014 |
20140101063 | COUNTERFEIT DETECTION - A counterfeit detection system may include a memory storing a module comprising machine readable instructions to determine a X-identification (XID) associated with a product. The XID may include an unencrypted component and/or an encrypted component associated with a parameter associated with the product. The machine readable instructions may further include selecting one or more validation rules, from a plurality of validation rules, to select one or more validation techniques from a plurality of validation techniques used to determine an authenticity of the product. The machine readable instructions may further include using the one or more selected validation techniques to determine the authenticity of the product based on the XID associated with the product. The counterfeit detection system may include a processor to implement the module. | 04-10-2014 |
20140099918 | COMPUTER-IMPLEMENTED METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR TELECOMMUNICATIONS RATING - The present application relates to a computer-implemented method, system, and computer program product for telecommunications rating. The computer-implemented method for telecommunications rating may comprise: receiving an event from a source system for a service, wherein the event is generated by a user; transforming the event into a normalized event by determining event characteristics comprising determining a guiding point identifier to identify a guiding point associated with the user; by using the guiding point identifier, retrieving from the guiding point a list of products operable to guide the normalized event; rating the normalized event by calculating and aggregating costs according to the list of products; and posting the costs by updating at least one balance associated with the user, the guiding point, and/or the service. | 04-10-2014 |
20140095938 | LATENT DEFECT IDENTIFICATION - A method of determining test data for use in testing software involves identifying software that is known to have one or more bugs and which has a similar structure to software under test before using knowledge of those one or more bugs to create test data for the software under test. | 04-03-2014 |
20140095937 | LATENT DEFECT INDICATION - A method of determining test data for use in testing a software. The method includes determining that at least part of a software structure of the software to be tested is similar to, or the same as, a software structure associated with a defect. The method also includes retrieving information regarding operational circumstances for causing the defect in the software associated with the defect. The method further includes creating, based upon the retrieved information, test data for testing the software to be tested. | 04-03-2014 |
20140095501 | System and Method of Integrating Enterprise Applications - The present disclosure includes systems and techniques relating to enterprise application integration. In general, one aspect of the subject matter described in this specification can be embodied in a computer system including a service oriented architecture (SOA), where the system includes a composite application configured to present sales targeted information by combining services from multiple application resources on a network, wherein the multiple application resources include: a sales force automation (SFA) tool configured to automate sales and sales force management functions; a real-time predictive analytics tool configured to evaluate customer purchasing data and recommend products or services based on the customer purchasing data; a knowledge management tool configured to search and retrieve data across multiple integrated applications; and a calendar tool configured to manage appointment scheduling. The multiple application resources can further include a collaboration tool; and a business intelligence tool, including at least one live news feed. | 04-03-2014 |
20140093140 | LIVENESS DETECTION - An image of a portion of a person's body is accessed, the image having been captured by an image capture device. Using the image, measurements of characteristics in the image are obtained, the characteristics in the image having been selected based on a statistical analysis of characteristics (i) in a plurality of first images taken directly of a person and (ii) in a plurality of second images taken of an image of a person. Based on a liveness function, a score for the image is determined using the obtained measurements of the characteristics in the image. A threshold value is accessed. The score of the image is compared to the accessed threshold value. Based on the comparison of the score of the image to the accessed threshold value, the image is determined to be have been taken by the image capture device imaging the portion of the person's body. | 04-03-2014 |
20140082525 | ACTION ORIENTED SOCIAL COLLABORATION SYSTEM - An action oriented social collaboration system monitors users' interactions with computer software applications. The system provides the interactions to a social networking system. The system publishes the interactions data to a social networking/collaboration interface viewable by members of a group, such as a project team. The system not only publishes data corresponding to a user's interactions with the computer software application, but also publishes the user's interactions with the computer software application to interfaces corresponding to other project team members as well. | 03-20-2014 |
20140082072 | DYNAMIC EXPERT SOLICITATION, COLLABORATION AND REPUTATION MANAGEMENT SYSTEM - A dynamic expert solicitation, collaboration and reputation management system monitors and matches tasks with experts qualified to perform the tasks. The system receives a request for assistance associated with a task from a user. The request for assistance includes task information such as a due date, at least one skill associated with the task, and badges assigned to the task. The system publishes the request for assistance to at least one community of practice web page from among a plurality of community of practice web pages, and obtains a response to the request for assistance from another user. Upon completion of the task, they system allocates the badges to a profile of the second user, and publishes completion of the task to an activity feed of the community of practice web site. | 03-20-2014 |
20140081959 | ENTERPRISE ACTIVITY PATTERN ANALYSIS SYSTEM - An enterprise activity pattern analysis system retrieves log data from a social networking system. The log data includes information characterizing user interactions with a team group space hosted by, or document uploaded to, the social networking system. The system analyzes the log data to detect patterns in the user interactions. The system embeds widgets into the group space and into the documents uploaded to the social networking system that provide visual representations of the pattern analysis. | 03-20-2014 |
20140078292 | METHOD AND SYSTEM FOR ANALYZING GEOMETRIC PARAMETERS OF AN OBJECT - The present invention concerns a method of geometrical analysis of an object comprising: placing the object in front of a lit surface, such that it is silhouetted; taking at least one photograph of the silhouetted object to obtain an image with an outline of the object; and obtaining geometrical parameters of the object based on the outline of the silhouetted object. | 03-20-2014 |
20140075005 | CLOUD SERVICE MONITORING SYSTEM - A cloud services monitoring system (CSMS) helps a consumer of cloud computing resources determine the state of the cloud computing resources available to the consumer. The CSMS is particularly effective for cloud models where the consumer of the cloud computing resources is not the same as the provider of the cloud resource. The CSMS also provides mechanisms for adjusting operations actions to preserve service guarantees for the consumer. In that regard, the CSMS dynamically adjusts operations actions in response to the state of the cloud, rather than executing fixed pre-determined operations actions that are not tailored to the monitored conditions. | 03-13-2014 |
20140074938 | PROVIDING EXCESS RESOURCES AS A SERVICE - An integrated content production environment includes a connected services framework providing connectivity to a set of applications that produce content for the media industry. Users in their roles use the integrated environment to perform setting up, ingesting, logging, selecting, editing, reviewing, playout, distributing, and archiving activities. Notifications are dynamically triggered to users when their action is requested. The notifications may be instant messages, e-mails, voice mails, etc. Throughout the production of content, actions by both users the applications are tracked and stored in a log file for processing. The action data in the log file may include payload data from messages. When one or more applications or when one or more users of the environment have excess capacity, that capacity can be leveraged. External users can purchase or bid on the excess capacity and can then access the environment through available web services. | 03-13-2014 |
20140074567 | Electronic Toll Management - Identifying a vehicle in a toll system includes accessing a set of toll transaction entries. Each entry in the set designates a toll transaction between a vehicle and the toll system and includes a transaction descriptor and a transaction time stamp. A series of toll transaction pictures is accessed. The series includes a plurality of pictures, each of which is associated with a picture time stamp. A toll transaction entry is identified from the set as a violation transaction entry based on the transaction descriptor. A toll transaction picture is selected from the series. The transaction time stamp of the violation transaction is compared, using a processing device, with the picture time stamp of the selected toll transaction picture. The selected toll transaction picture is identified as a violation picture corresponding to the violation transaction entry based on a result of the comparison. | 03-13-2014 |
20140074304 | METHOD, SYSTEM AND APPARATUS FOR LOAD SHAVING OF A POWER GRID AND A TANGIBLE COMPUTER READABLE MEDIUM - The present disclosure provides a system, method and apparatus for load shaving of a power grid, and a tangible computer readable medium. The system may comprise at least one processor; and at least one memory storing computer executable instructions. The at least one memory and computer executable instructions may be configured to, with the at least one processor, cause the system to profile behavior data for power customers to divide the power customers into at least one group; define, based on usage characteristic of each of the at least one group, a possible load shaving strategy for each of the at least one group; and perform load shaving analysis at least under constraint of the possible load shaving strategy for each of the at least one group, to provide a recommended load shaving strategy for each of the power customers. | 03-13-2014 |
20140067630 | Real-Time Earned Revenue - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for realizing revenue in real-time, the revenue being earned from a travel conveyance. Methods include determining that a travel conveyance status has changed from a first status to a second status, in response to determining that the travel conveyance status has changed, automatically generating a status message, the status message comprising a travel conveyance manifest, and transmitting the status message, receiving, at a computer-implemented accounting service, the status message and in response to receiving the status message, automatically processing the travel conveyance manifest to realize revenue based on one or more bookings associated with the travel conveyance, and updating an accounting associated with the travel conveyance based on realized revenue, the accounting being stored in computer-readable memory. | 03-06-2014 |
20140067518 | MULTI-CHANNEL MARKETING ATTRIBUTION ANALYTICS - A marketing analytics system may include a mixed marketing channel modeling module to determine a mixed marketing channel model for a macro level, and an attribution analysis module to determine values for variables associated with behaviors of individuals for a microsegment associated with the macro level. A marketing analytics engine may identify individuals with similar behaviors, needs and preferences, and facilitate targeted product or service offerings to the microsegment. | 03-06-2014 |
20140063191 | VIRTUAL ACCESS CONTROL - Virtual access control may include detecting entry of a person into a virtual controlled zone, and counting and/or identifying people including the person entering into the virtual controlled zone. Virtual access control may further include determining an authorization of the person to continue through the virtual controlled zone based on a facial identification of the person, and alerting the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization. An alarm may be generated if the person violates directions provided by the alert. | 03-06-2014 |
20140052659 | LEARNING MANAGEMENT - A learning management system may include a memory storing a module comprising machine readable instructions to create a learning map comprising one or more learning nuggets, and provide access to a user to the learning map for adding the learning map to a user's list of learning maps or contributing to the learning map. The machine readable instructions may further assign a public or private setting to the learning map to respectively allow the user to add the learning map to the user's list of learning maps or contribute to the learning map. The learning management system may include a processor to implement the module. | 02-20-2014 |
20140040287 | SMART PARSING OF DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automatically parsing data from disparate data sources. In some implementations, actions include receiving first data from a first data source, identifying a first regular expression that corresponds to a data format of the first data, selecting a first set of parsing rules from a plurality of parsing rules based on the first regular expression, parsing the first data based on the first set of parsing rules to provide a first set of sub-data, populating data fields of a first data object with respective sub-data from the first set of sub-data, and transmitting the first data object to a computing device. | 02-06-2014 |
20140039960 | MULTIPLE SIMULTANEOUS SESSION SUPPORT BY A REMOTE TECHNICIAN USING PRELIMINARY QUEUES - In a remote technical support system, a technical support controller receives an indication of a maximum number of support sessions to be serviced by a remote technician. Thereafter, the technical support controller receives a service request for a user device, which service request is classified into a category and added to a preliminary queue corresponding to the category. The technical support controller determines if handling of the service request by the remote technician would cause the number of support sessions currently being handled by the remote technician to exceed the previously-indicated maximum number of support sessions. If not, the service request is added to a work queue for the remote technician and removed from the preliminary queue. | 02-06-2014 |
20140038550 | SERVICE DELIVERY PLATFORM AND DEVELOPMENT OF NEW CLIENT BUSINESS MODELS - The present invention relates to systems and methods for delivering telecommunications services to customers. The systems and methods allow for the rapid creation and deployment of new telecommunications services, and the bundling of multiple services into service packages that can be sold together as a single product. Based on the systems and methods, targeted service packages may be developed and marketed toward business customers in specific industries. The systems and method provide opportunities for new business arrangements between telecommunications service providers and smaller third party providers. The new business arrangements provide access to a much wider customer pool for the third | 02-06-2014 |
20140037156 | LIVENESS DETECTION - The present disclosure concerns a method of verifying the presence of a living face in front of a camera ( | 02-06-2014 |
20140013337 | COBOL REFERENCE ARCHITECTURE - The COBOL reference architecture (CRA) system and the transactional workflow driver (TWD) provide an efficient and effective way to extend an existing application using modern architecture techniques without rewriting the existing application. The (CRA) system and TWD provide a way to generate new and interchangeable COBOL language functionality for multiple interactive types (e.g., transaction servers and/or transaction managers) running in various computing environments, including: a WebSphere message queue (MQ) transaction server; a Customer Information Control System (CICS) transaction server; an Information Management System (IMS) transaction server; and a batch transaction manager. | 01-09-2014 |
20130346560 | COMPUTER-IMPLEMENTED METHOD, MOBILE DEVICE, COMPUTER NETWORK SYSTEM, AND COMPUTER PRODUCT FOR OPTIMIZED AUDIO DATA PROVISION - In one aspect, the present application is directed to a computer-implemented method, a mobile device, a computer network system, and a computer-program product for optimized audio data provision, in an aspect, a computer-implemented method for optimized audio data provision on mobile devices is provided. The method may comprise: | 12-26-2013 |
20130332423 | DATA LINEAGE TRACKING - A data lineage tracking system may include a memory storing a module comprising machine readable instructions to obtain trace log entries representing an interaction with, a manipulation of, and/or a creation of a data value. The data lineage tracking system may further include machine readable instructions to select the trace log entries that are associated with commands performed by an application, cluster similar trace log entries from the selected trace log entries, and analyze mappings between the clustered trace log entries to determine data lineage flow associated with the data value. | 12-12-2013 |
20130317841 | SYSTEM AND METHOD FOR MANAGING PEDIGREE INFORMATION - Methods and systems are provided for managing and transmitting pedigree information. The methods and systems allow a user to access a pedigree information portal to submit and transmit pedigree data to a recipient of the physical drug product. The method provides security and reliability in relaying the drug history and data. In addition, methods and systems are provided for associating the electronically transmitted pedigree information to the physical drug product. A user may thus retrieve and review pedigree information using, for example, one or more barcodes representing a sender identifier and recipient identifier. | 11-28-2013 |
20130297475 | ROBUST POSITION DETECTION, CAUSE-AND-EFFECT AND RULE DETERMINANTS TO GOVERN EXCESSIVE RISKS FOR GLOBAL REGULATORY COMPLIANCE - The robust position detection, cause-and-effect and rule determinants to govern excessive risks for global regulatory compliance (DCRD) method and system detects positions, determines rules to apply to position information, identifies causes and effects of positions, and distributes short position report information to appropriate recipients to govern excessive risks for global regulatory compliance. The DCRD methods and system may be configured to implement a rule engine and reporting solution in order to function as an expert system. The DCRD methods and system detect short positions, and identify cause-effect associated with short positions that form systemic risks. The DCRD methods and system determine rules applicable to the short positions by testing the cause-effect of the short position information in relation to the rules and validates the strategic effect the short positions prior to reporting for the short position information to governance and compliance according to one or more rule criteria. | 11-07-2013 |
20130295963 | LOCATION-BASED COGNITIVE AND PREDICTIVE COMMUNICATION SYSTEM - A location-based cognitive and predictive communication system includes an interface connected to sensors to receive transactional data for an individual measured by the sensors. A memory stores the transactional data. The transactional data may be associated with a current travel path for the individual and includes a time and geographic location for the individual on the travel path. A prediction module may determine a current activity for the individual based on a prediction determined from the transactional data and may determine a choice set for the individual based on the current activity and based on predictions for a group for which the individual is a member. The choice set may include choices associated with transportation for the current travel path of the individual. | 11-07-2013 |
20130282834 | METHOD AND APPARATUS FOR DETERMINING AN EFFECT OF CHARACTERISTICS OF A MESSAGE ON INTERACTION WITH THE MESSAGE - Method and apparatus are provided for determining an effect of characteristics of a first message on interaction with the first message over an electronically meditated forum. The first message may be posted to the electronically mediated forum to provide a first posted message. The first posted message includes characteristics. The electronically mediated forum may be monitored to detect at least one instance of interaction with the first posted message. Interaction data may be extracted. Interaction data may include data describing at least one interaction the first posted message. The interaction data may be analyzed to determine the effect of the characteristics of the first posted message on the interaction(s) with the first posted message to provide determined effect data. | 10-24-2013 |
20130282149 | ADAPTIVE SENSOR DATA SELECTION AND SAMPLING BASED ON CURRENT AND FUTURE CONTEXT - A method for controlling a sensor may be performed by a mobile device including a processor and a memory. The method may include receiving raw data from the sensor, classifying the raw data into a context value, interpreting the context value into a higher-level context, receiving a predicted context based on the higher-level context, and controlling the sensor based on the predicted context. Controlling the sensor may include controlling a frequency at which raw data is received from the sensor, or an on/off state of the sensor. Control of the sensor may also be based on both the higher-level context and the predicted context. | 10-24-2013 |
20130268935 | ADAPTIVE ARCHITECTURE FOR A MOBILE APPLICATION BASED ON RICH APPLICATION, PROCESS, AND RESOURCE CONTEXTS AND DEPLOYED IN RESOURCE CONSTRAINED ENVIRONMENTS - A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the analysis. Adapting execution of the application may include transferring processing related to the application to a backend server for processing. | 10-10-2013 |
20130268916 | COMPONENT DISCOVERY FROM SOURCE CODE - A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering. | 10-10-2013 |
20130266193 | BIOMETRIC MATCHING TECHNOLOGY - Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel analysis of the determined image of the potential suspect against detailed biometric data associated with the subset of persons in the watch list is controlled. Based on the parallel analysis, it is determined whether the potential suspect matches a person in the watch list and a result is outputted based on the determination. | 10-10-2013 |
20130262678 | DIFFERENTIATED SERVICE-BASED GRACEFUL DEGRADATION LAYER - The differentiated service-based graceful degradation layer (DSGDL) allows cloud-based architectures to operate through and recover from periods of limited capability. The DSGDL protects and continues serving higher priority requests with the best possible response even as the underlying cloud-based services deteriorate. The DSGDL offloads lower priority requests to lower-grade secondary capability that can be dynamically provisioned in order to reserve the best capability for maintaining high priority service (e.g., by re-directing lower priority requests to a slightly out-of-date cached dataset, and reserve the primary consistent database for higher priority requests). The DSGDL 1) implements an overlay network over existing cloud services to route and enforce priority requests, and 2) provisions on-demand computing nodes and sites to provide secondary capability for service requests as needed. | 10-03-2013 |
20130262197 | COMMUNITY ENERGY MANAGEMENT SYSTEM - Systems and methods for distributed control and energy management of one or more communities of energy-consuming units may include aggregation of consumption data from units, and determining per-unit electricity consumption based thereon, including consumption of backup power provided by a community during periods of time of poor quality (brownouts) or blackouts of a utility. A system may calculate and assess to respective units per-unit costs for such backup power. A system may also issue a command or alert to units to carry out one or both of community electricity usage objectives and electricity quotas required by the utility, which may be determined through execution of rules. | 10-03-2013 |
20130262194 | ELECTRONIC TOLL MANAGEMENT FOR FLEET VEHICLES - Toll transaction payment processing includes accessing image data for a vehicle, the image data corresponding to at least one image of the vehicle engaging in a transaction with a toll facility. The image data is processed to determine one or more vehicle identifiers for the vehicle. A fleet vehicle company associated with the vehicle is electronically identified based on the one or more vehicle identifiers. Billing information for the transaction between the vehicle and the toll facility is electronically communicated to the fleet vehicle company. | 10-03-2013 |
20130262159 | Finding Best Seating Selections via Algorithmic Search - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for contiguously seating passengers in a travel conveyance. In one aspect, a method includes receiving a seat request for multiple seats, and, in response to receiving the seat request, calculating factors associated with each seat in a set of eligible seats. The method includes defining an initial set of seats as a subset of the set of eligible seats, defining a set of factors for each seat in the initial set of seats, associating a priority with the multiple factor sets, where the factors include multiple contiguity and vacancy factors, the contiguity factors being of a higher priority than the vacancy factors. The method includes processing the factors based on the priority to identify an anchor seat from the initial set of seats, assigning the multiple seats based on the anchor seat. | 10-03-2013 |
20130262086 | GENERATION OF A SEMANTIC MODEL FROM TEXTUAL LISTINGS - A corpus of textual listings is received and main concept words and attribute words therein are identified via an iterative process of parsing listings and expanding a semantic model. During the parsing phase, the corpus of textual listings is parsed to tag one or more head noun words and/or one or more identifier words in each listing based on previously identified main concept words or using a head noun identification rule. Once substantially each listing in the corpus has been parsed in this manner, the expansion phase assigns head noun words as main concept words and modifier words as attribute words, where possible. During the next iteration, the newly identified main concept words and/or attribute words are used to further parse the listings. These iterations are repeated until a termination condition is reached. Remaining words in the corpus are clustered based on the main concept words and attribute words. | 10-03-2013 |
20130246914 | DOCUMENT MANAGEMENT SYSTEMS AND METHODS - Disclosed are a data management system and computer-readable medium encoded with instructions to execute a method including communicating, by one or more of a document management application supporting integration protocols and a document management module in communication with the document management application, with one or more of a user relationship management system and a document management system using the one or more integration protocols; receiving a request to execute the document management application comprising a previously-created document management process; displaying an indication of a set of documents to be acquired; communicating with a signature acquisition module using the integration protocols configured to acquire a digital signature from a signature input device to create a digitally-signed electronic document; receiving the digitally-signed electronic document; creating an association in the form of a transaction file between user identification information and the digitally-signed electronic document; and transmitting the transaction file to be stored. | 09-19-2013 |
20130246562 | SYSTEMS AND METHODS FOR MANAGING CONTENT - In systems and methods for managing content, a code associated with a first content is received at a computing node from a first device and is stored in a profile at the computing node. A plurality of other computing nodes are searched for one or more additional content associated with the code based on the first content. Content identifiers associated with the one or more additional content are stored in the profile and in a content table which associates the code with each of the content identifiers. Each of the content identifiers stored in the profile are organized based on the profile, and a rendering of the organized content identifiers is provided to a second device. The one or more additional content is sent to the second device in response to a selection of at least one of the content identifiers from the rendering at the second device. | 09-19-2013 |
20130246442 | SYSTEM FOR REQUIREMENT IDENTIFICATION AND ANALYSIS BASED ON CAPABILITY MODEL STRUCTURE - A textual analysis system is configured to compare textual content of textual statements. The textual analysis system is configured to score the textual content of a first textual statement and a second textual statement. Based on the score, the textual analysis system may determine a level of correspondence between the first textual statement and the second textual statement. The textual analysis system is configured to generate an interactive visual representation of the correspondence levels between the first statement and the second statement. The visual representation may be transmitted to a display. | 09-19-2013 |
20130246225 | SOCIAL IN LINE CONSUMER INTERACTION LAUNCH PAD - The social in line consumer interaction launch pad is a digital commerce service that integrates into digital social forums that allows users (e.g., consumers) to perform commerce functions within a social conversation (e.g., interaction) without leaving the social forums. The launch pad automatically determines whether the conversation is about a company, brand, product and/or service, and converts text entered during the conversation into a ‘hypertext link-mouse over-launch pad’ for users to view and respond to services related to the brand, product and/or service based context. The launch pad is implemented through alliances with social forum service providers and/or a web browser plug-in to tag input (e.g., free form text) within reviews, comments, and unstructured data, selectable to initiate an interaction and/or transaction with the company of the brand and/or product. The launch pad determines the content to provide based on context information and demographics of the author and/or recipient. | 09-19-2013 |
20130245849 | CUSTOMER-CENTRIC DEMAND SIDE MANAGEMENT FOR UTLITIES - A method and system for reducing demand on a power grid through demand side management includes receiving assigned priorities from a customer for smart appliances and for appliances plugged into sockets of one or more smart plugs of the customer, the assigned priorities indicative of a customer-preferred sequence for disconnection of, or adjustment of power to, the appliances from the power grid. The system determines whether to disconnect or adjust power to at least one of the appliances of the customer; and selects at least one of the appliances according to the assigned priorities to reduce demand on the power grid. The system sends one or more commands, the one or more commands indicative to the one or more smart plugs to disconnect or adjust power to the selected at least one of the appliances based on selecting at least one of the appliances. | 09-19-2013 |
20130238788 | CLOUD SERVICES SYSTEM - A cloud services system includes an access services layer, a cloud service manager, and a service platform layer. The access services layer provides front-end functionality for users and service providers to order and manage cloud services, including software applications provided for use by the users. The cloud manager exposes services provided by the cloud services system to the users, and orchestrates delivery of the services and provisioning of resources for the services. The service platform layer activates virtual machines and virtual desktops to provide the services. | 09-12-2013 |
20130238729 | COMMUNICATION COLLABORATION - A communication collaboration system may include a memory storing machine readable instructions to receive a first signal representing a first mode of communication for a user. The communication collaboration system may further include machine readable instructions to seamlessly escalate the first signal to a second signal representing a second mode of communication for the user. The second mode of communication may be different from the first mode of communication. The communication collaboration system may further include a processor to implement the machine readable instructions. | 09-12-2013 |
20130238502 | COMPUTER NETWORK, AN ELECTRONIC TRANSACTIONS CLOUD AND A COMPUTER-IMPLEMENTED METHOD FOR SECURE ELECTRONIC TRANSACTIONS - The computer network for secure processing of a request from a mobile application on a mobile device, includes: a first communications channel that an electronic transactions cloud receives the request for processing an electronic transaction between a first and a second entity and over which a request for validation of a secure transaction code for processing the transaction from the mobile application; a second channel over which variable data from the request is verified; and a third channel to send instructions to process the transaction to an electronic data store of the second entity and the transaction code to the data store. If the transaction code is valid, the transactions cloud receives a receipt confirming completion of the transaction from the data store via the third channel and, if the transaction code is not valid, the transactions cloud receives an error message from the data store indicating the transaction code is invalid. | 09-12-2013 |
20130227712 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT BASED ON ADAPTIVE RISK-BASED ACCESS CONTROLS - Systems, methods, and computer program products are provided for adaptively controlling access to resources, such as selectively granting a user's request to access a confidential document. In one embodiment, the method may include making real-time access control decisions that respond promptly to changing organizational environments, thus reducing risks of the unauthorized use or access of resources. In addition, the method may include selectively granting a user's request to access a resource based on dynamic risk factors including, for example, the user's trust level, the sensitivity of the information resource requested, and the overall system status. Furthermore, the method may include adjusting those factors based on a change in conditions or organizational need. | 08-29-2013 |
20130226927 | DOCUMENT ANALYSIS, COMMENTING, AND REPORTING SYSTEM - A document analysis, commenting, and reporting system provides tools that automate quality assurance analysis tailored to specific document types. As one example, the specific document type may be a requirements specification and the system may tag different parts of requirements, including actors, entities, modes, and a remainder. However, the flexibility of the system permits analysis of any other document type, such as instruction manuals and best practices guides. The system helps avoid confusion over the document when it is delivered because of non-standard terms, ambiguous language, conflicts between document sections, incomplete or inaccurate descriptions, size and complexity of the document, and other issues. | 08-29-2013 |
20130226657 | Digital Consumer Data Model And Customer Analytic Record - As a company expands its businesses to include digital products and services in addition to more traditional telecommunications and media offerings, digital consumption data may be used along with telecommunications consumption data and other customer-centric information in order to create a more comprehensive data model and make better predictions. A customer-centric data model identifies entities with data from diverse locations and product sectors associated with a single customer. Customer analytic records aggregate existing data into base variables and store it for each customer along with additional variables generated by performing calculations on exiting data. Both the data model and the customer analytic records can be used by the company to make more accurate business and marketing decisions. | 08-29-2013 |
20130218887 | METHOD AND APPARATUS FOR GENERATING AND USING AN INTEREST GRAPH - Methods and apparatuses are provided for generating, updating, and using an interest graph. A plurality of interests representing a plurality of subjects' affinities towards a plurality of topics may be obtained. A processing device may generate an interest graph based on the obtained interests. The generated interest graph may include: (i) at least two nodes, each of the at least two nodes representing an interest of the obtained interests, wherein the obtained interests are free of any personally identifiable information associated with the plurality of subjects and (ii) at least one link connecting a first node to a second node of the at least two nodes, the at least one link representing a relatedness of the interest represented by the first node to the interest represented by the second node. | 08-22-2013 |
20130218818 | CROSS CHANNEL OPTIMIZATION SYSTEMS AND METHODS - The inventive subject matter is generally directed to a cross channel optimization system, methods, and related software which provide for the conducting of experiments and/or optimization of digital content across a plurality of external content systems to user of the external content systems. | 08-22-2013 |
20130212461 | BROWSER AND OPERATING SYSTEM COMPATIBILITY - A browser and operating system (OS) compatibility system may include a user interface to select a first combination of a browser and OS for comparison to a second combination of a browser and OS. A download engine may capture source files for browsers for the first and second combinations. A parse engine may create Document Object Model (DOM) trees of objects of first and second website pages respectively for the browsers for the first and second combinations. A metric engine may read the DOM trees for attributes of the objects to capture metrics of the objects. An analysis metric engine may compare a metric of an object of the first website page to a metric of the same object of the second website page to determine a compatibility of the browser and the OS for the first combination to the browser and the OS for the second combination. | 08-15-2013 |
20130211988 | ELECTRIC VEHICLE DISTRIBUTED INTELLIGENCE - A system and method for distributed intelligence of power tracking and power allocation may include: receiving data by at least one computer from a plurality of identified charging stations and vehicles of customers at distributed locations throughout a power grid; analyzing, with at least one processor of the at least one computer, the data with respect to available power for those locations and customer historical usage and profiles; and sending commands, with the at least one processor, to reallocate power to assets of the power grid to handle fluctuations or forecasted fluctuations in power demand based on the analysis. Customer preferences may also be considered in predicting power demand issues and need for demand response. Economic rules may be executed to incentivize the customers to comply with demand response requirements where demand is greater than power supply. | 08-15-2013 |
20130197789 | TRAVEL MANAGEMENT - A travel management system may include a client module to generate a request to update and/or search for data related to a trip. A database module may receive the request and communicate with a database. The database may include data organized in a trip data store table including unique keys respectively identifying trips. The database may further include index tables related to attributes of the trips and identified by the unique keys. The database module may obtain data related to the request from an index table corresponding to a unique key and forward a response to the client module. | 08-01-2013 |
20130197675 | PERFORMANCE ANALYTICS BASED ON HIGH PERFORMANCE INDICES - A performance optimization system includes a superior performance engine identifying high performance entities and determining benchmarks from data captured for the high performance entities. The benchmarks correspond with factors in the indices. The indices include a growth index, an operational excellence index, and an enterprise management index. A data capture module captures data related to the factors for an entity. An optimization engine determines values for the factors from the data captured for the entity, and compares the values with the benchmarks to identify underachieving factors. Estimated performance for the entity is calculated based on modifications to the underachieving factors. | 08-01-2013 |
20130195316 | SYSTEM AND METHOD FOR FACE CAPTURE AND MATCHING - According to an example, a face capture and matching system may include a memory storing machine readable instructions to receive captured images of an area monitored by an image capture device, and detect one or more faces in the captured images. The memory may further store machine readable instructions to track movement of the one or more detected faces in the area monitored by the image capture device, and based on the one or more tracked detected faces, select one or more images from the captured images to be used for identifying the one or more tracked detected faces. The memory may further store machine readable instructions to select one or more fusion techniques to identify the one or more tracked detected faces using the one or more selected images. The face capture and matching system may further include a processor to implement the machine readable instructions. | 08-01-2013 |
20130191364 | SYSTEM TO MODIFY A WEBSITE FOR SEARCH OPTIMIZATION - A system to optimize a website for a search of a topic includes a processor, a memory, and instructions to cause the processor to receive at least one term related to the topic, and to receive web objects pertaining to the website to be optimized. The system is to calculate at least one metric pertaining to the at least one term and the web objects. | 07-25-2013 |
20130185433 | PERFORMANCE INTERFERENCE MODEL FOR MANAGING CONSOLIDATED WORKLOADS IN QOS-AWARE CLOUDS - The workload profiler and performance interference (WPPI) system uses a test suite of recognized workloads, a resource estimation profiler and influence matrix to characterize un-profiled workloads, and affiliation rules to identify optimal and sub-optimal workload assignments to achieve consumer Quality of Service (QoS) guarantees and/or provider revenue goals. The WPPI system uses a performance interference model to forecast the performance impact to workloads of various consolidation schemes usable to achieve cloud provider and/or cloud consumer goals, and uses the test suite of recognized workloads, the resource estimation profiler and influence matrix, affiliation rules, and performance interference model to perform off-line modeling to determine the initial assignment selections and consolidation strategy to use to deploy the workloads. The WPPI system uses an online consolidation algorithm, the offline models, and online monitoring to determine virtual machine to physical host assignments responsive to real-time conditions to meet cloud provider and/or cloud consumer goals. | 07-18-2013 |
20130185056 | SYSTEM FOR GENERATING TEST SCENARIOS AND TEST CONDITIONS AND EXPECTED RESULTS - A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system automatically generates test artifacts from the requirement statements, including test scenarios, test conditions, test hints, and expected results. These test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding what the intentions of the requirement statements are. The automation of the generation of these test artifacts produces numerous benefits, including fewer errors, objectivity, and no dependency on the skills and experience of a creator. | 07-18-2013 |
20130179314 | Risk Based Data Assessment - A system for receiving and processing data includes a data processing and verification component that accepts data from a client in an electronic format and identifies therefrom data elements that can be directly verified. A risk assessment component receives data elements that have not been identified as directly verifiable and assesses a risk that the data elements are incomplete or incorrect. The risk assessment component generates risk assessment data. A decision support component receives the risk assessment data from the risk assessment component and selects appropriate actions for subsequent processing of the client data according to the assessment of risk contained in the risk assessment data. | 07-11-2013 |
20130173918 | DATA EXCHANGE TECHNOLOGY - A data exchange adaptor that synchronizes data between an enterprise system operated by a company and a cloud-based system operated by a third party other than the company. The data exchange adaptor enables exchange of data between the enterprise system and the cloud-based system and controls storage and retrieval of data at the enterprise system and the cloud-based system. The data exchange adaptor also performs transport level security for communications that exchange data between the enterprise system and the cloud-based system and access level security for data stored to the enterprise system and the cloud-based system. The data exchange adaptor further schedules synchronization of data between the enterprise system and the cloud-based system and allows the enterprise system to retain control over the synchronization of data between the enterprise system and the cloud-based system. | 07-04-2013 |
20130166757 | Web Portal Application Customization Method and System Using Profiles - Web portal application customization methods and systems using profiles allow developers to expose different functionalities and a different look and feel to users belonging to different user profiles. Specifically, the method allows a developer to define default and profile-specific transitions as well as default and profile-specific states. Upon request of a transition by a workflow engine, the system transparently provides the workflow engine with a profile-specific transition if a profile-specific transition associated with the user is available. If a profile-specific transition is not available, the system provides the application with a default transition. Likewise, the system transparently provides the application with a profile-relevant state according to the profile of the user and the availability of a profile-specific state. Accordingly, the method may implement highly customizable functionalities and look and feel effectively and cost-efficiently. | 06-27-2013 |
20130166377 | ONLINE AD DETECTION AND AD CAMPAIGN ANALYSIS - Metrics for online ads are captured by parsing web pages to identify ad beacons containing information identifying whether the online ads are for a particular client. These metrics are used to determine key performance indicators for auditing and competitor analysis for an online ad campaign. | 06-27-2013 |
20130166374 | MANAGING REPUTATIONS - In general, a method includes enabling a user to specify a rule that causes a message to be formed, the rule being based on a reputation of a product and the reputation being based on information, from an online source, that is indicative of the reputation of the product. | 06-27-2013 |
20130160029 | EXTERNAL DEVICE INTERFACE ABSTRACTION - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for executing a user interface on a computing device, generating one or more event handlers executed on the computing device, each event handler corresponding to a local device service file, receiving first data at a first event handler of a first local device service associated with a first device that is in electronic communication with the computing device, generating, using the first event handler, a first event that includes the first data, receiving, at an external device service, the first event, generating, using the external device service, a first external device event based on the first event, and performing a first action based on the external device event. | 06-20-2013 |
20130159881 | END-USER PORTAL SYSTEM FOR REMOTE TECHNICAL SUPPORT - A controller provides information regarding end-user dictated content for a plurality of technical support topics to an end-user device prior to the controller receiving any indication of specific technical support required by the end-user. Additionally, the controller provides information regarding available automated technical support to the end-user device prior to the controller receiving any indication of specific technical support required by the end-user. The end-user device provides an indication of selection of at least a portion of the either the information regarding end-user dictated content for a plurality of technical support topics or the information regarding available automated technical support. By providing such information prior to receiving any indication of the specific technical support required by the end-user, the likelihood that the end-user can successfully resolve his/her issue without further intervention is increased. | 06-20-2013 |
20130159200 | METHOD, SYSTEM, AND APPARATUS FOR SERVICING EQUIPMENT IN THE FIELD - System, techniques, and apparatus are provided for servicing equipment. Context information associated with the equipment may be obtained by a processing device. The processing device may further obtain expert information associated with the equipment based on the context information. The processing device is operative to provide service information including information describing how the equipment was serviced. This service information may be used to generate updated expert information. | 06-20-2013 |
20130151313 | SALES AND OPERATIONS PLANNING INTERFACE TOOL - A method, in one embodiment, can include establishing a demand hierarchy associated with sales and operations planning data of an organization. Note that any item of the demand hierarchy is not assigned to another hierarchy group. Additionally, the method can include establishing a supply hierarchy associated with the sales and operations planning data of the organization. It is noted that any item of the supply hierarchy is not assigned to another hierarchy group. Furthermore, the method can include utilizing one of the demand hierarchy and the supply hierarchy to generate a metric based at an item level. The metric can be output as part of a graphical user interface. | 06-13-2013 |
20130150983 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 06-13-2013 |
20130138778 | COMPUTER-IMPLEMENTED METHOD, COMPUTER SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR SYNCHRONIZING OUTPUT OF MEDIA DATA ACROSS A PLURALITY OF DEVICES - A computer-implemented method, a computer system, and a computer program product for synchronizing output of media data across a plurality of devices is provided. The computer-implemented method for synchronizing output of media data across a plurality of output devices may include providing a communication network between a media server and a plurality of output devices; and synchronously outputting media data files on the plurality of output devices, wherein the media data files are transmitted to the output devices from the media server in form of a data stream over different delivery networks. | 05-30-2013 |
20130138676 | Anonymity Measuring Device - The invention concerns a data anonymity measuring device for selectively transmitting an anonymized database to a third party comprising: calculation means ( | 05-30-2013 |
20130132285 | SERVICES PROVISIONING USING COMMUNICATIONS AND COLLABORATION PLATFORM - Data migration using communications and collaboration platform provides an efficient and flexible method for migrating data from an existing system to a new system. In particular, the method includes extracting data, cleansing the extracted data based on a master record, receiving approval for the cleansed data, and migrating the approved data into the new system. | 05-23-2013 |
20130132143 | MULTIPLE SIMULTANEOUS SESSION SUPPORT BY A REMOTE TECHNICIAN USING PRELIMINARY QUEUES - In a remote technical support system, a technical support controller receives an indication of a maximum number of support sessions to be serviced by a remote technician. Thereafter, the technical support controller receives a service request for a user device, which service request is classified into a category and added to a preliminary queue corresponding to the category. The technical support controller determines if handling of the service request by the remote technician would cause the number of support sessions currently being handled by the remote technician to exceed the previously-indicated maximum number of support sessions. If not, the service request is added to a work queue for the remote technician and removed from the preliminary queue. | 05-23-2013 |
20130110746 | IDENTIFICATION OF ENTITIES LIKELY TO ENGAGE IN A BEHAVIOR | 05-02-2013 |