Patent application number | Description | Published |
20090100183 | Detection of Missing Recipients in Electronic Messages - A computer-implemented method of identifying a missing recipient of an electronic message can include identifying at least one user specified as a recipient of an electronic message and accessing a data store comprising measures of correlation between a plurality of users, wherein the plurality of users comprises the recipient of the electronic message. One or more users not designated as a recipient of the electronic message and having a measure of correlation, with at least one recipient of the electronic message, that exceeds a predetermined threshold can be identified as a potential missing recipient of the electronic message. An indication that a recipient may have been excluded from the electronic message can be output. | 04-16-2009 |
20090106370 | Processing Electronic Messages According to Sender Classification - A computer-implemented method of sorting electronic messages can include identifying at least one recipient of an electronic message and retrieving a classification scheme of the recipient. An identifier can be included within the electronic message. The identifier can specify a tag selected from the classification scheme of the recipient. The electronic message, including the identifier specifying the selected tag, can be sent. | 04-23-2009 |
20090132329 | Meeting Scheduling to Minimize Inconvenience of Meeting Participants - A computer-implemented method of automatically scheduling meetings can include determining that no timeslot is available for scheduling a proposed meeting involving a plurality of participants and selecting a plurality of candidate times for the proposed meeting. An inconvenience metric for each participant of the proposed meeting can be calculated. A schedule misfit metric for each of the plurality of candidate times can be calculated, at least in part, according to the inconvenience metric for each participant. A time for the proposed meeting can be selected from the candidate times according to the schedule misfit metric. The proposed meeting can be scheduled for the selected time. | 05-21-2009 |
20090254817 | Enhanced spell checking utilizing a social network - A computer-implemented method of enhancing spell check. The method can include receiving from each of a plurality of clients at least one custom term and at least one class identifier that is associated with the custom term. The custom terms and the associated class identifiers can be processed to provide an electronic dictionary that includes a plurality of shared terms. Each of the shared terms can be associated with at least one of the class identifiers to which the shared term corresponds. Each of the custom terms can correspond to at least one of the shared terms. At least one of the shared terms can be output to at least one of the plurality of clients. | 10-08-2009 |
20100125577 | Extending Distribution Lists - A method including determining a set of clusters of person records from a data source that includes the person records, where the person records include attributes and person identifiers that correspond to the attributes; determining memberships of the person records to the clusters based on a correlation of the attributes across the person records; searching the person identifiers of the person records in the memberships for matches to existing person identifiers in a distribution list; and for the memberships that include person identifiers that are matches to the existing person identifiers, suggesting other person identifiers from these memberships to be added to the existing person identifiers in the distribution list to extend the distribution list. | 05-20-2010 |
20100169426 | EXPERTISE REFERRALS USING A REAL-TIME COMMUNICATION SYSTEM - A computer-implemented method of providing expertise based referrals can include receiving, from a first user, a voucher specifying a second user seeking expertise and a third user as a potential subject matter expert. Responsive to execution of the voucher, an instant messaging session between the second user and the third user can be established and an input from the second user indicating whether a posed question from the second user is resolved can be received. When the posed question is resolved, a role of maven can be assigned to the first user and a role of subject matter expert can be assigned to the third user. A transcript of the instant messaging session between the second user and the third user, a reference to the first user with the assigned role, and a reference to the third user with the assigned role can be stored as part of a referral transaction. | 07-01-2010 |
20110161840 | PERFORMANCE OF TEMPLATE BASED JAVASCRIPT WIDGETS - Included are method, article of manufacture, and device that serve to embed a universal script object into programming code used for rendering a web page, convert the universal script object into JavaScript, and upon receiving a request for a web page, send the converted and embedded universal script object towards a requestor. The universal script object may be converted from HTML or some other language. | 06-30-2011 |
20120203783 | PROCESSING ELECTRONIC MESSAGES ACCORDING TO SENDER CLASSIFICATION - A computer-implemented method of sorting electronic messages can include identifying at least one recipient of an electronic message and retrieving a classification scheme of the recipient. An identifier can be included within the electronic message. The identifier can specify a tag selected from the classification scheme of the recipient. The electronic message, including the identifier specifying the selected tag, can be sent. | 08-09-2012 |
20130326510 | VIRTUALIZATION-BASED ENVIRONMENTS FOR PROBLEM RESOLUTION - According to one aspect of the present disclosure a method and technique for allocating virtualization-based resources for resolving a problem report associated with a computing environment is disclosed. The method includes: receiving a problem report associated with a computing environment; determining a resource template from the problem report corresponding to the computing environment; determining whether a virtual machine is available from a virtualization-based resource pool based on the resource template; and responsive to determining that a virtual machine is available from the virtualization-based resource pool based on the resource template, utilizing the virtual machine for the problem report. | 12-05-2013 |
20140006993 | TASK TIMER | 01-02-2014 |
20140051390 | AUTOMATICALLY CONNECTING TO A BEST AVAILABLE CALLING DEVICE BASED ON RESOURCE STRENGTH - A method, computer program product, and computer system for automatically connecting a calling device to a best available calling device based on resource strength. A computer system receives from a first calling device a request for a call to a second calling device and evaluates resource strength of the second calling device. The computer system determines one or more third calling devices, in response to determining that the resource strength of the second calling device is low. The computer system compares resource strength of the one or more third calling devices with that of the second calling device and determines a best available one of the one or more third calling devices. The computer system connects the call by connecting the first calling device and the best available one of the one or more third calling devices. | 02-20-2014 |
20140053125 | DETERMINING PROJECT STATUS IN A DEVELOPMENT ENVIRONMENT - A method and program product to monitor the activities of a named person for developing a computer program. The method comprises the steps of logging operations performed by a software build tool or software test tool, a record in the log for each of the operations comprising an identity of a person that requested the operation and a time stamp of the operation; identifying the activities of the named person; determining that the named person is currently accessing the software build tool or software test tool; querying the log records with a time stamp within a predetermined period to determine that the named person has used the software build tool or software test tool to develop the computer program within the predetermined period; and reporting to the user that the named person used the tool to develop the computer program within the predetermined period. | 02-20-2014 |
20140258442 | INTELLIGENT CATEGORIZATION OF BOOKMARKS - System, method, and computer program product, comprising, responsive to accessing a first electronic page in a browser, collecting metadata from the first electronic page, determining: (i) a set of existing data structures to store bookmarks for electronic pages in the browser, each data structure in the set of existing data structures representing an associated category for electronic pages, and (ii) a preference for using the existing data structures to store bookmarks for electronic pages, and, responsive to receiving an indication to bookmark the first electronic page, identifying, based on the metadata, the existing data structures, and the preference for using the existing data structures, a first data structure in which to store the bookmark for the first electronic page, presenting the first data structure for approval, and responsive to receiving approval for the first data structure, storing a bookmark for the first electronic page in the first data structure. | 09-11-2014 |
20140258823 | INTELLIGENT CATEGORIZATION OF BOOKMARKS - System, method, and computer program product, comprising, responsive to accessing a first electronic page in a browser, collecting metadata from the first electronic page, determining: (i) a set of existing data structures to store bookmarks for electronic pages in the browser, each data structure in the set of existing data structures representing an associated category for electronic pages, and (ii) a preference for using the existing data structures to store bookmarks for electronic pages, and, responsive to receiving an indication to bookmark the first electronic page, identifying, based on the metadata, the existing data structures, and the preference for using the existing data structures, a first data structure in which to store the bookmark for the first electronic page, presenting the first data structure for approval, and responsive to receiving approval for the first data structure, storing a bookmark for the first electronic page in the first data structure. | 09-11-2014 |
20140304254 | Identifying One or More Relevant Social Networks for One or More Collaboration Artifacts - Methods, products, apparatus, and systems may provide for identifying a set of users associated with one or more collaboration artifacts. Additionally, a set of networks including a plurality of candidate social networks may be identified. Moreover, a relationship strength may be determined between the set of users associated with the one or more collaborations artifacts and each of the candidate social networks to identify one or more relevant social networks from the candidate social networks. Determining the relationship strength may include calculating a similarity metric. In addition, at least one member affiliated with the one or more relevant social networks may become aware of the collaboration artifact. | 10-09-2014 |
20150026172 | Age Appropriate Filtering - An approach is provided in which a web page management system receives web page content requested by a browser, and parses the web page content according to one or more assessment categories. The web page management system analyzes the parsed web page content and generates content characterization results in response to the analysis. In turn, by comparing the content characterization results to knowledge base entries, the web page management system generates an “age level content ranking” of the web page content and performs an action on the web page content based upon the age level content ranking. | 01-22-2015 |
20150052153 | Identifying One or More Relevant Social Networks for One or More Collaboration Artifacts - Methods, products, apparatus, and systems may provide for identifying a set of users associated with one or more collaboration artifacts. Additionally, a set of networks including a plurality of candidate social networks may be identified. Moreover, a relationship strength may be determined between the set of users associated with the one or more collaborations artifacts and each of the candidate social networks to identify one or more relevant social networks from the candidate social networks. Determining the relationship strength may include calculating a similarity metric. In addition, at least one member affiliated with the one or more relevant social networks may become aware of the collaboration artifact. | 02-19-2015 |