Patent application number | Description | Published |
20080263548 | Process and Implementation for Dynamically Determining Probe Enablement Using Out of Process Correlating Token - The present invention addresses the problem of linking cross-process and cross-thread subtransactions into a single user transaction. The mechanism of the present invention employs bytecode inserted probes to dynamically detect out of process correlating tokens in an inbound request. The bytecode inserted probes retrieve the correlating token in the inbound request. Based on the correlating token retrieved, the bytecode inserted probes are then used to dynamically determine if the inbound user request should be recorded and linked to a transaction that began in another thread or process. | 10-23-2008 |
20080270853 | Method of Routing I/O Adapter Error Messages in a Multi-Host Environment - A method and apparatus is provided for routing error messages in a distributed computer system comprising multiple root nodes, and further comprising one or more PCI switches and one or more I/O adapters, wherein each root node includes one or more system images. In one useful embodiment, a method is provided for routing I/O error messages to root nodes respectively associated with the errors contained in the messages. The method includes detecting occurrence of an error at a specified one of the adapters, wherein the error affects one of the system images, and generating an error message at the specified adapter. The method further comprises routing the error message from the specified adapter to the particular root node that includes the affected system image. The error message is then selectively processed at the particular root node, in order to identify the affected system image. Usefully, the step of routing the error message includes using a bus/device/function number associated with the error, together with a routing table located in one of the PCI switches, to route the error message to the correct root node and system image. | 10-30-2008 |
20080288827 | METHOD FOR VISUALIZING RESULTS OF ROOT CAUSE ANALYSIS ON TRANSACTION PERFORMANCE DATA - Mechanisms for graph manipulation of transactional performance data are provided in order to identify and emphasize root causes of electronic business system transaction processing performance problems. A system transaction monitoring system, such as IBM Tivoli Monitoring for Transaction Performance™ (ITMTP) system, is utilized to obtain transaction performance data for a system. This transaction performance data is stored in a database and is utilized to present a graph of a given transaction or transactions. Having generated a graph of the transaction, and having identified problem conditions in the processing of the transaction(s), the present invention provides mechanisms for performing graph manipulation operations to best depict the root cause of the problems. | 11-20-2008 |
20080307418 | Enabling and Disabling Byte Code Inserted Probes Based on Transaction Monitoring Tokens - A method of enabling transaction probes used to monitor a transaction or modify a primary application handling the transaction. The method begins with retrieving a token associated with the transaction. The token contains information regarding which transaction probes from a plurality of transaction probes will be enabled with respect to the transaction. The token is then read to determine the set of transaction probes from the plurality of transaction probes that will be enabled. The determined set of transaction probes is then enabled. | 12-11-2008 |
20090037914 | AUTOMATIC CONFIGURATION OF ROBOTIC TRANSACTION PLAYBACK THROUGH ANALYSIS OF PREVIOUSLY COLLECTED TRAFFIC PATTERNS - A system and method which accesses or otherwise received collected performance data for at least one server application, where the server application capable of performing a plurality of transactions with client devices and the client devices are geographically dispersed from the server in known geographical locales, which automatically determines from the performance data which of the transactions are utilized by users of the client devices, which selects utilized transactions according to at least one pre-determined selection criteria, which automatically generates a transaction playback script for each of the selected transactions substituting test information in place of user-supplied or user-unique information in the transactions, which designates each script for execution from a geographical locale corresponding to the locale of the clients which execute said utilized transactions, which deploys the playback scripts to robotic agents geographically co-located with client devices according to the locale designation, and which executes the playback scripts from the robotic agents in order to exercise the server application across similar network topologies and under realistic conditions. | 02-05-2009 |
Patent application number | Description | Published |
20150375873 | Drive Mechanisms for Use in Controlling Rotation and Twist of a Tether - A system may include a tether, a tether gimbal assembly, a drive mechanism, and a control system. The tether may include a distal end, a proximate end, and at least one conductor. The tether gimbal assembly may be connected to the tether. The drive mechanism may be coupled to the tether gimbal assembly and may include a housing, a spindle, and a motor. The housing may be fixed to the tether gimbal assembly. The spindle may be rotatably coupled to the housing, and the tether may be coupled to the spindle and rotate in conjunction with the spindle. The motor may be coupled to the spindle and configured to rotate the spindle and the tether. And the control system may be configured to operate the drive mechanism to control twist in the tether. | 12-31-2015 |
20150375874 | Systems and Methods for Controlling Rotation and Twist of a Tether - A system may include a tether, a slip ring, a tether gimbal assembly, a drive mechanism, a control system. The tether may include a distal tether end coupled to an aerial vehicle, a proximate tether end, and at least one insulated electrical conductor coupled to the aerial vehicle. The slip ring may include a fixed portion and a rotatable portion, where the rotatable portion is coupled to the tether. The tether gimbal assembly may be rotatable about at least one axis and is coupled to the fixed portion of the slip ring. The drive mechanism may be coupled to the slip ring and configured to rotate the rotatable portion of the slip ring. And the control system may be configured to operate the drive mechanism to control twist in the tether. | 12-31-2015 |
Patent application number | Description | Published |
20140250178 | CONTENT BASED DISCOVERY OF SOCIAL CONNECTIONS - Methods, systems, and computer-readable media are provided for identifying social connections. In some implementations, the occurrence of a first reference to a first person and a second reference to a second person is identified in unstructured data. A relationship metric is calculated between the first reference and the second reference, wherein the relationship metric is based at least in part on the co-occurrence of the first reference and the second reference. The existence of a potential connection between the first reference and the second reference is determined based at least in part on the relationship metric. A recommendation is provided to at least one of the first person and the second person to acknowledge the potential connection as an actual connection. Input is received from at least one of the first person and the second person confirming the potential connection as an actual connection. | 09-04-2014 |
20140344259 | ANSWERING PEOPLE-RELATED QUESTIONS - A computer device may receive a search query from a user of a user device, determine that the search query is a people-related question, and identify, using a data structure, a set of people related to the search query, where the data structure is associated with the user, and where the data structure stores people-related data for a group of people with which the user is associated. The computer device may also determine whether to provide information relating to the set of people, and selectively provide, to the user device, one of a first document or a second document. The first document identifies at least one person in the set of people and provides information relating to the at least one person, where the information, relating to the at least one person, provides an answer to the people-related question. The second document excludes information relating to the set of people. | 11-20-2014 |
20150161519 | NAME RECOGNITION - A computer-implemented technique includes obtaining training electronic messages, identifying name context in the training electronic messages, and determining patterns from the name context. The technique can include applying the patterns to the training electronic messages to extract candidate names and selecting a set of the patterns based on the extracted candidate names to obtain a set of patterns. In some implementations, the technique can further include applying the set of patterns to electronic messages associated with a first user having a registered profile, extracting candidate names, and selecting a set of alternate names for the first user from the candidate names. The technique can also include detecting a use of one alternate name from the set of alternate names by a second user, and outputting a suggestion to the second user in response to the detecting, the suggestion being based on the registered profile of the first user. | 06-11-2015 |
20150200829 | TASK-BASED STATE RECOVERY IN A WEB BROWSER - A method includes identifying one or more browsing sessions from a plurality of browsing activities, each of the one or more browsing sessions comprising browsing activities having a common theme, identifying a browser state of each of the one or more browsing sessions, generating a record representing the browser state of each of the one or more browsing sessions, wherein the record is associated with the common theme of the browsing activities comprising each of the one or more browsing sessions, storing the generated record representing the browser state of each of the one or more browsing sessions and retrieving the stored record when a current online activity has a theme that corresponds to the common theme of the at least one of the one or more browsing sessions. | 07-16-2015 |
20150201040 | CLOUD-BASED BROWSER HISTORY - A method includes receiving browsing data from the plurality of client devices associated with the user, receiving a request from one of the plurality of client devices to access the received browsing data, determining whether the request to access the received browsing data is a request to utilize the received browsing data for a task associated with the one of the plurality of client devices or a deletion request, wherein the deletion request is a request to delete a portion of the received browsing data and automatically deleting the portion of the received browsing data on the server and synchronizing the deletion across each of the plurality of client devices associated with the user when the request is determined to be a deletion request, otherwise providing access to the received browsing data to the one of the plurality of client devices. | 07-16-2015 |
20150358447 | POPULATING USER CONTACT ENTRIES - Methods and apparatus for populating a contact entry of a user based on information obtained from one or more sources that are external to the contact entry. Some implementations are directed generally to analyzing text of a document associated with the user to identify contact information in the document. In some versions of those implementations, an affinity measure associated with the document may be determined that is indicative of an amount of interest of the user in the document and a contact entry may be populated with one or more aspects of the contact information based on the affinity measure satisfying a threshold. | 12-10-2015 |
20150371138 | AUTOMATIC IDENTIFICATION AND USE OF ALTERNATE USER CONTACT INFORMATION - Computer-implemented techniques for automatic identification and use of alternate user contact information can include identifying, at a server having one or more processors, a set of patterns from training electronic messages, each pattern indicating a pattern of contact information context. The techniques can include storing and utilizing, at the server, the set of patterns to obtain a set of alternate contact information for a target user. In response to a use of a specific alternate contact information for the target user by a source user at a computing device, the techniques can include providing, from the server to the computing device, a suggestion for the source user. Examples of the suggestion may include a virtual address for an electronic message or at a social network, a physical address for navigation, and a telephone number for calling or incoming caller identification. | 12-24-2015 |