Patent application number | Description | Published |
20120311156 | Autoconfiguration of a Cloud Instance Based on Contextual Parameters - An embodiment of the invention provides a method and system for autoconfiguring a cloud instance based on contextual parameters. More specifically, an interface receives a request for a resource from a user; and, an analysis module connected to the interface examines parameters of the resource. The parameters of the resource include an encryption parameter and a language parameter. The analysis module also examines properties of the request, including a location of the user, at least one rule at the location of the user, and a dominant language at the location of the user. A processor connected to the analysis module determines whether the encryption parameter of the resource violates the rule at the location of the user. An instance generator connected to the processor creates a customized instance of the resource when the encryption parameter of the resource violates the rule at the location of the user. | 12-06-2012 |
20130036217 | NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center. | 02-07-2013 |
20130073716 | DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center. | 03-21-2013 |
20130101107 | TELECONFERENCE PRESENTATION RETRIEVAL MANAGEMENT - A system, method and program product for delivering to an invitee of a teleconference an electronic file attached to or referenced by a meeting notice for the teleconference. The teleconference hosted by a server computer, the invitee has a telephone to call-in to the teleconference via a telephone connection, and an invitee computer downloads the electronic file from the server computer via a first network in response to selection by the invitee of a representation of the electronic file from the meeting notice. The server computer receives a notification that a predetermined combination of keys has been pressed by the invitee on the telephone. In response, the server computer determines an e-mail address or instant message address for the invitee. The server computer attaches and sends the electronic file to an e-mail or instant message with the attached electronic file to the e-mail address or instant message address. | 04-25-2013 |
20130103823 | EVENT PREDICTION AND PREEMPTIVE ACTION IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold). | 04-25-2013 |
20130124809 | DISTRIBUTING DATA AMONG DATA STORAGE PARTITIONS BASED ON A FORECASTED DEMAND IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to forecast a potential demand for partitioned/sharded data and to distribute the data among a set of data partitions based on forecasted demand to optimize network characteristics (e.g., network bandwidth) and/or expedite data retrieval. For example, the data may be distributed among the partitions based on a quantity of trends/requests/hits on the data, so that requests for the data can be balanced among the partitions geographically. | 05-16-2013 |
20130125009 | REMOTE DESKTOP LOCALIZED CONTENT SHARING - Illustrative embodiments disclose managing content displayed in a remote data processing system by identifying a set of links displayed in the content of the remote data processing system during a desktop sharing session between a local data processing system and the remote data processing system. The local data processing system obtains information about the set of links identified. Responsive to a selection of a link in the set of links displayed on the remote data processing system during the desktop sharing session, the local data processing system retrieving content using the link on the local data processing system using the information obtained about the set of links. | 05-16-2013 |
20130132556 | PROVIDING STATUS INFORMATION FOR VIRTUAL RESOURCE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for an image provider to specify data (e.g., commands to run, files to read), etc., about an image of a virtual resource (e.g., virtual machine, etc.) in a networked computing environment (e.g., a cloud computing environment). Such data may be used (e.g., at runtime) by a client application to obtain specific information about a running instance that is provisioned based on the image (e.g., operating system health, middleware health, etc.). | 05-23-2013 |
20130151629 | PRE-TRANSMISSION CONTEXTUAL ELECTRONIC MESSAGE PROMPTING - Embodiments of the present invention provide a system, method, and program product to provide to a user creating an electronic message one or more informational messages related to the content and addressees of the electronic message. A computer system identifies one or more addressees of the electronic message created by the user. The computer system identifies any informational messages associated with each of the addressees, and displays to the user the identified informational messages. Each step is performed prior to the computer system transmitting the electronic message for delivery to any addressee. The informational messages can be predefined by the addressees of the electronic message and include hyperlinks and other programmable elements for execution by the user. The electronic message can be an e-mail, instant message, or other form of electronic message. | 06-13-2013 |
20130247022 | IDENTIFYING OPTIMAL UPGRADE SCENARIOS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested. | 09-19-2013 |
20130254681 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130254682 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130318447 | Prompting of Recipient Expertise in Collaboration Environment - A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface. | 11-28-2013 |
20130346243 | TRANSACTION MANAGEMENT BASED ON INDIVIDUAL ORDERS OR NUMBER OF DEVICES AT TABLE FOR DESIRED DISTRIBUTION - A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations. | 12-26-2013 |
20140164446 | SHARING ELECTRONIC FILE METADATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like. | 06-12-2014 |
20140189865 | SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level. | 07-03-2014 |
20140201345 | MANAGING USER PRIVILEGES FOR COMPUTER RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided. | 07-17-2014 |
20140245394 | TRUST-BASED COMPUTING RESOURCE AUTHORIZATION IN A NETWORKED COMPUTING ENVIRONMENT - A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources). | 08-28-2014 |
20140282814 | CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE - A client computer extracts contextual information associated with a file that is created. The client computer generates scores for the file by utilizing the contextual information that is extracted. The client computer assigns a value to the file, based on an aggregation of the scores that are generated. The client computer monitors activities on the client computer, wherein the activities trigger an event on the client computer. The client computer determines whether the event is in violation of one or more computer security policies on a server computer, wherein the one or more computer security policies require work-related files to be deleted or encrypted. The client computer classifies the file as personal data or work-related business data. The client computer secures the file, if the file is classified as work-related business data. | 09-18-2014 |
20140297695 | INTELLIGENT DATA ROUTING AND STORAGE PROVISIONING - Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource. | 10-02-2014 |
20140317263 | IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration. | 10-23-2014 |
20140330782 | REPLICATION OF CONTENT TO ONE OR MORE SERVERS - An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties. | 11-06-2014 |
20140359110 | AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted. | 12-04-2014 |
20150019271 | ESTIMATING WAIT TIME FOR AN ESTABLISHMENT - A computer collects resource reservation history for a resource for a plurality of reservation time blocks. The computer collects resource reservation wait time history for the resource for each reservation time block. The computer determines a number of patrons that utilized the resource during each reservation time block and creates a resource reservation wait time model. The computer receives a request for a resource reservation wait time estimate for a first reservation time block and collects a first plurality of social media content. The computer determines an estimated number of patrons that intend to utilize the resource during the first reservation time block based on at least the first plurality of social media content. The computer determines a first estimated wait time for the first reservation time block by comparing at least the estimated number of patrons to the resource reservation wait time model. | 01-15-2015 |
20150058127 | DIRECTIONAL VEHICULAR ADVERTISEMENTS - Directional vehicular advertisements displayed on a vehicle. A system in accordance with an embodiment includes: a location system for determining a location and a direction of travel of a vehicle; at least one forward facing advertisement slot on the vehicle, wherein each forward facing advertisement slot faces oncoming traffic travelling in a direction opposite to the direction of travel of the vehicle; a plurality of advertisements, each advertisement associated with a location; and a controller configured to select and display at least one of the advertisements via at least one of the forward facing advertisement slots, wherein each displayed advertisement is associated with a location that the oncoming traffic has yet to pass. | 02-26-2015 |
20150077419 | VISUALIZATION OF DATA RELATED TO UNSTRUCTURED TEXT - In a method for visualizing data related to unstructured text, a computer identifies at least two data points in a portion of unstructured text of a document, a relationship between the at least two data points, and a label for each of the at least two data points. The computer determines a type of graph to create based on the identified data. The computer causes the at least two data points and the label for each of the at least two data points, and the relationship between the at least two data points to be visualized on a graph. The computer causes a modified graph based on the received instructions to be visualized. The computer causes the modified graph to be displayed in the document having the unstructured text. | 03-19-2015 |