Patent application number | Description | Published |
20080201545 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR ASSOCIATING THREADS WITHIN NON-RELATED PROCESSES BASED ON MEMORY PAGING BEHAVIORS - A method of tying related process threads within non-related applications together in terms of memory paging behavior. In a data processing system, a first process thread is related to one or more “partner” threads within separate high latency storage locations. The kernel analyzes the memory “page-in” patterns of multiple threads and identifies one or more partner threads of the first thread based on user input, observed memory page-in patterns, and/or pre-defined identification information within the thread data structures. The kernel marks the first thread and its corresponding related partner threads with a unique thread identifier. When the first thread is subsequently paged into a lower latency memory, the kernel also pages-in the related partner threads that are marked with the unique thread identifier in lockstep. Tying related threads from non-related applications together in terms of memory paging behavior thus eliminates memory management delays. | 08-21-2008 |
20080216166 | Method and Apparatus for Detecting Grid Intrusions - A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated. | 09-04-2008 |
20080228548 | SYSTEM AND METHOD FOR SELECTING CALENDAR EVENTS BY EXAMINING CONTENT OF USER'S RECENT E-MAIL ACTIVITY - A system and method for selecting calendar events based on examining the content of a user's recent e-mail activity. According to an embodiment of the present invention, a scheduling manager assembles a keyword list, wherein the keyword list includes a collection of keywords with associated weights for each keyword among the collection of keywords. If the scheduling manager detects at least two conflicting calendar events scheduled within a calendar program, the scheduling manager searches the at least two conflicting calendar events for at least one keyword on the keyword list. The scheduling manager computes a keyword weight score for each of the at least two conflicting calendar events. If one calendar event among the at least two conflicting calendar events has a highest keyword weight score, the scheduling manager schedules the one calendar event within the calendar program. | 09-18-2008 |
20080262845 | METHOD TO TRANSLATE, CACHE AND TRANSMIT TEXT-BASED INFORMATION CONTAINED IN AN AUDIO SIGNAL - A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device. | 10-23-2008 |
20080307015 | Backing Up A Database - Backing up a database, including providing, in the database by a DBMS, at least one record with at least one backup field, the backup field being a data element that controls the backing up of the record, and backing up, by a backup module, the a record in dependence upon a value of the backup field. | 12-11-2008 |
20090089363 | Dynamic Determination of an Ideal Client-Server for an Application Executing in a Client-Server Network - The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server. | 04-02-2009 |
20090106688 | Method and System for Dynamically Providing Scroll Indicators - A method, system, and computer program product for visually indicating the last line(s) of text on a page displayed in a window so that the user can see this visual indication as they are scrolling the text. The user also has the ability to specify a hard stop for the scrolling once the visual indication has reached a desired position. | 04-23-2009 |
20090187780 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT TO MANAGE BATTERY NEEDS IN A PORTABLE DEVICE - A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip. | 07-23-2009 |
20090197636 | KID'S CELL PHONE BUTTON THAT CALLS THE CLOSEST PARENT OR RELATIVE - A cellular telephone system, including: a first cellular telephone for a child; a second cellular telephone for a first relative of the child; and at least a third cellular telephone for at least a second relative of the child; the first cellular telephone including a single button that, when the single button is pushed, automatically activates only one call to a closest one of either (a) the second cellular telephone or (b) a closest one of the at least a third cellular telephone; where closest is measured by at least one of closest geographically, closest by driving time, and closest by driving distance. | 08-06-2009 |
20090216707 | File resource usage information in metadata of a file - Resource utilization information for accessing a file is stored in metadata associated with the file. In response to a command to access the file, the resource utilization information is compared to pre-established warning criteria to determine if the resource utilization for accessing the file meets the criteria for generating a warning. Based on the results of the comparison, a warning message may be output, prior to accessing the file, if results of the comparison indicate that one or more warning criteria are met. The warning message may provide a provide a prompt for a user to determine if he/she still wishes to access the file and if so, the file is accessed; otherwise the operation for accessing the file is terminated prior to the file being accessed. | 08-27-2009 |
20090222796 | Viral trace - Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag. | 09-03-2009 |
20090249179 | METHOD TO DISPLAY MULTIPLE CACHED WEBPAGES RELATED TO A BOOKMARK - A method for displaying cached webpages related to bookmarks in a browser program. Displayed along with selected bookmarks in the bookmark menu is a numeral indicating the present total number of cached webpages associated with the bookmarks. When the user selects the numeral, a number count menu is displayed allowing the user to select a cache-count number indicating the desired number of cached webpages to display. Upon selection of the cache-count number, the corresponding number of webpages are displayed in reduced resolution. These webpages may then be further selected by the user to requery or renavigate to the webpages. | 10-01-2009 |
20100017878 | PRECISE WEB SECURITY ALERT - A method for providing an alert when a potentially or likely malicious web site is browsed to by a user. The method maintains web site identification details. If a web site purporting to be a known, previously identified, encountered and utilized web site is browsed to and requests information, the user is alerted to the precise differences between the stored web site historical identity and the identity of the present requester. | 01-21-2010 |
20100115066 | INTERNET SMALL COMPUTER SYSTEMS INTERFACE (ISCSI) SOFTWARE TARGET BOOT AND DUMP ROUTING DRIVER - A method, a system and a computer program product for mapping a client's request to perform boot and/or dump operations to a set of backing files which enable boot and dump operations in a data processing system. A Target Routing Driver (TRD) utility creates multiple Network Installation Management (NIM) objects and/or Network Dump Management (NDM) objects including (1) an Internet Small Computer Systems Interface (iSCSI) boot station and (2) an iSCSI dump collection point. The boot station exports a single iSCSI software (S/W) target from which a set of Diskless Servers obtain a boot image which enables a boot operation. The dump collection point exports a single iSCSI S/W target which is used by Diskless Servers as a dump location. The TRD utility uses the single target (exported from a particular NDM object type) to utilize the minimal resource allocation which allows listening on a single connection. The TRD utility enables block range mapping of the request to the backing files on a remote/separate storage device for the associated Diskless Server. | 05-06-2010 |
20100161367 | Customizing Online Calendar Entries - Disclosed is a method for customizing online calendar entries. A contact list for an online calendar is created including individuals and groups. An exception list is created from the individuals and/or groups on the contact list. When an online invitation is created, but not yet sent, conflict resolution tools allow the creator of the invitation to check all invitee's calendar entries for potential conflicts. A conflict resolution tool checks the calendar of an invitee for potential availability of a time corresponding to an open time slot. A conflict resolution tool responds to the online invitation with an acceptance response. A user can customize the acceptance response. The customized acceptance response is linked to the exception list. If a subsequent online invitation is received from an individual or group member on the exception list during the blocked time slot, the blocked time slot is detected as open, and scheduling of events during the blocked time slot is allowed. | 06-24-2010 |
20110161653 | Logical Partition Media Access Control Impostor Detector - Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device. | 06-30-2011 |
20110282946 | PERSONAL UNIQUE URL ACCESS PROCESSING SYSTEM - A method, programmed medium and system are provided for sending notice to a website representative whenever a specific and unique website is being accessed by an inquiring party seeking information regarding the website content. Contact information is exchanged between an inquiring party and a website representative and whenever the inquiring party views the unique URL which was provided by the website representative, the website representative is contacted with the inquiring party's phone number in real-time with the information that the inquiring party is now viewing the website. | 11-17-2011 |
20120047240 | Performance Tuning for Software as a Performance Level Service - A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance. | 02-23-2012 |
20120110092 | EMAIL THREAD MONITORING AND AUTOMATIC FORWARDING OF RELATED EMAIL MESSAGES - A computer system can implement a mechanism for email thread monitoring and automatic forwarding of related email messages. In one embodiment, a first email message is provided from an email application of a computer system to a plurality of email addresses. An indication is detected, at the email application, that a first email address of the plurality of email addresses is to be provided a copy of subsequent email messages associated with the first email message. Subsequent email messages received at, and transmitted by, the email application are monitored to determine whether one or more of the subsequent email messages are associated with the first email message. In response to determining that a second email message from the subsequent email messages is associated with the first email message, a copy of the second email message is automatically provided to the first email address of the plurality of email addresses. | 05-03-2012 |
20120185609 | PRESENTING MULTIPLE POSSIBLE SELECTABLE DOMAIN NAMES FROM A URL ENTRY - A multiending controller within a network detects a URL entry including at least a portion of a particular domain name. The multiending controller automatically selects multiple possible domain names for at least said portion of said particular domain name, wherein each of the multiple possible domain names includes a separate one of multiple ending types available for a domain. The multiending controller directs output of the multiple possible domain names for selection by a user. | 07-19-2012 |
20120209905 | MIGRATING ACTIVE I/O CONNECTIONS WITH MIGRATING SERVERS AND CLIENTS - A technique for modifying an input/output (I/O) connection type between a client and a server includes determining, by the client, when at least partial storage access control for the client is to be migrated from a first virtualized I/O server to a second virtualized I/O server. An I/O connection type, from among multiple available I/O connection types available between the client and the second virtualized I/O server, is then selected by the client when the at least partial storage access control for the client is to be migrated. The selected I/O connection type is then communicated, by the client, to the second virtualized I/O server, which is configured to facilitate storage access for the client using the selected I/O connection type. | 08-16-2012 |
20120222113 | Logical Partition Media Access Control Impostor Detector - Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device. | 08-30-2012 |
20130110782 | OPORTUNISTIC DATABASE DUPLEX OPERATIONS | 05-02-2013 |
20130179260 | Predicting Trends Using A Geographic Position System - Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system. | 07-11-2013 |
20140052945 | OPTIMIZING STORAGE SYSTEM BEHAVIOR IN VIRTUALIZED CLOUD COMPUTING ENVIRONMENTS BY TAGGING INPUT/OUTPUT OPERATION DATA TO INDICATE STORAGE POLICY - A method, system and computer program product for optimizing storage system behavior in a cloud computing environment. An Input/Output (I/O) operation data is appended with a tag, where the tag indicates a class of data for the I/O operation data. Upon the storage controller reviewing the tag appended to the I/O operation data, the storage controller performs a table look-up for the storage policy associated with the determined class of data. The storage controller applies a map to determine a storage location for the I/O operation data in a drive device, where the map represents a logical volume which indicates a range of block data that is to be excluded for being stored on the drive device and a range of block data that is to be considered for being stored on the drive device. In this manner, granularity of storage policies is provided in a cloud computing environment. | 02-20-2014 |
20140280640 | DISPLAYING MESSAGE CONTENT DIFFERENTIAL IN POPUP WINDOW - A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window. | 09-18-2014 |
20140282079 | DISPLAYING MESSAGE CONTENT DIFFERENTIAL IN POPUP WINDOW - A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window. | 09-18-2014 |
20150026371 | TECHNIQUES FOR MIGRATING ACTIVE I/O CONNECTIONS WITH MIGRATING SERVERS AND CLIENTS - A technique for modifying an input/output (I/O) connection type between a client and a server includes determining, by the client, when at least partial storage access control for the client is to be migrated from a first virtualized I/O server to a second virtualized I/O server. An I/O connection type, from among multiple available I/O connection types available between the client and the second virtualized I/O server, is then selected by the client when the at least partial storage access control for the client is to be migrated. The selected I/O connection type is then communicated, by the client, to the second virtualized I/O server, which is configured to facilitate storage access for the client using the selected I/O connection type. | 01-22-2015 |
20150074125 | MANAGING CONTENT AVAILABLE FOR CONTENT PREDICTION - A computer identifies at least one common content element used by each of at least two users from at least one communication by each of the at least two users. Responsive to one of the at least two users constructing content for a potential communication to the other of the at least two users, the computer accesses the at least one common content element for use by at least one content prediction service enabled for presenting one or more possible content elements comprising the at least one common content element for user selection during construction of the content for the potential communication. | 03-12-2015 |