Patent application number | Description | Published |
20080235565 | System and Method for Reference Validation in Word Processor Documents - Systems and methods are provided for supporting the use of hypertext links in documents such as word processor documents. A given word processor document is scanned for link representations to sources that are external to the word processor document. These identified link representations are then checked for validity and functionality, and the external sources are also checked for content and accessibility. In order to facilitate checking the content of the external sources, the word processor document is appended to include all or part of the content of each linked external source. The appended information is then used for subsequent content comparisons. Checking of the link representations and external sources is used to produce a current validity status for each link representations. The validity status of the links within a given document are indicated to an author or reader using visual queues by modifying non-link aspects of the word processor document, by modifying the appearance of a file name or file folder associated with the word processor document or by modifying the appearance of a cursor used in conjunction with the word processor document. | 09-25-2008 |
20080256370 | Intrusion Protection For A Client Blade - Receiving, by a blade management module from a client blade, notification of a loss of communications between a remote desktop apparatus and the client blade; responsive to the notification, accepting, by the blade management module from the remote desktop apparatus, an instruction to alter a power setting of the client blade; and; responsive to the instruction, altering, by the blade management module, the power setting of the client blade. | 10-16-2008 |
20090064338 | PROXIMITY SENSITIVE BLADE SERVER SECURITY - Embodiments of the present invention address deficiencies of the art in respect to blade server security and provide a method, system and computer program product for proximity sensitive blade server security. In one embodiment of the invention, a method for proximity sensitive blade server security can be provided. The method can include sensing proximity of a systems administrator relative to a blade center, detecting a loss of proximity of the systems administrator, and triggering automated securing of at least one blade server in the blade server in response to detecting the loss of proximity. For example, sensing proximity of a systems administrator relative to a blade center can include establishing a wireless radio connection with a personal article associated with the systems administrator, and determining a loss of proximity when the connection is lost. | 03-05-2009 |
20090157747 | Administering A Digital Media File Having One Or More Potentially Offensive Portions - Methods, digital media files, apparatus, and products for administering a digital media file having one or more potentially offensive portions are described that include inserting in the digital media file at least one tag identifying as potentially offensive a portion of the digital media file, the tag also identifying a location of the potentially offensive portion in the digital media file; and transmitting the digital media file with the tag to a playback device. | 06-18-2009 |
20090177749 | STATUS AND TIME-BASED DELIVERY SERVICES FOR INSTANT MESSENGERS - Embodiments of the present invention address deficiencies of the art in respect to unattended status and time-based messaging in an instant messaging (IM) environment and provide a method, system and computer program product for unattended status and time-based messaging in an instant messaging (IM) environment. In an embodiment of the invention, a method for unattended status and time-based messaging in an instant messaging (IM) environment can be provided. The method can include receiving a request from an IM user to queue an unattended status and time-based message, retrieving a recovery trigger for the unattended status and time-based message, and assigning the unattended status and time-based message to a message queue. | 07-09-2009 |
20100005494 | ADMINISTERING DIGITAL MEDIA STREAMS - Methods, apparatus, and products for administering digital media streams by a media display device including: receiving from a digital media provider a digital media stream including content of a plurality of channels, identifying among the plurality of channels one or more channels for caching; caching content of the one or more identified channels, the content of each of the identified channels including a marker identifying a beginning location of a segment of content; and responsive to a user's selection of a first one of the cached channels, displaying the content of the first channel beginning at the location identified by the marker. | 01-07-2010 |
20100215336 | Administering a time-shifting cache in a media playback device - Methods, apparatus and products for administering a time-shifting cache in a media playback device are disclosed, where the media playback device receives from a digital media provider a digital media stream of digital media content and administering the time-shifting cache includes caching the digital media content of the digital media stream in the time-shifting cache; dynamically identifying one or more non-preferred segments of the cached digital media content; and managing the time-shifting cache in dependence upon the identified non-preferred segments. | 08-26-2010 |
20110129201 | CUSTOMIZED PLAYBACK OF BROADCAST MEDIA - One embodiment provides a method of providing a controlled, customized playback of broadcast media, such as satellite radio or television. A subset of preferred channels is identified from a set of available broadcast channels. Each broadcast channel provides streaming content including media segments and, optionally, segment tags marking the beginning and end of each media segment. Complete media segments of the streamed content from the preferred channels are received and stored. A plurality of queues is maintained. The received content from each channel is placed in one of the queues in the order received. A customized playback sequence is generated. In generating the customized playback sequence, the queued media segments are selected according to channel-selection criteria, and each media segment is played back in its entirety. | 06-02-2011 |
20110153638 | CONTINUITY AND QUALITY OF ARTISTIC MEDIA COLLECTIONS - A computer-implemented method, system, and computer program product for generating a playlist is presented. A first media file, which is from an artistic media collection and has at least one feature described by first text data, is added to a playlist. An analytics resource is searched for at least one common feature associated with and shared by the first media file and a second media file from the artistic media collection. The common feature is identified by matching the first text data with second text data, about the second media file, in the analytics resource. In response to at least one common feature being identified for the first and second media files, the second media file is added to the playlist. | 06-23-2011 |
20130198861 | VIRTUAL AVATAR AUTHENTICATION - In one general embodiment, a method for determining a controlling entity of a first avatar in a virtual world includes: receiving a request for access to a resource via a first avatar; providing a challenge to the first avatar in response to receiving the request; receiving a challenge response via the first avatar in response to the challenge; determining an identity confidence level based on the challenge response; making an identity determination for a controlling entity of the first avatar based on the identity confidence level; and providing or denying access to the resource based on the identity determination. | 08-01-2013 |
20140019813 | ARRANGING DATA HANDLING IN A COMPUTER-IMPLEMENTED SYSTEM IN ACCORDANCE WITH RELIABILITY RATINGS BASED ON REVERSE PREDICTIVE FAILURE ANALYSIS IN RESPONSE TO CHANGES - Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating. | 01-16-2014 |
20140344629 | ARRANGING DATA HANDLING IN A COMPUTER-IMPLEMENTED SYSTEM IN ACCORDANCE WITH RELIABILITY RATINGS BASED ON REVERSE PREDICTIVE FAILURE ANALYSIS IN RESPONSE TO CHANGES - Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating. | 11-20-2014 |
20150049905 | MAP GENERATION FOR AN ENVIRONMENT BASED ON CAPTURED IMAGES - Systems and methods for map generation for an environment based on captured images are disclosed. According to an aspect, a method includes capturing a first image of an environment. The method also includes identifying a reference in the first image. Further, the method includes generating, based on the identified reference, a map of the environment to use for physically orienting a computing device within the environment based on a second image including the reference. | 02-19-2015 |