Patent application number | Description | Published |
20130095889 | Filtering Mobile Communications Device Messages For Presentation Within An Automobile - Filtering mobile communications device messages for presentation within an automobile, the automobile coupled for data communications to a user's mobile communications device, and: responsive to the user's mobile communications device receiving a message, identifying, by a message display filter, message characteristics of the message; identifying, by the message display filter, environmental characteristics; and administering, by the message display filter, presentation of content of the message within the automobile in dependence upon the message characteristics, the environmental characteristics, and a predefined message filtering ruleset. | 04-18-2013 |
20130282835 | Filtering Message Posts in a Social Network - A social media mechanism processes messages for content that may require filtering of recipients of the message, and informs a user who drafted the message when the message might need to be filtered so it is not sent to all potential recipients of the message. The user may then select to send the message to all potential recipients, or to filter the recipients so the message is sent to less than all of the potential recipients. User profiles are created and maintained, and may include information that helps to determine when filtering of messages is desirable. Feedback buttons are also provided to provide feedback when a user does not like a message. | 10-24-2013 |
20130282841 | FILTERING MESSAGE POSTS IN A SOCIAL NETWORK - A social media mechanism processes messages for content that may require filtering of recipients of the message, and informs a user who drafted the message when the message might need to be filtered so it is not sent to all potential recipients of the message. The user may then select to send the message to all potential recipients, or to filter the recipients so the message is sent to less than all of the potential recipients. User profiles are created and maintained, and may include information that helps to determine when filtering of messages is desirable. Feedback buttons are also provided to provide feedback when a user does not like a message. | 10-24-2013 |
20140164594 | INTELLIGENT PLACEMENT OF VIRTUAL SERVERS WITHIN A VIRTUALIZED COMPUTING ENVIRONMENT - A method for recommending placement of virtual servers within a virtualized environment. The method includes collecting information relating to a plurality of virtual servers and to a plurality of host computing systems, wherein one or more of the plurality of host computing systems hosts at least one of the plurality of virtual servers. The method includes measuring efficiency of at least one of the plurality of virtual servers on a current host computing system within the virtualized environment. The method includes determining the efficiency of the at least one virtual server will be improved with the at least one virtual server on a second host computing system and, in response to determining the efficiency will be improved, recommending placement of the at least one virtual server on the second host computing system. | 06-12-2014 |
20150052520 | METHOD AND APPARATUS FOR VIRTUAL MACHINE TRUST ISOLATION IN A CLOUD ENVIRONMENT - Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment. | 02-19-2015 |
20150052614 | VIRTUAL MACHINE TRUST ISOLATION IN A CLOUD ENVIRONMENT - Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment. | 02-19-2015 |
20150066764 | MULTI FACTOR AUTHENTICATION RULE-BASED INTELLIGENT BANK CARDS - System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account. | 03-05-2015 |