Patent application number | Description | Published |
20080201545 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR ASSOCIATING THREADS WITHIN NON-RELATED PROCESSES BASED ON MEMORY PAGING BEHAVIORS - A method of tying related process threads within non-related applications together in terms of memory paging behavior. In a data processing system, a first process thread is related to one or more “partner” threads within separate high latency storage locations. The kernel analyzes the memory “page-in” patterns of multiple threads and identifies one or more partner threads of the first thread based on user input, observed memory page-in patterns, and/or pre-defined identification information within the thread data structures. The kernel marks the first thread and its corresponding related partner threads with a unique thread identifier. When the first thread is subsequently paged into a lower latency memory, the kernel also pages-in the related partner threads that are marked with the unique thread identifier in lockstep. Tying related threads from non-related applications together in terms of memory paging behavior thus eliminates memory management delays. | 08-21-2008 |
20080228548 | SYSTEM AND METHOD FOR SELECTING CALENDAR EVENTS BY EXAMINING CONTENT OF USER'S RECENT E-MAIL ACTIVITY - A system and method for selecting calendar events based on examining the content of a user's recent e-mail activity. According to an embodiment of the present invention, a scheduling manager assembles a keyword list, wherein the keyword list includes a collection of keywords with associated weights for each keyword among the collection of keywords. If the scheduling manager detects at least two conflicting calendar events scheduled within a calendar program, the scheduling manager searches the at least two conflicting calendar events for at least one keyword on the keyword list. The scheduling manager computes a keyword weight score for each of the at least two conflicting calendar events. If one calendar event among the at least two conflicting calendar events has a highest keyword weight score, the scheduling manager schedules the one calendar event within the calendar program. | 09-18-2008 |
20080262845 | METHOD TO TRANSLATE, CACHE AND TRANSMIT TEXT-BASED INFORMATION CONTAINED IN AN AUDIO SIGNAL - A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device. | 10-23-2008 |
20080307015 | Backing Up A Database - Backing up a database, including providing, in the database by a DBMS, at least one record with at least one backup field, the backup field being a data element that controls the backing up of the record, and backing up, by a backup module, the a record in dependence upon a value of the backup field. | 12-11-2008 |
20090089363 | Dynamic Determination of an Ideal Client-Server for an Application Executing in a Client-Server Network - The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server. | 04-02-2009 |
20090187780 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT TO MANAGE BATTERY NEEDS IN A PORTABLE DEVICE - A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip. | 07-23-2009 |
20090197636 | KID'S CELL PHONE BUTTON THAT CALLS THE CLOSEST PARENT OR RELATIVE - A cellular telephone system, including: a first cellular telephone for a child; a second cellular telephone for a first relative of the child; and at least a third cellular telephone for at least a second relative of the child; the first cellular telephone including a single button that, when the single button is pushed, automatically activates only one call to a closest one of either (a) the second cellular telephone or (b) a closest one of the at least a third cellular telephone; where closest is measured by at least one of closest geographically, closest by driving time, and closest by driving distance. | 08-06-2009 |
20090216707 | File resource usage information in metadata of a file - Resource utilization information for accessing a file is stored in metadata associated with the file. In response to a command to access the file, the resource utilization information is compared to pre-established warning criteria to determine if the resource utilization for accessing the file meets the criteria for generating a warning. Based on the results of the comparison, a warning message may be output, prior to accessing the file, if results of the comparison indicate that one or more warning criteria are met. The warning message may provide a provide a prompt for a user to determine if he/she still wishes to access the file and if so, the file is accessed; otherwise the operation for accessing the file is terminated prior to the file being accessed. | 08-27-2009 |
20090222796 | Viral trace - Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag. | 09-03-2009 |
20100017878 | PRECISE WEB SECURITY ALERT - A method for providing an alert when a potentially or likely malicious web site is browsed to by a user. The method maintains web site identification details. If a web site purporting to be a known, previously identified, encountered and utilized web site is browsed to and requests information, the user is alerted to the precise differences between the stored web site historical identity and the identity of the present requester. | 01-21-2010 |
20100161367 | Customizing Online Calendar Entries - Disclosed is a method for customizing online calendar entries. A contact list for an online calendar is created including individuals and groups. An exception list is created from the individuals and/or groups on the contact list. When an online invitation is created, but not yet sent, conflict resolution tools allow the creator of the invitation to check all invitee's calendar entries for potential conflicts. A conflict resolution tool checks the calendar of an invitee for potential availability of a time corresponding to an open time slot. A conflict resolution tool responds to the online invitation with an acceptance response. A user can customize the acceptance response. The customized acceptance response is linked to the exception list. If a subsequent online invitation is received from an individual or group member on the exception list during the blocked time slot, the blocked time slot is detected as open, and scheduling of events during the blocked time slot is allowed. | 06-24-2010 |
20110161653 | Logical Partition Media Access Control Impostor Detector - Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device. | 06-30-2011 |
20120047240 | Performance Tuning for Software as a Performance Level Service - A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance. | 02-23-2012 |
20120222113 | Logical Partition Media Access Control Impostor Detector - Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device. | 08-30-2012 |
20130179203 | BLOCKING ACCESS TO PROJECT DATA IN RESPONSE TO FAILURE TO INDICATE ATTENDANCE AT PROJECT MEETINGS - A method for restricting access to project data includes determining that a user has failed to indicate an intention to attend a meeting by failing to respond to a meeting notice or by indicating that the user will not participate in the meeting. The meeting notice includes an invitation sent electronically to the user to attend a meeting, and the user has electronic access to data by way of permissions associated with a user account assigned to the user. The meeting is related to the data. The method includes recording a failure-to-attend event in response to determining that the user has failed to indicate an intention to attend a meeting. The method includes blocking the user from accessing the user account in response to a quantity of failure-to-attend events reaching non-attendance criteria. | 07-11-2013 |
20130179260 | Predicting Trends Using A Geographic Position System - Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system. | 07-11-2013 |
20140006079 | SCHEDULING VIEWING OF RECORDED EVENTS | 01-02-2014 |
20140006801 | Start Method for Application Cryptographic Keystores | 01-02-2014 |
20140194101 | ALTERNATE NOTIFICATION SELECTION - Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list. | 07-10-2014 |
20140194104 | Alternate Notification Selection - Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list. | 07-10-2014 |
20140267337 | Pre-Defined Streaming Media Buffer Points - An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity. | 09-18-2014 |
20140282690 | Pre-Defined Streaming Media Buffer Points - An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity. | 09-18-2014 |
20140331284 | INTEGRATION OF HOME SECURITY INTO EXISTING INFRASTRUCTURE - Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status. | 11-06-2014 |
20150071611 | IDENTIFYING AN RERECORDING ONLY THE INCOMPLETE UNITS OF A PROGRAM BROADCAST RECORDING - Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program. | 03-12-2015 |
20150071620 | IDENTIFYING AND RERECORDING ONLY THE INCOMPLETE UNITS OF A PROGRAM BROADCAST RECORDING - Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program. | 03-12-2015 |
20150074125 | MANAGING CONTENT AVAILABLE FOR CONTENT PREDICTION - A computer identifies at least one common content element used by each of at least two users from at least one communication by each of the at least two users. Responsive to one of the at least two users constructing content for a potential communication to the other of the at least two users, the computer accesses the at least one common content element for use by at least one content prediction service enabled for presenting one or more possible content elements comprising the at least one common content element for user selection during construction of the content for the potential communication. | 03-12-2015 |