Patent application number | Description | Published |
20080215897 | Security Containers for Document Components - Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters. | 09-04-2008 |
20080244594 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-02-2008 |
20080256213 | Method and Apparatus for Syndicating Interactions Between a Client and a Web Service - The Syndicated Web Services Client (SWSC) uses RSS/ATOM feeds, to facilitate asynchronous interactions between a computerized client and a web service, without requiring a duplicate copy of the web service application on the computerized client. The web service packages a form, such as an XForm containing interactive fields used by the web service, in a RSS/ATOM feed item. The web service sends the RSS/ATOM feed item to a computerized client, wherein the computerized client is a subscriber to the web service's RSS/ATOM feed and the computerized client is in network communication with a server hosting the web service. The computerized client displays the form for use by a user. Responsive to the user of the computerized client manipulating interactive fields in the form, the computerized client packages the manipulated form in a return RSS/ATOM feed item. The computerized client sends the return RSS/ATOM feed item to the server hosting the web service, wherein the server is a subscriber to the computerized client's return RSS/ATOM feed. | 10-16-2008 |
20080263049 | AUTONOMIC MANAGEMENT OF UNIFORM RESOURCE IDENTIFIERS IN UNIFORM RESOURCE IDENTIFIER BOOKMARK LISTS - Embodiments of the present invention address deficiencies of the art in respect to URI management for bookmarks and provide a novel and non-obvious method, system and computer program product for autonomic management of URIs in a URI bookmark list. In one embodiment of the invention, a method for autonomically managing bookmarks in a bookmark list can be provided. The method can include parsing a list of bookmarks to test validity for network addresses within the bookmarks, and, for each of the bookmarks containing an invalid network address, inferring a correct network address. For example, inferring a correct network address can include comparing a chunk of an image of expected content for the bookmark with pre-stored chunks of content and retrieving a network address for a closely matching one of the pre-stored chunks of content | 10-23-2008 |
20080275951 | INTEGRATED LOGGING FOR REMOTE SCRIPT EXECUTION - An integrated logging system includes a client-side logging component and a server-side logging component. The client-side logging component possesses the capability of logging client-side activity information, such as may relate to the execution of a script or other suitable client-side code that is controlled and executed independently of a remote server associated with the server-side logging component. The client-side logging component may also communicate logged activity information back to the corresponding server-side logging component. Messages including logged client-side activity information are received from the client-side logging component by the server-side logging component, and the logged activity information is integrated into the server-side log(s) of a server-side logging system. Thus, activity information from an independently controlled and operated processing device, which may be used, for example for problem determination, is integrated from sources that are distributed between systems. | 11-06-2008 |
20080276230 | PROCESSING BUNDLE FILE USING VIRTUAL XML DOCUMENT - A method, system and computer program product for processing a bundle file are disclosed. According to an embodiment, a method for processing a bundle file comprises: parsing the bundle file into bundle entries; creating a virtual XML file element to represent a bundle entry in a virtual XML document; and processing the bundle file using the virtual XML document. | 11-06-2008 |
20080320007 | EDGE DEPLOYED DATABASE PROXY DRIVER - An edge-deployed database proxy. A database access system which has been configured with the database proxy can include a universal database connectivity driver having a first exposed interface through which access to a database server can be provided; a database proxy driver registered with the universal database connectivity driver; and, a database driven application programmatically linked to the database proxy driver. Significantly, the database proxy driver can have a second exposed interface which conforms with the first exposed interface of the universal database connectivity driver. The database proxy driver further can have a configuration for invoking at least one auxiliary task in addition to providing access to the database server through the first exposed interface of the universal database connectivity driver. | 12-25-2008 |
20090060187 | DEVICE CERTIFICATE BASED APPLIANCE CONFIGURATION - Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance. | 03-05-2009 |
20090063849 | DEVICE CERTIFICATE BASED APPLIANCE CONFIGURATION - Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance. | 03-05-2009 |
20090094595 | Customized Software Documentation Based on Actual Configuration Values - A method for customizing end-user or administrative software documentation such as installation instructions is provided. A software provider first collects computer system information for multiple computer sub-systems used by a customer. The collected computer system information comprises sub-system descriptions of each of the multiple computer sub-systems, software descriptions of all software that is currently residing in each of the multiple computer sub-systems, and hardware descriptions of all hardware that are allocated to each of the multiple computer sub-systems. The software provider then receives, from the customer, the name of new software that is to be installed in a user-selected computer sub-system. Based on the collected computer system information, the software provider determines which specific device in the user-selected computer sub-system should have the new software installed. At run time, variables in the installation instructions are replaced with a device's name. | 04-09-2009 |
20090099895 | SYSTEM AND METHOD FOR MANAGING ACCESS RIGHTS TO A PROJECT TEAM AREA FOR A COMMUNITY DEVELOPMENT ASSET - A system and method for managing access rights to a project team area for a community development asset. The system includes an asset consumption dependency generator and a behavior pattern activity analyzer. The asset consumption dependency generator identifies a member of a project team area for a community development asset. The project team area defines access rights of individuals to the community development asset. The behavior pattern activity analyzer identifies a user within a collaborative development network associated with the identified member of the project team area. The behavior pattern activity analyzer also grants an access right to the identified user to access the community development asset based on a social map dependency between the identified user and the identified member. | 04-16-2009 |
20090106080 | SYSTEM AND METHOD FOR MANAGING A SURVEY FOR A COMMUNITY DEVELOPMENT ASSET - A system and method to manage a survey for a community development asset. The system includes a response repository, a sampler, a respondent profile filter, and an inference generator. The response repository stores a plurality of survey responses from survey respondents about a community development asset. The sampler selects a sample response of the plurality of survey responses. The sample response corresponds to an identified respondent. The respondent profile filter identifies a community with which the identified respondent is associated. The inference generator infers a similar response from the community associated with the identified respondent based on the sample response of the identified respondent. | 04-23-2009 |
20090144371 | SPLIT TRANSCRIPT VIEW FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a chat session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include generating a message transcript for the messaging session with a split view of the message text and the business object and applied action. | 06-04-2009 |
20090144372 | CORRELATING MESSAGING TEXT TO BUSINESS OBJECTS FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the messenger. The method further can include identifying a pronoun in the message text referencing the business object and visually distinguishing the identified pronoun in the message text to draw a correlation between the business object and the pronoun. | 06-04-2009 |
20090144373 | INDEXING A MESSAGING SESSION FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include indexing the messaging session with keywords in the message text and tags for the business object. | 06-04-2009 |
20090144386 | BUSINESS OBJECT ACTION JUSTIFICATION FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the messenger. The method further can include forwarding a copy of the message text to a backend business component as a justification to the applied action. | 06-04-2009 |
20090147958 | Dynamic, Selective Obfuscation of Information for Multi-Party Transmission - Selectively obfuscating, or obscuring, a portion or portions of information in a multi-party transmission. A user participating in a multi-party exchange signals a communication device (or proxy) that he will provide private information that is to be perceptible only to a subset of the other participants. This user also identifies that subset, preferably by providing a group identifier for a group in which that subset of participants are members. The communication device transmits a member-specific descriptor comprising an encrypted version of a group key, and uses this group key to encrypt the private information that is to be perceptible only to the subset. Device-specific characteristics of participant devices are used, in addition to user-provided data (such as a user's log-on identifier and/or password), as input to create cryptographic key information. Only participants in the subset can decrypt the encrypted private information; other participants preferably receive a filler pattern of some type instead. | 06-11-2009 |
20090150397 | METHOD OF TAGGING INSTANT MESSAGING (IM) CONVERSATIONS FOR EASY INFORMATION SHARING - A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection. | 06-11-2009 |
20090216581 | System and method for managing community assets - A system and method to manage a community development asset. The system includes an asset polling agent, a nomenclature taxonomy dictionary, and an asset discovery service. The asset polling agent identifies a descriptive term associated with an asset under development. The nomenclature taxonomy dictionary stores a list of synonym terms related to the descriptive term associated with the asset under development. The asset discovery service identifies a reusable asset of a plurality of reusable assets for use with the asset under development based on at least one term, from a combination of the descriptive term and the list of synonym terms related to the descriptive term, extracted from social network data. | 08-27-2009 |
20090300709 | AUTOMATED CORRECTION AND REPORTING FOR DYNAMIC WEB APPLICATIONS - Changes to dynamic web content are monitored for compliance with web content compliance rules. A noncompliant element associated with a change to the dynamic web content is identified based upon the web content compliance rules. Automated correction of the noncompliant element is performed based upon the web content compliance rules. The noncompliant element is reported to a server associated with the change to the dynamic web content. | 12-03-2009 |
20100011066 | CONTROLLING EMAIL DISTRIBUTION LISTS USING POLICIES - A policy can be established that is associated with an email distribution list. The policy can specify an extent that email addresses contained in the email distribution list are visible to recipients. An email message to be conveyed to at least the email distribution list can be identified. A set of recipient messages can be created from the identified email message—one recipient message for each of the recipients. The policy can be applied to each recipient message to determine an extent that email addresses contained in the email distribution list are visible to that recipient. Different ones of the recipient email messages can have different visibility regarding email addresses of members of the distribution list based upon the applied policy. | 01-14-2010 |
20110107077 | OBSCURING FORM DATA THROUGH OBFUSCATION - Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string. | 05-05-2011 |
20110107190 | OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. | 05-05-2011 |
20110119338 | EMAIL COMPOSITION AND PROCESSING - A computer implemented user interface allows composition of an electronic mail message. A user selects at least one pre-existing email from an email inbox. An envelope is then created by parsing each of the selected pre-existing emails. The pre-existing email is displayed as a tree structure comprising an envelope with at least a label sub-node in a new email view. A new email is composed by selecting parts from the tree structure. The sub-nodes may further comprise a content sub-node. The content sub-node further comprises multi-media parts, and the new email body is composed by selecting parts from the content sub-node. | 05-19-2011 |
20120005275 | ACCELERATED MICRO BLOGGING USING CORRELATED HISTORY AND TARGETED ITEM ACTIONS - A computer implemented method correlates a digital resource with an electronic message. A processor detects a focus on a targeted item that identifies a digital resource. The targeted item is in a user history that presents a history of a user's access to multiple digital resources. The processor then auto-populates a draft of an electronic message with the targeted item that was focused in the user history. | 01-05-2012 |
20120166929 | SYSTEM AND METHOD FOR PROVIDING A CONTEXT-SENSITIVE USER INTERFACE - Exemplary embodiments disclose a method and system for providing a context-sensitive user interface. The method and system include dynamically creating an ontology by storing data values entered by different users from the same or different computers into fields of at least one form, where the data values stored in the ontology includes both verified data that has been verified by at least one workflow, and unverified data that has not been verified by the at least one workflow; in response to a current user interacting with a current form, retrieving from the ontology the data values made by the different users and presenting the retrieved data values to the current user as autocomplete suggestions, where the autocomplete suggestions includes the verified data and the unverified data; dynamically adjusting the autocomplete suggestions for the current user of the current form as new data values of other users are received and stored in the ontology; and distinguishing the unverified data from the verified data using at least one of a visual representation and an audio representation of the quality of the autocomplete suggestions. | 06-28-2012 |
20120167227 | OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. | 06-28-2012 |
20120173678 | NETWORK AWARE PROVISIONING IN A MOBILITY SUPPORTING CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for network aware provisioning in a mobility supporting cloud computing environment. In an embodiment of the invention, a method for network aware provisioning in a mobility supporting cloud computing environment is provided. In the method, a request is received from a mobile computing device for access to a service in a cloud computing environment and both an expected path of travel for the mobile computing device and also a network access speed along the expected path of travel is determined. Thereafter, a particular instance of the service executing in a host in the cloud computing environment able to accommodate a degree of interaction between the mobile computing device resulting from the network access speed determined for the expected path of travel is selected. Finally, the particular instance of the service is provisioned for access by the mobile computing device. | 07-05-2012 |
20120197804 | Merchandise-Integral Transaction Receipt and Auditable Product Ownership Trail - Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product. | 08-02-2012 |
20120222109 | PROVIDING A DECLARATION OF SECURITY REQUIREMENTS TO A SECURITY PROGRAM TO USE TO CONTROL APPLICATION OPERATIONS - Provided are a computer program product, system, and method for providing a declaration of security requirements to a security program to use to control application operations. The application communicates to the security program a declaration of security requirements indicating application actions designated to be performed with respect to resources in the computer system. The application is executed to perform application operations in response to communicating the declaration of security requirements to the security program. During the execution of the application, the actions are performed with respect to the resources at the computer system indicated in the declaration of security requirements. | 08-30-2012 |
20120222115 | USING A DECLARATION OF SECURITY REQUIREMENTS TO DETERMINE WHETHER TO PERMIT APPLICATION OPERATIONS - Provided are a computer program product, system, and method for using a declaration of security requirements to determine whether to permit application operations. A declaration of security requirements indicates actions the application designates to perform with respect to resources in a computer system, wherein a plurality of the indicated actions are indicated for at least two operation modes of the application. A detection is made of whether the application is requesting to perform a requested action with respect to a requested resource in the computer system. A determination is made of a current operation mode of the application comprising one of the at least two operation modes in response to detecting that the application is requesting the requested action. A determination is made as to whether the declaration of security requirements indicates the requested action with the current operation mode. The requested action with respect to the requested resource is allowed to proceed in response to determining that the declaration of security requirements indicates the requested action with respect to the requested resource as indicated with the current operation mode. | 08-30-2012 |
20120260254 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-11-2012 |
20120303718 | RECEIVING EMAIL ATTACHMENTS WHEN A MAILBOX IS FULL - Within a system comprising a processor and a memory, a method of sending an attachment of a first electronic mail (email) to a recipient. The method includes receiving the first email addressed to the recipient and, via the processor, determining whether a volume of data contained in the recipient's electronic mailbox has reached a threshold level. When the volume of data has reached the threshold level, via the processor, establishment of an instant messaging session with an instant messaging client associated with the recipient can be initiated. The attachment can be caused to be attached to an instant message. Sending of the instant message to the instant messaging client associated with the recipient can be initiated. | 11-29-2012 |
20130007125 | INFORMATION EXCHANGE IN THE SOCIAL NETWORK ENVIRONMENT - A method for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest. | 01-03-2013 |
20130007141 | INFORMATION EXCHANGE IN THE SOCIAL NETWORK ENVIRONMENT - A method, system and computer program product for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest. | 01-03-2013 |
20130007225 | URL-BASED STICKY ROUTING TOKENS USING A SERVER-SIDE COOKIE JAR - A method, system and program product are presented for enabling a session, as defined by a series of related transactions to perform a unit of work, to be created between a client and a particular server where the server is managed by a dispatcher. Modifications to the Uniform Resource Locator (URL) are used to create a method of transferring information form the client to the server. The server implements a server-side storage area (cookie jar) to temporarily store information about the client and the session so that the client is routed to the same server for successive messages in the same session and no reliance is made upon an ability by the client to store or return cookies. | 01-03-2013 |
20130007656 | CONTENT AND WINDOW OVERLAY AND CONFIGURATION - Some embodiments of the inventive subject matter are directed to selecting an area of a first window, which contains first content, in response to user input, generating a second window that contains second content that is substantially similar to a portion of the first content contained within the area of the first window, and superimposing the second window over a target window. The target window can be the first window or a third window. Some embodiments are further directed to affixing the second window to remain stationary and above the target window when the target window is active or in focus. Some embodiments are further directed to modifying target content in the target window in response to the activation of the second content (e.g., sorting target content based on activation of a sorting control within the second window, modifying number values in the target window based on number values of the second content, etc.). | 01-03-2013 |
20130019187 | VISUALIZING EMOTIONS AND MOOD IN A COLLABORATIVE SOCIAL NETWORKING ENVIRONMENTAANM HIND; JOHN R.AACI RALEIGHAAST NCAACO USAAGP HIND; JOHN R. RALEIGH NC USAANM SALAHSHOUR; ABDOLREZAAACI RALEIGHAAST NCAACO USAAGP SALAHSHOUR; ABDOLREZA RALEIGH NC USAANM SOEMARGONO; TINTIN S.AACI CARYAAST NCAACO USAAGP SOEMARGONO; TINTIN S. CARY NC USAANM WIGUNA; STEFANUSAACI CARYAAST NCAACO USAAGP WIGUNA; STEFANUS CARY NC US - Techniques are described for conveying a collective emotional state of a plurality of participants to a communication. Embodiments receive emotional state data for each of the participants to the communication. The emotional state data for each of the participants is collected by monitoring at least one or more applications the respective participant is interacting with. An emotional state of the participants to the communication is then determined, based on the received emotional state data and a determined topic of the communication. Embodiments provide an indication of the determined emotional state of the participants. | 01-17-2013 |
20130067302 | INTEGRATING A CALENDARING SYSTEM WITH A MASHUP PAGE CONTAINING WIDGETS TO PROVIDE INFORMATION REGARDING THE CALENDARED EVENT - A method, system and computer program product for integrating a calendaring system with a mashup page. A mashup server accesses the calendar data inputted by a user to create or edit an entry in a calendar application. The mashup server provides the user access to widgets to be included on a mashup page, where the widgets use the accessed calendar information so that the widgets provide information to the recipients of the calendared event. In this manner, the widgets provide information that normally would be accessible by the participants via links to a myriad of disjoint applications thereby negating the fractured experience of the participants. Upon finalizing the mashup page, the mashup page is saved as a Uniform Resource Location (URL) in the created/edited calendar entry. The mashup page is later transmitted by the mashup server to the recipients of the calendar entry. | 03-14-2013 |
20140108574 | RECEIVING EMAIL ATTACHMENTS WHEN A MAILBOX IS FULL - Within a system comprising a processor and a memory, a method of sending an attachment of a first electronic mail (email) to a recipient. The method includes receiving the first email addressed to the recipient and, via the processor, determining whether a volume of data contained in the recipient's electronic mailbox has reached a threshold level. When the volume of data has reached the threshold level, via the processor, establishment of an instant messaging session with an instant messaging client associated with the recipient can be initiated. The attachment can be caused to be attached to an instant message. Sending of the instant message to the instant messaging client associated with the recipient can be initiated. | 04-17-2014 |
20140317208 | CORRELATING MESSAGING TEXT TO BUSINESS OBJECTS FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the messenger. The method further can include identifying a pronoun in the message text referencing the business object and visually distinguishing the identified pronoun in the message text to draw a correlation between the business object and the pronoun. | 10-23-2014 |
20140317209 | INDEXING A MESSAGING SESSION FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include indexing the messaging session with keywords in the message text and tags for the business object. | 10-23-2014 |
20140317534 | SPLIT TRANSCRIPT VIEW FOR BUSINESS OBJECT INTEGRATION INTO MESSAGING - Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a chat session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include generating a message transcript for the messaging session with a split view of the message text and the business object and applied action. | 10-23-2014 |