Patent application number | Description | Published |
20080248778 | METHOD AND SYSTEM FOR TRIGGERING A LOCAL EMERGENCY SYSTEM USING WIRELESS MEANS - A method and system for triggering a local emergency system using wireless means. Existing local emergency systems are exploited through an ordinary mobile user device implementing the present invention. Disadvantages of current local emergency system are overcome by facilitating a user to remotely report emergency service request with more accurate location information automatically conveyed by the present invention. A mobile user device is configured to activate an emergency service station of a local emergency system without knowing the location of the emergency service station and without physically accessing and operating the emergency service station. | 10-09-2008 |
20090037875 | Rapidly Assembling and Deploying Selected Software Solutions - Methods and Systems are provided for assembling a software information technology (IT) solution using a graphical user interface (GUI) based development environment. Software solution building blocks (e.g., plug-ins) are selected and stored in a catalog of solutions within the development environment. Meta data is generated for each of the selected building blocks describing the building block's compatibility with other building blocks. The building blocks displayed in the catalog of solutions may be selected for the IT software solution by a software developer based on input from the customer for the requirements of the IT software solution. A set of logical relationships between the building blocks is based on the meta data, allowing the IT software solution to be created and modified by adding building blocks without incurring extensive system integration services for building block installation and configuration. | 02-05-2009 |
20090043430 | COOPERATIVE PARKING - A system, a method, and a service for cooperative parking between vehicles. A parking vehicle has a transmitter to send a parking signal to parked vehicles in proximity to a parking space. A parked vehicle receives the parking signal, activates one or more position sensors mounted on the parked vehicle, activates its engine or auxiliary motor, disengages any locking mechanism such as brakes or the transmission, and moves itself away from the parking space. Once the parking vehicle has parked successfully or after a predetermined time delay, the parked vehicle may move to a position closer to the parking vehicle but still far enough away to avoid collision as determined by the position sensor and turn off its engine or auxiliary motor and re-engage its locking mechanism. The cooperative parking system may include a switch and a transmitter, either contained within a hand-held programmable device or within the parking vehicle. Preferably, all vehicles have the transmitter and the receiver to activate and respond to parking requests. | 02-12-2009 |
20100239222 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - Displaying a secondary media stream within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to crop the primary media stream to accommodate a size of the inset definition selected. The primary media stream is cropped to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the cropped primary media stream for user viewing. | 09-23-2010 |
20110026828 | ENHANCED SCREEN CAPTURE FOR FORM MANIPULATION - According to one embodiment of the present invention, a method for processing forms based on an image is presented. A form is captured in an image, and a number of field values within the form in the image are detected. The number of field values is stored in the image metadata | 02-03-2011 |
20110159931 | Time-Related Power Systems - A method, programmed medium and system are disclosed which provide for user-controlled management of power requirements for mobile devices. The system dynamically adjusts power settings according to goals set by the end user. The end user specifies a time-to-live goal in hours, minutes or a predetermined date/time and the power management function continuously monitors and adjusts power components to meet that goal. | 06-30-2011 |
20110167173 | Optimal Compression Process Selection Methods - A mechanism for determining an optimal compression technique for each data file when creating a computer archive file from a set of data files. A local archiving application receives an instruction to archive a set of data files and determines the file type and size of a data file in the set of data files. An optimal compression method for the data file is selected based on the file type and size of the data file. The archiving application compresses the data file using the optimal compression method. The archiving application updates meta data associated with the compressed file to include a meta compression format identifier of the optimal compression method used to compress the data file. The archiving application then repeats the determining, selecting, compressing, and updating for each data file in the set of data files to create an archive of the set of data files. | 07-07-2011 |
20110302430 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 12-08-2011 |
20110320828 | POWER MANAGEMENT AND PRIORITY CHARGING ASSIGNMENTS - Systems and methods are provided for managing power to devices in a network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving scheduled upcoming calendar events and/or activities from one or more of a plurality of devices connected in a network. The method further includes centrally managing power consumption of a device of the plurality of devices in the network based on the scheduled upcoming calendar events and/or activities. | 12-29-2011 |
20110320832 | MANAGING ELECTRICAL POWER IN A VIRTUAL POWER DELIVERY NETWORK - Systems and methods are provided for managing power to devices in a virtual power delivery network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving device information from one or more devices connected in a virtual power delivery network. The method further includes managing power consumption of the one or more devices in the virtual power delivery network based on the received device information. | 12-29-2011 |
20120020468 | CONFERENCE CALL MANAGEMENT METHOD AND SYSTEM - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 01-26-2012 |
20120059805 | Inter-Organizational and Intra-Organizational Repository for Operating System Images - Mechanisms are provided for collaborating between two or more operating system image repository systems. A first operating system image (OSI) repository system is associated with a second OSI repository system. Each of the first and second OSI repository systems store one or more OSIs for use either natively or virtually by client computing devices. One or more collaboration rules are defined that define a manner by which OSI information in the first OSI repository system is shared with the second OSI repository system. A collaborative operation is performed between the first OSI repository system and the second OSI repository system. An extent of the collaborative operation is circumscribed by application of the one or more collaboration rules. | 03-08-2012 |
20120096408 | SYSTEM AND METHOD FOR ESTABLISHING A COLLABORATIVE WORKSPACE - An approach that establishes a collaborative workspace for one or more users based on a predefined context. In one embodiment, there is a collaborative workspace tool that includes a user input component configured to receive one or more user inputs when selecting collaborative workspace content from a plurality of pre-arranged resources displayed on a user interface to include in a collaborative workspace. The collaborative workspace tool further includes a preserving component configured to gather information relating to the selected workspace content, build a workspace object to preserve the selected workspace content and save the workspace object; and a rendering component to build the collaborative workspace on a user device when the workspace object is opened from the user device. | 04-19-2012 |
20120113323 | COMPARING LOW QUALITY BROADCASTS TO HIGH QUALITY BRAODCASTS - A system, method, and computer program product for comparing a low quality broadcast to a high quality broadcast on a display device to show users the benefits of a high quality broadcast over a low quality broadcast. The display device capabilities are detected and compared to retrieved requirements for displaying a high quality broadcast. If the display requirements are met, retrieving the high quality broadcast and displaying the low quality and high quality broadcasts on a display device for user comparison. Then, the user accepts either the high quality or low quality broadcast and displays the high quality broadcast or the low quality broadcast in accordance with the user selection. | 05-10-2012 |
20120116789 | OPTIMIZING QUEUE LOADING THROUGH VARIABLE ADMITTANCE FEES - Attraction attendance levels experienced by a customer are dynamically managed as a function of customer admission pricing. A customer is offered an opportunity to pay a regular admission fee or a higher premium admission fee for admission to a facility with one or more attractions, wherein the customer is provided with information as to an amount of reduced queue loading that will be achieved by the customer if the customer pays the premium admission fee. Queue loading is monitored, and a queue load diminishment relative to an expected queue load is identified, the amount of reduced queue loading achievable by the customer through paying the premium admission fee updated accordingly. The customer is notified of the updated amount of reduced queue loading achievable through paying the premium admission fee as a function of customer metadata. | 05-10-2012 |
20120116863 | OPTIMAL SCHEDULING OF VENUE ATTENDANCE BASED ON QUEUE SIZE AND LOCATION - Embodiments of the invention provide for managing attraction attendance levels through tracking current attendance levels and notifying patrons of incentives to alter their attraction selections in real-time. Examples identify an attraction queue that has a customer wait time failing to meet a threshold and determine a geographic relationship of a tracking device associated with a registered customer to the queue. Accordingly, an incentive is created from metadata associated with the queue and offered to the registered customer to urge the registered customer to take a queue balancing action. The queue balancing action may be leaving the queue if the customer wait time exceeds a threshold maximum wait time and the tracking device is within the queue, or choosing to enter the queue if the customer wait time is less than a threshold minimum wait time and the tracking device is outside of the queue. | 05-10-2012 |
20120122566 | ACCESS CONTROL FOR ELECTRONIC ENTERTAINMENT SYSTEMS - Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules. | 05-17-2012 |
20120124562 | Application Programming Interface Naming Using Collaborative Services - A method, computer system, and computer program product for improving application programming interface naming. An alternate name is received for a target application programming interface feature from a consumer developer. In addition, an indirection to the application programming interface feature is generated based on the alternate name. Then, the indirection to the application programming interface feature is transmitted to an indirections repository. | 05-17-2012 |
20120128146 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-24-2012 |
20120131475 | SOCIAL NETWORK BASED ON VIDEO RECORDER PARENTAL CONTROL SYSTEM - A computer system, computer program product, and method of sharing and creating social network reviews of selected programs that may be viewed and shared over a social network. If a user agrees with a social network review already present for a selected program, the categorization and editing of inappropriate content of the selected program may be applied to the same program for that user. If a user disagrees with a social network review of a selected program already present, the user may review the selected program and edit any inappropriate content as desired and submit the review to the social network. | 05-24-2012 |
20120180045 | DETERMINING AN OPTIMAL COMPUTING ENVIRONMENT FOR RUNNING AN IMAGE - Aspects of the present invention provide an approach that evaluates a locally running image (e.g., such as that for a virtual machine (VM)) and determines if that image could run more efficiently and/or more effectively in an alternate computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention evaluate the local (existing/target) image's actual and perceived performance, as well as the anticipated/potential performance if the image were to be migrated to an alternate environment. The anticipated/potential performance can be measured based on another image that is similar to the existing/target image but where that image is running in a different computing environment. Regardless, the system would display a recommendation to the end user if it were determined that the image could perform better in the alternate environment (or vice versa). It is understood that performance is just one illustrative metric for which the system would perform a comparison. Other metrics such as cost, reliability, availability, etc. could also be used. | 07-12-2012 |
20120201366 | CONFERENCE CALL MANAGEMENT - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 08-09-2012 |
20120215832 | PUBLISHER-BASED MESSAGE DATA CASHING IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for a broker-assisted, publisher side cache that can be utilized to reduce a volume of data (e.g., network traffic) delivered between a publisher and broker in a publication/subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is received on a broker system from a publisher system, the broker system analyzes the message for potentially repetitive data. Such data can be determined from historical messages (e.g., determining that a certain set of data appeared in multiple messages and is thus flagged in a database or the like), a set of rules (e.g., if data set “Y” appears, flag it as potentially repetitive), etc. Regardless, once such a set of data has been identified, a unique identifier/key corresponding thereto will be sent back to the publisher system and the set of data will be stored in a (data) cache. Upon receipt, the publisher system will cache/store the unique identifier in a (key) cache. Then, when the publisher system generates a future message that would contain the same set of data, the publisher system will substitute the unique identifier (as retrieved from the key cache) for the set of data to yield an abbreviated/truncated message. The abbreviated message would be sent to the broker system, which would: analyze the message; locate the unique identifier; retrieve the corresponding set of data from the (data) cache; replace the unique identifier with the set of data to yield a completed message; and then send the completed message to relevant subscriber system(s). | 08-23-2012 |
20120215858 | CACHING POTENTIALLY REPETITIVE MESSAGE DATA IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - In general, embodiments of the present invention provide an approach for caching potentially repetitive data in a publication-subscription (pub/sub) system. Specifically, in a typical embodiment, when a message is received on a broker system from a publisher system, the broker system analyzes the message for potentially repetitive data. Such data can be determined from historical messages (e.g., determining that a certain set of data appeared in multiple messages and is thus flagged in a database or the like), a set of rules (e.g., if data set “Y” appears, flag it as potentially repetitive), etc. Regardless, once such a set of data has been identified, the set of data will be tagged/marked in the message with a unique identifier. The message and inserted unique identifier is then sent to the relevant subscriber system(s). Upon receiving the message, the subscriber system(s) will analyze the message, identify the unique identifier, and cache the tagged data. Thereafter, when the publisher system receives another message that contains the same set of data that was previously tagged, the publisher system will substitute the unique identifier for the repeated data to yield an abbreviated message. The publisher system will then send the abbreviated message to the subscriber system(s), which will analyze the abbreviated message, identify the unique identifier, and retrieve the associated data from cache. Thus, the substitution of unique identifiers for potentially repetitive data can avoid unnecessary communication of data and reduce overall network bandwidth consumption. | 08-23-2012 |
20120215859 | PUBLISHER-ASSISTED, BROKER-BASED CACHING IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for a publisher-assisted, broker-based cache that can be utilized to reduce a volume of data (e.g., network traffic) delivered between a publisher and broker in a publication/subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is being generated on a publisher system, the publisher system will determine if the message includes a set of data that has a potential to be repeated in subsequent messages. Once such a set of data has been identified, the set of data will be associated/marked/tagged (e.g., in the message) with a unique identifier/cache key corresponding thereto (i.e., to yield a modified message). The modified message will be sent to a broker system, which will detect/locate the unique identifier, cache the corresponding data, and send the message along to any applicable subscriber systems. When a subsequent message that is supposed to contain the cached set of data is generated, the publisher system will instead substitute the unique identifier for the set of data to yield an abbreviated message and send the abbreviated message to the broker system. Upon receipt, the broker system will detect/locate the unique identifier, retrieve the corresponding set of data from the cache, replace the unique identifier with the set of data to yield a completed message, and then send the completed message to the applicable subscriber systems. | 08-23-2012 |
20120221649 | PEER-TO-PEER COLLABORATION OF PUBLISHERS IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for an enhanced pub/sub environment whereby a peer group of publishers is defined and can collaborate to determine when to cache data being sent to a common broker or brokers. Specifically, in a typical embodiment, configuration data or the like will be read to define a peer group among the publisher systems in the pub/sub messaging environment. Once such a group has been identified, communication therebetween will be established. Once cacheable data has been identified, a unique identifier/set of cache keys will be generated corresponding thereto and associated with the set of data. A message comprising the set of data and corresponding unique identifier will then be sent to a broker system (e.g., from the publisher system(s)), which will store (or have stored) the set of data in a cache, and pass the underlying message along to applicable subscriber system(s). | 08-30-2012 |
20120221650 | BROKER FACILITATED PEER-TO-PEER PUBLISHER COLLABORATION IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for broker facilitated, publisher peer-to-peer (P | 08-30-2012 |
20120246219 | SHARED CACHE FOR POTENTIALLY REPETITIVE MESSAGE DATA IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - In general, embodiments of the present invention provide an approach for caching potentially repetitive data in a publication-subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is received on a broker system from a publisher system, the broker system analyzes the message for potentially repetitive data. Such data can be determined from historical messages (e.g., determining that a certain set of data appeared in multiple messages and is thus flagged in a database or the like), a set of rules (e.g., if data set “Y” appears, flag it as potentially repetitive), etc. Regardless, once such a set of data has been identified, the set of data will be cached, and a unique identifier/tag corresponding thereto will be sent to the publisher system and to applicable subscribers. Thereafter, any subsequent message including the same data will contain the unique identifier in place of the cached data (i.e., an abbreviated message). The abbreviated message can be sent from the publisher system to the broker system, and then onto the subscriber system, which will retrieve the data from the shared cache and replace the unique identifier in the abbreviated message with the cached data to yield a complete message. Thus, once data has been cached, there is only a need to send an abbreviated message, which will save network bandwidth. | 09-27-2012 |
20120296515 | METHOD AND SYSTEM TO MODIFY ROUTING INFORMATION BASED ON DETECTION OF RATE OF CHANGE OF PRESSURE IN TIRES - Embodiments of the present invention relate to a method, system and program product for monitoring the rate of deflation or inflation in vehicular tires to determine the time or distance it takes before the tire pressure of one or more tires enters an undesirable state. Under the present invention, tire specifications, environmental modifiers, vehicular modifiers, road and weather conditions, and current tire pressure for each tire are recorded as input to provide an alert with a route plan for a driver to bring a vehicle to a service station before tire pressure reaches an undesirable condition. In one embodiment, the system can inform the driver at what time in the future a tire will reach an undesirable condition. In another embodiment, the system can inform the driver at what distance (measured in miles, for example) a tire will reach an undesirable condition. In yet another embodiment, the system can modify a route in order to avoid an unsafe tire condition. | 11-22-2012 |
20130031480 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - A method and system for controlling access to a resource. Visual representations of the resource and an entity are included in a display. Assignments of an access control requirement to the resource visual representation and an attribute to the entity visual representation are received. A movement in the display of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. The attribute assigned to the entity visual representation is determined to satisfy the access control requirement assigned to the resource visual representation. The entity is permitted to access the resource based on the attribute satisfying the access control requirement. A movement in the display of the entity visual representation across the boundary and a placement of the entity visual representation within the boundary of the resource visual representation are permitted based on the entity being permitted to access the resource. | 01-31-2013 |
20130044996 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes receiving by a processor of an audio/video recording device, a request for recording broadcast audio/video data. The processor analyzes audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 02-21-2013 |
20130067413 | Control of Information Technology Resource Behavior Using Visual Positioning - An embodiment of the invention provides a method for controlling computing resources using visual positioning on a graphical user interface. More specifically, a computer resource is displayed as a symbol and applications are displayed as objects on the graphical user interface. Input is received from a user, wherein the input includes movement of the symbol and/or movement of at least one of the objects on the graphical user interface. The computer resource is allocated with a processor based on the input. This includes allocating more of the computer resource to a first application and less of the computer resource to a second application when the distance between the symbol and a first object representing the first application is reduced, and when the distance between the symbol and a second object representing the second application is increased. | 03-14-2013 |
20130103219 | PROTECTING ELECTRONIC DEVICES FROM ELECTRICAL SUPPLY DISTURBANCES - Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source. | 04-25-2013 |
20130117182 | MEDIA FILE ABBREVIATION RETRIEVAL - A server receives a sound file corresponding to a sound corresponding to a media file. The server compares the sound file to a library of media file sound recordings to identify a media file and a matching position in the media file of a final sound in the sound file. The server determines, from a data structure of media abbreviations, a media abbreviation that corresponds to a final sound data present in the sound file. The server transmits the media abbreviation to the addressable device. | 05-09-2013 |
20130117248 | ADAPTIVE MEDIA FILE REWIND - An addressable device receives a user-characterized rewind description. The addressable device stores the user-characterized rewind description. The addressable device renders an at least one media file to include a resume point of the at least one media file. The addressable device receives a command to preferentially rewind. The addressable device, responsive to receiving the command to preferentially rewind, re-renders the at least one media file to the user-characterized rewind description such that the display shows the at least one media file at a replay point of the media file at least the user-characterized rewind description prior to the resume point. | 05-09-2013 |
20130129322 | OPTIMIZING VIDEO RECORDER POWER USAGE - A method, program product and system are provided for controlling the amount of power consumed by DVR devices in recording and playing broadcast video events. In an exemplary embodiment, upcoming recording requests are compared against a schedule guide for both local and networked DVRs. The system enables a user to make a selection to delay a scheduled recording up to a selected time in the future. The system then reschedules recordings to optimally overlap other scheduled recording to enable optimal usage of DVR tuners for a given period of time based upon the number of tuners in a DVR. In another separate embodiment or in combination with tuner optimization, recording events are rescheduled, within an authorized delay period, to a time when power rates are lower. | 05-23-2013 |
20130132738 | Externally Powered System Access - A method, programmed medium and system are provided for an enhanced interface connection for a primary electronic device such that system storage devices (e.g. hard drives, solid state drives, flash drives, etc.) within the primary device may be made available to other nearby devices in the event of a power supply failure or battery failure or to preserve-battery power in the primary system whereby the data on a storage device within a primary system becomes accessible by external devices, without necessitating the removal of the storage medium or full powering-up of the primary system. | 05-23-2013 |
20130133009 | OPTIMIZING VIDEO RECORDER POWER USAGE FOR DVR NETWORK - A method, program product and system are provided for optimizing recording requests to minimize electricity usage for a network of DVRs. The disclosed methodology analyzes upcoming recording requests against a schedule guide including both local and networked DVRs. Overlaps in requested recordings and broadcasts during same or close proximity time slots are identified. Requested recordings are then rescheduled to optimally overlap recording times based upon the number of tuners in each DVR system. Changes in recording schedules are then communicated to other interconnected DVRs in a network. | 05-23-2013 |
20130174002 | Database Field Extraction for Contextual Collaboration - In a method for automated hyperlinking, a computer receives user input specifying a set of character sequence columns in a table to use for character sequence comparison. The computer detects whether a character sequence entered into an electronic communication in a user interface on a display matches one or more character sequences in fields of the set of character sequence columns. Responsive to the character sequence matching a single character sequence of the one or more character sequences in the fields of the set of character sequence columns, the computer retrieves, from an associated link field in the table, a hyperlink associated with the single character sequence. The computer inserts the hyperlink into the electronic communication. | 07-04-2013 |
20130184931 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 07-18-2013 |
20130185361 | TRANSMITTAL OF BLOCKED MESSAGE NOTIFICATION - A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system. | 07-18-2013 |
20130208187 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - A secondary media stream is displayed within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to display the primary media stream to accommodate a size of the inset definition selected. The primary media stream is displayed to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the displayed primary media stream for user viewing. | 08-15-2013 |
20130219272 | MONITORING AND GUIDING USER INPUT AMONG MULTIPLE COMPUTER PROGRAM USER INTERFACES - An example method includes a device recording a user input as a recorded user input associated with a first computer program user interface, and providing a display output comprising a first display output for the first computer program user interface and a second display output for a second computer program user interface. The device receives a current user input via a user input device while the second user interface is currently configured to receive user inputs, and while the first user interface is not currently configured to receive user inputs. The device determines that the current user input matches the recorded user input, and in response, the device prevents the current user input from being received by the second computer program user interface and provides the current user input to the first computer program user interface. | 08-22-2013 |
20130229358 | TIME-BASED CONTEXTUALIZING OF MULTIPLE PAGES FOR ELECTRONIC BOOK READER - A system and associated method for contextualizing a page turn in an electronic book pursuant to a snap gesture made by a user on a touch screen of a tablet device, as performed by an e-reader program running in the tablet device. The snap gesture is quantified with data elements including linger time and direction of the snap gesture. The quantified snap gesture is utilized in identifying a target page number to display on the touch screen responsive to at least one predefined data element of the quantified snap gesture such that the user is enabled to turn multiple pages of the electronic book by the snap gesture as turning multiple pages of a paper book. | 09-05-2013 |
20130253809 | COLLABORATIVE NEAR-MISS ACCIDENT REPORTING - Illustrative embodiments include a method, system, and computer program product for collaborative near-miss accident reporting. A computer receives, from a source among several sources, data relating to a near-miss accident. The computer determines whether the data relating to the near-miss accident is indicative of an event whose information should be distributed. The computer distributes, responsive to the determining being affirmative, near-miss accident information corresponding to the data relating to the near-miss accident. | 09-26-2013 |
20130254700 | FORCE-BASED CONTEXTUALIZING OF MULTIPLE PAGES FOR ELECTRONIC BOOK READER - A system and associated method for contextualizing a page turn in an electronic book pursuant to a maximum amount of force applied by a user in a snap gesture triggering the page turn as performed by an e-reader program running in a tablet device having a strain gauge touch screen. The snap gesture is quantified with data elements including applied pressure and direction of the snap gesture. The quantified snap gesture is utilized in identifying a target page number to display on the strain gauge touch screen responsive to at least one predefined data element of the quantified snap gesture such that the e-reader program enables the user to turn multiple pages of the electronic book by the snap gesture in a manner similar to turning multiple pages of a paper book. | 09-26-2013 |
20130262305 | AUTHENTICATION FOR TRANSACTIONS USING NEAR FIELD COMMUNICATION - In a method for authenticating a current user of a near field communication (NFC) device, a profile for an authorized user of the NFC device is established based on data received from one or more sensors of the NFC device over a first period of time. Responsive to a request for a payment transaction, a profile for the current user of the NFC device is established based on data received from the one or more sensors over a second period of time after the first period of time. The profile for the current user is compared with the profile for the authorized user. A determination is made as to whether one or more values in the profile for the current user are within a range of one or more values in the profile for the authorized user at a confidence level. | 10-03-2013 |
20130275533 | PEER-TO-PEER COLLABORATION OF PUBLISHERS IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for an enhanced pub/sub environment whereby a peer group of publishers is defined and can collaborate to determine when to cache data being sent to a common broker or brokers. Specifically, in a typical embodiment, configuration data or the like will be read to define a peer group among the publisher systems in the pub/sub messaging environment. Once such a group has been identified, communication therebetween will be established. Once cacheable data has been identified, a unique identifier/set of cache keys will be generated corresponding thereto and associated with the set of data. A message comprising the set of data and corresponding unique identifier will then be sent to a broker system (e.g., from the publisher system(s)), which will store (or have stored) the set of data in a cache, and pass the underlying message along to applicable subscriber system(s). | 10-17-2013 |
20130289823 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 10-31-2013 |
20130305134 | ENHANCED SCREEN CAPTURE FOR FORM MANIPULATION - Processing a form in an image is provided. A plurality of data fields is detected within the form in the image. One or more of the data fields that contain private data and a plurality of the data fields that do not contain private data are detected. Contents of the plurality of data fields that do not contain private data are stored as metadata for the image and contents of the one or more data fields that contain private data are not stored as metadata for the image. | 11-14-2013 |
20130332561 | Control of Collaboration Workspaces and Information Objects using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20130332564 | Control of Collaboration Workspaces and Information Objects Using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20140007130 | DETERMINING AN OPTIMAL COMPUTING ENVIRONMENT FOR RUNNING AN IMAGE | 01-02-2014 |
20140077952 | OPTIMIZATION OF LUGGAGE PLACEMENT IN STORAGE COMPARTMENTS - Aspects of the present invention disclose a system, method and computer program product for automatically assigning a location to a luggage belonging to a passenger in a passenger carrier. In an example, a computer system evaluates characteristics of the luggage. The computer system evaluates characteristics of the passenger. The computer system assigns a location associated with an RFID tag to the luggage. The computer system confirms the luggage being correctly located in the assigned location. | 03-20-2014 |
20140095332 | SENDING A COUNTER-OFFER TO USE AN ALTERNATE PAYMENT OPTION - In a method for sending a counter-offer in response to receiving an indication about a point-of-sale transaction, a computer receives from a point-of-sale program a point-of-sale transaction and an indication that the point-of-sale transaction is to be paid for utilizing a first payment option and is to be recorded using a second payment option. The computer determines that a counter-offer is appropriate. The counter-offer includes a request that the point-of-sale transaction be paid for utilizing the second payment option. The computer sends to the point-of-sale program the counter-offer. | 04-03-2014 |
20140126710 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-08-2014 |
20140128022 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 05-08-2014 |
20140129385 | BANDWIDTH MANAGEMENT - A computer identifies a plurality of available network connections, wherein at least one of the identified network connections is contractually available to the computer under terms of a monthly data plan. The computer determines, based, at least in part, on characteristics of each network connection of the plurality of network connections and anticipated bandwidth consumption of the computer, a network connection to connect to from the plurality of network connections. The computer connects to the determined network connection. The computer determines, based, at least in part, on anticipated bandwidth consumption of the computer and contractual terms of the monthly data plan, an amount of excess bandwidth available for sale. | 05-08-2014 |
20140133826 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes analyzing audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 05-15-2014 |
20140139703 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140139704 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140195068 | INTELLIGENT ROAD SIGNS - An approach is provided for providing customized information to a driver of a vehicle. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: obtain one or more parameters of a vehicle; obtain environmental conditions outside of the vehicle; and calculate a speed at which the vehicle should traverse a portion of a road. The calculating is based on the one or more parameters of the vehicle and the environmental conditions outside of the vehicle. The approach is further operable to provide the calculated speed to the vehicle. | 07-10-2014 |
20140208256 | TURNING PAGES OF AN ELECTRONIC DOCUMENT BY MEANS OF A SINGLE SNAP GESTURE - A system and associated method for contextualizing a page turn in an electronic book pursuant to a snap gesture made by a user on a touch screen of a tablet device, as performed by an e-reader program running in the tablet device. The snap gesture is quantified with data elements including linger time and direction of the snap gesture. The quantified snap gesture is utilized in identifying a target page number to display on the touch screen responsive to at least one predefined data element of the quantified snap gesture such that the user is enabled to turn multiple pages of the electronic book by the snap gesture as turning multiple pages of a paper book. | 07-24-2014 |
20140244484 | NETWORK COMPUTING ENVIRONMENT COLLECTION AND NOTIFICATION OF POINT OF SALE INFORMATION - Automated information collection and notification ancillary to the acquisition of a product or service includes determining transaction and information thresholds for application to attributes of a transaction for goods or services, a card account used to purchase an item or service pursuant to the transaction and associated with application of the thresholds. When the purchase of the item or service is accomplished, additional informational items to be retained are determined in response to an attribute of the additional informational items meeting the information threshold, an attribute of the transaction meeting the transaction threshold, and execution of the transaction via the identified card account. Authoritative source locations for retrieval of copies of the additional information, and ancillary storage devices for holding copies of or links to the additional information items, are identified. | 08-28-2014 |
20140245429 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. A movement in the display of the entity representation to a position proximate to a boundary of the resource representation is detected. An attribute assigned to the entity representation is determined to not satisfy an access control requirement assigned to the resource representation. The entity is not permitted to access the resource based on the attribute not satisfying the access control requirement. Based on the entity not being permitted to access the resource, a visual cue is presented that indicates the entity representation is prevented from moving in the display across, and being placed within, the boundary of the resource representation. | 08-28-2014 |
20140248851 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 09-04-2014 |
20140306822 | ACCESS CONTROL FOR ELECTRONIC ENTERTAINMENT SYSTEMS - Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules. | 10-16-2014 |
20140320591 | BACKGROUND REPLACEMENT FOR VIDEOCONFERENCING - A solution for managing a videoconference is provided. Multiple virtual backgrounds can be stored, and a virtual background can be selected to be used for a first participant when he/she is conducting a videoconference with a second participant. The virtual background can be selected based on one or more attributes of the first and/or second participant, one or more attributes of the videoconference, and/or the like. The virtual backgrounds can be utilized, for example, to provide a desired perception, message, and/or the like, of a business entity to individuals outside of the business entity that are interacting with its personnel via videoconferencing. The virtual background can include static image data, a live video feed, a recorded video feed, a static web page of a business entity, and a non-static web page of the business entity | 10-30-2014 |
20140376385 | MITIGATING NETWORK CONNECTION PROBLEMS USING SUPPORTING DEVICES - An approach for mitigating network connection problems when a first computing device is unable to connect to a remote resource is described. A second computing device receives a request for diagnostic testing over a second network from the first computing device. The second computing device performs diagnostic tests on a data path to a desired remote resource. The second computing device sends over the second network, results from the diagnostic tests regarding the data path connectivity to the first device that is unable to connect to desired remote resource. The results are analyzed to determine the location of network connectivity failure. | 12-25-2014 |
20150039715 | PUBLISHER-ASSISTED, BROKER-BASED CACHING IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for a publisher-assisted, broker-based cache that can be utilized to reduce a volume of data (e.g., network traffic) delivered between a publisher and broker in a publication/subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is being generated on a publisher system, the publisher system will determine if the message includes a set of data that has a potential to be repeated in subsequent messages. Once such a set of data has been identified, the set of data will be associated/marked/tagged (e.g., in the message) with a unique identifier/cache key corresponding thereto (i.e., to yield a modified message). The modified message will be sent to a broker system, which will detect/locate the unique identifier, cache the corresponding data, and send the message along to any applicable subscriber systems. When a subsequent message that is supposed to contain the cached set of data is generated, the publisher system will instead substitute the unique identifier for the set of data to yield an abbreviated message and send the abbreviated message to the broker system. Upon receipt, the broker system will detect/locate the unique identifier, retrieve the corresponding set of data from the cache, replace the unique identifier with the set of data to yield a completed message, and then send the completed message to the applicable subscriber systems. | 02-05-2015 |
20150052194 | PUBLISHER-BASED MESSAGE DATA CACHING IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for a broker-assisted, publisher side cache that can be utilized to reduce a volume of data (e.g., network traffic) delivered between a publisher and broker in a publication/subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is received on a broker system from a publisher system, the broker system analyzes the message for potentially repetitive data. Such data can be determined from historical messages (e.g., determining that a certain set of data appeared in multiple messages and is thus flagged in a database or the like), a set of rules (e.g., if data set “Y” appears, flag it as potentially repetitive), etc. Regardless, once such a set of data has been identified, a unique identifier/key corresponding thereto will be sent back to the publisher system and the set of data will be stored in a (data) cache. Upon receipt, the publisher system will cache/store the unique identifier in a (key) cache. Then, when the publisher system generates a future message that would contain the same set of data, the publisher system will substitute the unique identifier (as retrieved from the key cache) for the set of data to yield an abbreviated/truncated message. The abbreviated message would be sent to the broker system, which would: analyze the message; locate the unique identifier; retrieve the corresponding set of data from the (data) cache; replace the unique identifier with the set of data to yield a completed message; and then send the completed message to relevant subscriber system(s). | 02-19-2015 |
20150066698 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150066700 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150082059 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 03-19-2015 |