Patent application number | Description | Published |
20140019458 | AUTOMATICALLY GENERATING A LOG PARSER GIVEN A SAMPLE LOG - An approach is presented for generating a log parser. A tokenized log comprising elements is generated by delimiting a sample log based on a token. Matches between elements and attributes of fields of the sample log are determined. Positions of the matched elements are determined. Based on the matches, a ranking of the token is determined, which indicates a first likelihood that the token is a delimiter that delimits parts of the sample log. Another ranking of another token is determined, which indicates a second likelihood that the other token is the delimiter. A parser is generated based on the positions, the matches and the token. Based on the first likelihood exceeding the second likelihood, a result of parsing the sample log using the parser is presented without presenting another result of parsing the log using another parser based on the other token. | 01-16-2014 |
20140059641 | AUTOMATED FEEDBACK FOR PROPOSED SECURITY RULES - A computer receives entry of a proposed security rule during a security rule entry or editing session and determines that the proposed security rule requires review of a type of security data. The number of matches of the proposed security rule to the logged security data is determined and a user is notified as to the number of matches. The computer searches the security data and applies the proposed security rule to the security data to determine the predicted performance of the proposed security rule. The computer generates a report that may include warnings, recommendations, and information correlated to the security data. The report is presented to a user during the rule editing session, and based on the report a modification to the proposed security rule can be made. | 02-27-2014 |
20140247218 | MODIFYING KEY SIZE ON A TOUCH SCREEN BASED ON FINGERTIP LOCATION - An approach for modifying a size of a key on a keyboard displayed on a touch screen is presented. A fingertip of a user is determined to be aligned with the key or touch screen, and in response, the size of the key is enlarged by a first enlargement amount. Responsive to the fingertip moving closer to the key, a second, closer proximity of the fingertip to the key or touch screen is determined. The size of the key is further enlarged by a second enlargement amount to assist the user in touching the key and avoiding touching another, adjacent key on the keyboard. | 09-04-2014 |
20150089593 | METHOD AND SYSTEM FOR USING A VIBRATION SIGNATURE AS AN AUTHENTICATION KEY - A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network. | 03-26-2015 |
20150098308 | METHOD AND SYSTEM USING VIBRATION SIGNATURES FOR PAIRING MASTER AND SLAVE COMPUTING DEVICES - A method and a system of using vibration signatures for pairing two devices. The method and the system include an apparatus that has a master side and a slave side. The slave side has at least one frictional structure. A first device is inserted into the master side. When a second device is inserted through the slave side, a pattern of vibration is generated. Vibration detecting devices on the first and second devices detect the pattern of vibration. A program of the first device validates a master vibration signature and configures the first device as a master device. A program of the second device validates a slave vibration signature and configures the second device as a slave device. The master device and the slave device are automatically paired. | 04-09-2015 |
20150106790 | DETECTING MERGE CONFLICTS AND COMPILATION ERRORS IN A COLLABORATIVE INTEGRATED DEVELOPMENT ENVIRONMENT - A method, system, and computer program product for detecting merge conflicts and compilation errors in a collaborative integrated development environment are provided in the illustrative embodiments. Prior to at least one user committing a set of uncommitted changes associated with a source code to a repository, the computer receives the set of uncommitted changes associated with the source code. The computer creates at least one temporary branch corresponding to the set of uncommitted changes associated with the source code. The computer device merges the at least one temporary branch to corresponding portions of the source code. The computer determines whether a merge conflict has occurred. If the merge conflict occurred, the computer communicates a first notification to the at least one user, the first notification indicating the merge conflict. | 04-16-2015 |
20150270983 | UTILIZING EYE TRACKING TO DETERMINE ATTENDEE ENGAGEMENT - Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s). | 09-24-2015 |
20150271199 | Generating Accurate Preemptive Security Device Policy Tuning Recommendations - An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined. | 09-24-2015 |