Patent application number | Description | Published |
20100301993 | PATTERN BASED SECURITY AUTHORIZATION - A method, system and computer-usable medium for authorizing access to a secure location are disclosed. Data indicative of security-related activities (e.g., badging in and/or out of a secure building) can be compiled and then mined to deduce a particular pattern of security-related activities. Access to the secure location can be then authorized, based on the particular pattern of security-related activities. | 12-02-2010 |
20100311443 | METHODS AND APPARATUS FOR ACCESSING COMPUTER NETWORK ACCESSIBLE SERVICE APPLICATIONS VIA A MOBILE TERMINAL - Methods and systems for accessing computer network accessible services, such as internet based service applications, via a mobile terminal of a mobile telecommunication system using a mediation layer between a person's mobile terminal and the IT world. The mobile terminal in response to receiving user inputs interacts with this mediation layer via text messages. The mediation layer turns around and executes the appropriate IT services on behalf of the mobile terminal user. | 12-09-2010 |
20120284267 | Item Randomization with Item Relational Dependencies - An embodiment of the invention provides a method and system for randomizing items within a storage device. A linkage module links a first linked item in the storage device to one or more second linked items in the storage device based on attributes of the items. The linking is performed without input from a user of the storage device. The second linked item has at least one attribute in common with the first linked item. A list generating module connected to the linkage module generates a list, wherein the list includes a random sequence of items. The generating of the list groups the first linked item and the second linked item(s) in the list such that there are no items between the first linked item and the second linked item(s) in the list. | 11-08-2012 |
20130173781 | ACTIVITY-BASED VIRTUAL MACHINE AVAILABILITY IN A NETWORKED COMPUTING ENVIRONMENT - An approach for activity-based virtual machine (VM) availability in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a system provided under the present approach monitors and logs network traffic and performs network packet inspections. Based on the contents of the network packets, the system may determine which applications/processes on particular VMs that are associated with the traffic. Users of this system may configure rules and thresholds. Regardless, if an availability threshold is not met as compared to a volume of network traffic, certain network traffic disablement actions can be taken. Users may also configure those conditions that will result in re-enablement of the network and/or processes that were disabled. | 07-04-2013 |
20130174168 | POLICY-BASED SCALING OF COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy. | 07-04-2013 |
20130191923 | SOFTWARE LICENSE MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated. | 07-25-2013 |
20130205027 | Automatic Cloud Provisioning Based on Related Internet News and Social Network Trends - An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold. | 08-08-2013 |
20130205218 | EVENT TRIGGERED VIEWING - In a method for viewing an event, a computer registers agents such that each agent is communicatively coupled to each other agent. Each agent is associated with a graphical user interface (GUI) session. The computer monitors a first graphical user interface (GUI) session that includes contents viewable on a display device coupled to the computer. The first agent receives, from a second agent, monitoring data associated with a second GUI session. The second GUI session includes contents hidden from view on the display device. The first agent detects an event associated with the second GUI session. In response, the computer displays, on the display device, the event within the contents of the first GUI session. | 08-08-2013 |
20130212276 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 08-15-2013 |
20130238713 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 09-12-2013 |
20130308764 | ADDING A TELECONFERENCE CALLER TO A GROUP INSTANT MESSAGING CHAT - In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat. | 11-21-2013 |
20130318520 | EARLY CONFIGURATION IN DEPLOYING AN ENTERPRISE APPLICATION - Illustrative embodiments include a method, system, and computer program product for early configuration of an application in a deployment of an enterprise application. A section is located in an enterprise application deployment file of the enterprise application. The section includes configuration information of the application. The configuration information of the application is loaded before completing loading of the enterprise application deployment file such that the application is configurable without waiting for the loading of the enterprise application deployment file to complete. Loading the enterprise application deployment file is continued without waiting for a configuring of the application using the configuration information of the application that is loaded. | 11-28-2013 |
20140081693 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein are a computer-implemented method, computer program and system to invite one or more people to a meeting. The method includes, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people, such as in one or both of a database and a social network space, in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list of located identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140082000 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein in part is a data processing system configured to invite one or more people to a meeting. The data processing system includes at least one data processor connected with at least one memory storing computer program code. Execution of the computer program code by the at least one data processor results in operations being performed that include, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list comprising identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140164446 | SHARING ELECTRONIC FILE METADATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like. | 06-12-2014 |
20140164510 | RESCHEDULING UNFINISHED MEETING AGENDA TOPICS - Rescheduling unfinished meeting agenda topics includes detecting an unfinished meeting agenda topic at a conclusion of a meeting and rescheduling with a meeting management engine the unfinished meeting agenda topic to be addressed in a later meeting. | 06-12-2014 |
20140189865 | SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level. | 07-03-2014 |
20140201345 | MANAGING USER PRIVILEGES FOR COMPUTER RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided. | 07-17-2014 |
20140245394 | TRUST-BASED COMPUTING RESOURCE AUTHORIZATION IN A NETWORKED COMPUTING ENVIRONMENT - A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources). | 08-28-2014 |
20140317263 | IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration. | 10-23-2014 |
20140325077 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 10-30-2014 |
20140330782 | REPLICATION OF CONTENT TO ONE OR MORE SERVERS - An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties. | 11-06-2014 |
20140330975 | ENHANCED COMMAND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource. | 11-06-2014 |
20140359110 | AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted. | 12-04-2014 |
20150040217 | DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT - An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM. | 02-05-2015 |
20150074211 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING PREVIOUSLY IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 03-12-2015 |