Patent application number | Description | Published |
20080229253 | Method, System and Computer Program for Navigating UML Diagrams - A solution for navigating UML diagrams ( | 09-18-2008 |
20080229303 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DISTRIBUTING CUSTOMIZED SOFTWARE PRODUCTS - A solution for distributing software products in a data processing system is disclosed. A set of models of each software product is to be distributed (for example, of the UML type) is provided; each model includes an indication of relationships among a plurality of available logical items (representing functions provided by the software product, such as use cases) and a plurality of available distribution artifacts (used to distribute the software product). A set of logical items is then selected among the available ones. The process continues by identifying a set of distribution artifacts required to implement the selected logical items (among the available distribution artifacts); the required distribution artifacts are identified according to the corresponding relationships in the models. A software package is built including the required distribution artifacts. The software package is then distributed to a set of data processing entities of the system (i.e., endpoints), so as to cause each entity to install the required distribution artifacts on the entity. | 09-18-2008 |
20080235225 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DISCOVERING INVENTORY INFORMATION WITH DYNAMIC SELECTION OF AVAILABLE PROVIDERS - A solution ( | 09-25-2008 |
20080244532 | Testing System, and a Method and Computer Program For Testing A System Management Program - A testing system for a reverse client-server system management program comprises a server connected to one or more recipient devices and emulating devices through one or more repeaters. The recipient devices act as targets for the management program and the emulating devices emulate one or more of the recipient devices, to enable an assessment of the scalability of the management program to a large number of targets. The repeaters direct management requests from the server to the target devices depending on the configuration of the hook and/or the nature of the operation requested by the management request. The recipient devices and emulating devices execute the required system management operation on receipt of a management request from the server (via the repeaters). The recipient devices and emulating devices generate and transmit a report detailing the outcome of the system management operation. | 10-02-2008 |
20080250038 | METHOD AND SYSTEM FOR POPULATING A SOFTWARE CATALOGUE WITH RELATED PRODUCT INFORMATION - A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products. | 10-09-2008 |
20080250473 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR CONFIGURING FIREWALLS - A solution (A1-A16) is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system includes a set of security applications (such as firewalls), which are adapted to control communications of the entities. A corresponding method starts with the step of determining a target configuration of the security applications for allowing execution of the software product on the entities. A software package (or more), being adapted to enforce the software product and the target configuration, is then built (A11). The method continues by distributing (A12-A16) the software package in the system, so as to cause the application of the software package for enforcing the software product on each entity and the target configuration of each security application. | 10-09-2008 |
20080313599 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DEVELOPING SOFTWARE APPLICATIONS WITH INCREASED MODULARITY - A solution is proposed for developing software applications on a data processing system. A corresponding method (A | 12-18-2008 |
20090013084 | METHOD AND APPARATUS FOR CONTROLLING MULTIPLE SYSTEMS IN A LOW BANDWIDTH ENVIRONMENT - A method of controlling one or more client systems by means of one or more server systems, comprising the steps of identifying a set of system control actions that occur as a result of carrying out a particular function on the server system, which function is required to be replicated on the one or more client systems; and sending the set of system control actions to any client system which is connected to the server system to configure the client system to carry out the system control actions and thereby causing the client system to carry out the particular function on the client system. | 01-08-2009 |
20090094297 | ARCHIVING TOOL FOR MANAGING ELECTRONIC DATA - A method for storing electronic data in a network including a server and at least two client machines. Electronic data may be archived in a predetermined location of a client machine. A local archiving list may be generated on the client machine and may include descriptive properties of the electronic data, as well as the predetermined location. The local archiving list may be transmitted from the client machine to the server to generate a global archiving list, which may then be transmitted to any other client machines in communication with the server. In this manner, each client machine in the network may store the location and descriptive properties of the archived electronic data to facilitate electronic data recovery. | 04-09-2009 |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20090150333 | IN-CONTEXT COLLABORATION TOOL FOR RESOURCE MANAGEMENT SYSTEMS - A method for managing resources in a resource management system in accordance with certain embodiments may include providing a retrieval statement for retrieving management information relating to a set of selected resources. The management information may be retrieved according to the retrieval statement. Context information relating to one or more resources of the set may be retrieved according to the corresponding management information. One or more requests for additional information relating to the resource may be generated according to the context information. The requests for additional information may then be submitted to an information source. | 06-11-2009 |
20090150881 | Building and Installing Dynamic Installation Packages Using a Declarative Authoring Tool - Building a package for installing a software application on a data processing system with a distributed architecture is provided. The installation package is built using an authoring tool based on a declarative model. A descriptor is used to define a desired configuration of the system The installation package is built declaring a discoverer element, a producer element and a consumer element into the wizard tree. During the installation process, the discoverer element detects a current configuration of the system. The producer creates a working queue dynamically, inserting the installation operations that are needed for reaching the desired configuration from the current configuration of the system. The producer then executes the installation operations defined in the working queue. In this way, the installation operations are determined at runtime. | 06-11-2009 |
20090158187 | COMPLEX OPERATION EXECUTION TOOL - A method is presented for executing complex operations. The method may include providing basic packages that include execution instructions for at least partially executing a complex operation. Each basic package may also include combination instructions for combining the execution instructions with execution instructions of another basic package. Several basic packages may be selected. The complex operation may then be executed according to the execution instructions and the combination instructions associated with the selected basic packages. | 06-18-2009 |
20090158266 | DEPLOYMENT TOOL FOR INCREASING EFFICIENCY IN A PRODUCTION COMPUTER SYSTEM - A method is presented for deploying a component onto a production computer system. The method may include identifying one or more alterations associated with deployment of a first application onto a first computer system, where the first application on the first computer system is substantially similar to a second application on a second computer system. Embodiments may further include generating a command and an object corresponding to the alteration, where the command and the object are generated as a function of the first application. The alteration may then be replicated on the second application of the second computer system by executing the command and the object on the second computer system. | 06-18-2009 |
20090158268 | Software Distribution Method and System - A software distribution method ( | 06-18-2009 |
20090158438 | SOFTWARE LICENSE RECONCILIATION FACILITY - A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions. | 06-18-2009 |
20090160621 | MULTIMEDIA ARTICLE MANAGEMENT FACILITY - A method is presented for managing user preferences upon reading a multimedia article. The method may include receiving a request to read the multimedia article, and reading a RFID tag coupled to the multimedia article. The RFID tag may store user preference information for reading the multimedia article. The user preference information may then be applied, and the multimedia article may be read in accordance with the user preference information. | 06-25-2009 |
20090160675 | Method and System for Monitoring Road Surface Conditions - Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage. | 06-25-2009 |
20090164201 | Method, System and Computer Program For The Centralized System Management On EndPoints Of A Distributed Data Processing System - A method is described for performing system management operations on at least one target endpoint data processing apparatus ( | 06-25-2009 |
20090191849 | ENHANCED MESSAGING COLLABORATION - The capabilities of a collaboration messaging system are extended through so that a user can be contacted, or at least notified of incoming messages, when the user is away from his own messaging client computer but is near another messaging client computer. The proximity of a user to a messaging client computer other than his own is inferred from the detection of a wireless communications device (e.g., a Bluetooth-enabled cellular phone) associated to the user. The association is recorded in a user profile set up by the user and stored in the collaboration messaging system. If a wireless communications device is detected proximate to a messaging client computer, a search is made of stored user profiles, each of which associates a particular wireless communication with a particular user. If a profile exists for the detected wireless communication device, it is retrieved and a set of actions defined in the user profile is implemented. The defined actions include sending messages addressed to the users own messaging client computer to the proximate messaging client computer, sending notices of the messages to the proximate client computer and sending a notice to the sender of the message that the user is near a particular client messaging computer. | 07-30-2009 |
20090265381 | ALLERGY PREVENTION METHOD AND SYSTEM - An allergy prevention method and system. The method includes retrieving, by a computing system from a fidelity card, a user profile comprising information specifying first elements known to cause a user to have an allergic reaction. The computing system retrieves data associated with an item for purchase. The data comprises information specifying second elements comprised by the item. The computing system compares the first elements to the second elements to determine that a first element of the first elements matches a second element of the second elements. The computing system generates and presents to the user, a warning indicating that the first item may cause the user to have an allergic reaction. | 10-22-2009 |
20090268887 | SYSTEM AND METHOD TO HANDLE PHONE LINE SERVICES DURING MODEM DIAL-UP CONNECTION - A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party. A reporting notification message is further transmitted by the telecommunications network to the calling party to let the calling party know that the called party has been notified of the incoming call. | 10-29-2009 |
20090276856 | LICENSE MANAGEMENT FACILITY - A method is presented for managing resource licensing. The method may include detecting an installed web server and/or application server to identify a container installation path, and identifying a resource associated with the container installation path. A resource installation path and a licensing structure may be determined for the resource. The method may further include building an application representation associating the resource installation path with the licensing structure, and determining the instances of resource use. The instances of resource use may be compared to the application representation to determine a licensing state for the resource. | 11-05-2009 |
20090287778 | METHOD AND APPARATUS FOR CONTEXT-SENSITIVE EXCHANGE OF ELECTRONIC INFORMATION - A method and apparatus for context-sensitive exchange of electronic information, is provided. One implementation involves maintaining multiple signatures for a sender; associating each signature with a recipient address or communication content pattern described based on a rule; sending an electronic communication to a recipient address by automatically selecting a most appropriate signature among the multiple signatures based on the recipient address or content pattern in the communication; and including the selected signature in the electronic communication. | 11-19-2009 |
20090288083 | Method and System for Dynamic Virtual Environment Migration - An incompatibility problem during a virtual environment migration from a first host to a second host can be addressed by changing a configuration of the virtual environment and/or by migrating the virtual environment to a host other than the second host. A migration advisor module is configured to take such action automatically upon detection of the incompatibility problem. Alternatively, the migration advisor module may take such action with assistance and/or input from an operator. The migration advisor module can change the configuration of the virtual environment by removing unnecessary components of the virtual environment and causing the reconfigured virtual environment to be migrated to the second host. Alternatively, the migration advisor module can cause the virtual environment to be migrated to a third host with sufficient physical system resources to meet the requirements of the virtual environment. | 11-19-2009 |
20090319317 | Or Relating To A Method and System for Testing - A method of evaluating a cost associated with a test scenario, which test scenario comprises one or more branches making up a use case, the method comprising the steps of: determining a first parameter based on the complexity of the use case; determining a second parameter which indicates the criticality of the use case; determining a third parameter which indicates an execution cost of each action and decision point of the use case; determining a fourth parameter which indicates the priority of each branch of the use case; determining a fifth parameter which indicates the classification of each test parameter for each branch of the use case; determining a cost associated with the test scenario, based on a predetermined calculation using two or more of the first, second, third, fourth and fifth parameters. | 12-24-2009 |
20090326971 | METHOD FOR MANAGING PACKAGE DELIVERY - A method for managing package delivery may include receiving a plurality of packages. Each package may include a bar code or RFID tag associating the package with personal profile information. A delivery route plan may be generated based on the personal profile information. The estimated delivery time may be transmitted to the recipient in advance of the delivery. An electronic reply communication including a location of the recipient may be received from a notified recipient either confirming the delivery or proposing an alternate delivery time or location. The delivery route plan may be recalculated based on the retrieved personal profile information, the alternate delivery time or location if proposed by the recipient, and/or the current location of the recipient to identify alternate delivery time and location options. A confirmation selecting one of the alternate delivery time and location options or reconfirming the delivery may be received from the recipient. | 12-31-2009 |
20100017482 | METHOD AND SYSTEM FOR LOCATION AWARE ELECTRONIC COMMUNICATION - A method and system for location aware electronic communication. One implementation involves receiving an electronic communication at a receiving client, upon detecting that the communication includes location-based information, retrieving criteria for processing the communication from a location profile, and automatically processing the communication utilizing the retrieved criteria and the location-based information from the communication. | 01-21-2010 |
20100017512 | Method and System For Improvements In or Relating to Off-Line Virtual Environments - The compliance of a virtual machine image to a set of requirements is determined during a process to potentially introduce the virtual machine image into a network. One or more virtual machine images are identified. During compliance testing, the identified virtual machine image is controlled such that it cannot connect to the network. One or more tests are carried out to determine if the virtual machine image is compliant with one or more predetermined requirements. If a virtual machine is compliant with said one or more predetermined requirements, the virtual machine image is connected to the network. | 01-21-2010 |
20100017874 | METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION - A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. | 01-21-2010 |
20100020092 | METHOD AND SYSTEM FOR DISPLAY MONITOR ELECTRIC POWER CONSUMPTION OPTIMIZATION - A method and system for controlling electrical power consumption of a display monitor screen, is provided. One implementation involves grouping screen pixels into different resolution cells, detecting display of one or more windows on the screen, and selectively controlling the cells by providing power only to the pixels in cells corresponding to one or more windows of interest to the user, and reducing power to pixels in remaining cells. | 01-28-2010 |
20100023521 | SYSTEM AND METHOD FOR MANAGING LOCKS ACROSS DISTRIBUTED COMPUTING NODES - A method and system for managing locks for one or more resources in a distributed system including multiple distributed computing nodes, is provided. One implementation involves maintaining a database as a shared storage accessible by plural participating nodes for storing shared lock information, each participating node locally managing a local list of locks, the participating nodes cooperating in providing decentralized lock management across the nodes using the local and shared lock information, to achieve granting and releasing of locks for synchronizing access to one or more resources. | 01-28-2010 |
20100043011 | METHOD FOR TRACKING LOCAL STORAGE OF WEB PAGES - The present disclosure is directed to a method for tracking client side storage of a web page. The method may comprise providing a script in the web page for responding to a save operation; responding to the save operation initiated in a browser; sending a set of tracking information to a HTTP server providing the web page and/or a particular resource to be stored; forwarding the set of tracking information to an application server; and storing the set of tracking information. | 02-18-2010 |
20100049559 | METHOD AND SYSTEM FOR FOCUSED AND SCALABLE EVENT ENRICHMENT FOR COMPLEX IMS SERVICE MODELS - A system and method for focused and scalable event enrichment for information management system service models in which a monitoring agent monitors one or more IT components running on one or more end-points. When an event probe is installed, a local metadata cache is primed with metadata stored on a metadata server. After a monitoring agent receives an event from an end-point, the event is enriched with metadata stored in the local metadata cache. The enriched event is then uploaded to an event monitoring server. A business service manager server uses the enriched events stored on the event monitoring server to manage the service model and to quickly determine service status based on service impacting events. | 02-25-2010 |
20100049959 | METHOD AND SYSTEM FOR CONFIGURATION OF COMPONENTIZED SOFTWARE APPLICATIONS - A method and system for centrally managing configuration of software application components, is provided. One implementation involves creating configuration metadata for each component of the application; providing a specific configuration for a component; checking validity of the specific configuration using the metadata for said component; and monitoring the application component configuration for consistency with said specific configuration. | 02-25-2010 |
20100171993 | Document Information Acquisition and Notification of Duplicate Document Storage - Mechanisms for document information acquisition and notification of duplicate document storage are provided. The mechanisms convert a physical hard copy document to an electronic form of the document and generates a first digital fingerprint of the electronic form of the document. The mechanisms further retrieve one or more second digital fingerprints for previously stored electronic forms of documents. The first digital fingerprint is compared to the one or more second digital fingerprints. Storage of the electronic form of the document is controlled based on results of comparing the first digital fingerprint to the one or more second digital fingerprints. | 07-08-2010 |
20100172266 | DYNAMIC NETWORK CONFIGURATION FOR A NETWORK DEVICE - A network services profile can be associated with a unique device identifier, such as a MAC address, rather than an IP address. When a network device is connected to a network, a network management server can recognize the unique device identifier and retrieve the network services profile. The network management server can automatically enables network services indicated in the network services profile. | 07-08-2010 |
20100174759 | Personal Resources Organizer with Calendar Interface and Object Detection - A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects. | 07-08-2010 |
20100174760 | Tracking Multi-Session Meeting Statuses - A mechanism for tracking statuses for multi-session meetings is provided. A list of meetings is received for the multi-session meetings from a moderator of the multi-session meetings. The list of meetings is loaded onto a shared storage device that is accessible by a plurality of participants. Responsive to the status of one meeting in the list of meetings changing, the change to the one meeting in the list of meetings is updated on the shared storage device. Responsive to the change to the one meeting in the list of meetings requiring a change in status to one or more other meetings in the list of meetings, the status of the one or more other meetings is changed. | 07-08-2010 |
20100174761 | Reducing Email Size by Using a Local Archive of Email Components - A mechanism for reducing electronic mail (email) sizes by using a local archive of email components is provided. The mechanism receives the email file, the email file specifying a sender identifier of a sender of the email file, a recipient identifier of a recipient of the email file, and common component information for a common component included in the email file, the common component being a component of the email file that is common amongst a plurality of email files sent from the sender. The mechanism identifies the common component of the email file and determines whether to remove the common component from the email file before forwarding the email file to the recipient based on at least the sender identifier. Based on the determination, the common component is either removed or kept in the email file that is subsequently transmitted to the recipient computer. | 07-08-2010 |
20100174816 | On-Demand Network Connection - An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection. | 07-08-2010 |
20100174999 | INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION - A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee. | 07-08-2010 |
20100175063 | Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script. | 07-08-2010 |
20100192224 | SANDBOX WEB NAVIGATION - Browsing the World Wide Web may expose a user's system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system. | 07-29-2010 |
20100235520 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - Communication device capabilities may change during an established multimedia session due to connection of a peripheral device. For example, a user listens to an Internet radio service on a mobile phone through a set of headphones. Later, the user connects the mobile phone to stereo system in a car. The mobile phone can leverage the car's stereo system to present higher quality audio than it could present with the headphones. Functionality can be implemented in a communication device to detect connection of a peripheral device and determine multimedia capabilities of the peripheral device. The communication device updates its presence information to indicate the multimedia capabilities of the peripheral device. In response, a multimedia server determines multimedia capabilities indicated in the presence information have changed and optimizes delivery of multimedia content based on the updated multimedia capabilities. | 09-16-2010 |
20110046879 | Method and System for Presenting Information Associated With a Location - An enhanced navigation system in which present location is compared to a database of points of interest. Data for each point of interest include a reference to a source of dynamic information reflecting the real time status of the point of interest. Such a reference may comprise, for example, an Internet link. Real time status information will vary depending on the nature of the point of interest, and may include information such as whether the point is open or closed, queue lengths, waiting times, etc. The real time status information is retrieved from the source and presented to the user. | 02-24-2011 |
20110119388 | Optimization of Multimedia Service Over an IMS Network - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 05-19-2011 |
20110126187 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DISTRIBUTING SOFTWARE PATCHES - A software patch management solution ( | 05-26-2011 |
20120042195 | MANAGING OPERATING SYSTEM DEPLOYMENT FAILURE - A method for managing operating system deployment failure includes, with an operating system deployment server, running an operating system deployment process that comprises running a progressive hardware discovery process of a target machine to which an operating system is deployed, the discovery process to capture inventory information related to the target machine, monitoring the operating system deployment to detect failure in a pre-operating system environment running on the target machine for a predefined period of time, and executing a remediation action in response to generation of a failure code during the period of time, the remediation action related to a Basic Input Output System (BIOS) of the target machine. | 02-16-2012 |
20120143988 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 06-07-2012 |
20120150986 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120151067 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120174101 | Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script. | 07-05-2012 |
20120185862 | Managing Scheduling of Processes - A mechanism dynamically modifies the base-priority of a spawned set of processes according to their actual resource utilization (CPU or I/O wait time) and to a priority class assigned to them during their startup. In this way it is possible to maximize the CPU and I/O resource usage without at the same time degrading the interactive experience of the users currently logged on the system. | 07-19-2012 |
20120191812 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120191821 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120209868 | Personal Resources Organizer with Calendar Interface and Object Detection - A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects. | 08-16-2012 |
20120317546 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. | 12-13-2012 |
20120317563 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on results of the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. The comparative CRC value may be stored in a repository; and the step of comparing looks up the stored CRC value in the repository. | 12-13-2012 |
20130007265 | MONITORING RESOURCES IN A CLOUD-COMPUTING ENVIRONMENT - Provided are a computer program product, system, and method for monitoring resources in a cloud computing environment. A set of cloud resources is provisioned to a user of the cloud-computing environment. A set of private resources is provided for the user, each private resource being provisioned within the set of cloud resources of the user. Monitoring templates are exposed, each one for a corresponding type of a private resource to the user. A user subscription is received to at least one of the monitoring templates, wherein each of the subscribed monitoring templates is for one of the user private resources. A private monitoring agent is provided within the cloud resources of the user housing the private resource of the user to monitor the private resource according to the corresponding selected monitoring template. | 01-03-2013 |
20130007727 | REACTIVATION OF A SOFTWARE IMAGE FROM A SOURCE MACHINE ONTO A TARGET MACHINE - Provided are a computer program product, system and method for reactivation of a software image from a source machine onto a target machine. Discovery is made of a static software application in the software image listening on a corresponding selected communication channel of the source address. Listening is performed on behalf of the static software application on the corresponding selected communication channel of the target address. An inbound message directed to the selected communication channel of the target address is redirected to the corresponding static software application on the selected communication channel of the source address. | 01-03-2013 |
20130018951 | SCHEDULING A MEETING IN REAL TIMEAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A method, data processing system, and computer program product for sending a notification of a meeting. An identification is made when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance. Whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting is determined in response to the identification that the number of users in the plurality of users is within the threshold distance. The notification of the meeting is sent to the number of the users in response to determining that the number of users is greater than or equal to the threshold number. | 01-17-2013 |
20130019313 | GRANULAR VIRUS DETECTIONAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A group of files for an application installed on a computer system is identified in response to a request to scan the application for malware. The group of files for the application is scanned for the malware. A result is obtained. An action is performed based on the result. | 01-17-2013 |
20130040602 | Managing Cellular Phone Calls - A mechanism is disclosed for managing phone calls on phone devices used by the employee of a company. When the user wants to give a call, a new plugin in the phone device interprets an attribute value added by the phone device user to each phone number in order to categorize the call. The cell phone user enters a profile describing his call accounting information. A call management plugin computes a prefix for user personal calls which will be adapted to the user location. The call management plugin at the end of the call tags the call information as a personal call or business call. The phone device sends the tagged call information to a remote server of the company, which consolidates billing information received from the phone operators with the tagged call information. | 02-14-2013 |
20130074068 | Method, System, and Computer Program for Implementing a Customizable Virtual Appliance - A method for managing a virtual image in a cloud environment by implementing a customizable virtual image deployment may be provided. The method may comprise generating a virtual image and a set of configuration parameters related to specific parts of the virtual image, and assigning a set of values to the configuration parameters. Furthermore, the method may comprise deploying the virtual image using the set of values assigned to the parameters, such that parts of the virtual image may be deployed as a customized virtual image depending on the set of values of the parameters. | 03-21-2013 |
20130103800 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 04-25-2013 |
20130124658 | INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION - A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee. | 05-16-2013 |
20130151834 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20130151835 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20130152084 | Controlling Usage of Virtual Disks Before Their Attachment to Virtual Machines - Controlling usage of virtual disks in a data-processing center hosting a set of virtual machines is described where each virtual disk comprises a set of software artifacts. A corresponding method comprises detecting a request of adding a new virtual disk comprising a set of new software artifacts to a selected one of the virtual machines, determining composition information of the new virtual disk, which includes an indication of the new software artifacts, retrieving an indication of usage entitlements of the new software artifacts in the data-processing center, enabling or preventing the attachment of the new virtual disk to the selected virtual machine according to a comparison between the composition information and the usage entitlements, attaching the new virtual disk to the selected virtual machine in response to the enabling thereof, and updating the usage entitlements in response to the attachment of the new virtual disk. | 06-13-2013 |
20130152085 | Optimizing Storage Allocation in a Virtual Desktop Environment - Mechanisms for optimizing the storage allocation in a virtual desktop environment (VDE) managing a shared storage capacity, are provided. The shared storage capacity includes previously stored files, each being associated with a respective unique first file identifier, the VDE providing a virtual desktop to a processing device of a user. Upon reception of a first write request for writing a second file specified in the request, a second file identifier of the specified second file is determined and compared with the first file identifier of any first file stored to the shared storage capacity. A pointer to the stored first file associated with that first file identifier is created if the second file identifier is identical to one of the first file identifiers and, if not, the specified second file associated with the second file identifier is stored in the shared storage capacity. | 06-13-2013 |
20130159973 | ACTIVATION LOGIC GENERATION FOR A SOFTWARE APPLIANCE - Embodiments relate to generating an activation logic component for a software appliance. An aspect includes analyzing configuration settings of a software component, the software component being installed in a first system environment. Another aspect includes generating an image-based installation version of the software component for a second system environment, the second system environment being distinct from the first system environment. Yet another aspect includes generating an activation logic component, such that the image-based installation version of the software component and the activation logic component are generated by an activation logic generator. | 06-20-2013 |
20130232329 | Encrypting And Decrypting A Virtual Disc - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 09-05-2013 |
20130263113 | Managing Pre-Requisite of a Software Product Virtual Image - A mechanism is provided for managing pre-requisite software components of a software product distributed on a virtual machine. A list of pre-requisite software components for the software product provided in the software product virtual image distribution package of the software product virtual image is read. A test is performed as to whether each pre-requisite software component in the list of prerequisite software components is not installed in the virtual machine. If the prerequisite software component is not installed, the pre-requisite software component is retrieved. License text of the retrieved pre-requisite software component is read and displayed to a user. Upon approval of the license text by the user, the retrieved pre-requisite software component is installed. The process is repeated until all the pre-requisite software components are installed. | 10-03-2013 |
20140089393 | Near Live-Migration of Operating System and Application - A method for live-migration of an operating system and an application is provided. The operating system runs on a first computer. The application may run on the operating system. The live-migration may be performed to a second computer while the application showing no externally detectable downtime during live-migration of the application. The method may comprise operating a tracking tool that may track and store data modifications to a disk-system of the computer in a tracking file, triggering a shutdown of the first computer while the tracking tool continues to operate in tracking mode and shut down the first computer completely. Then restarting the first computer and sending the data modifications stored prior to the complete shutdown of the first computer to the second computer, which then may be started based on the sent data, followed by starting the application such that from an external perspective no application disruption is detectable. | 03-27-2014 |
20140142999 | Managing Assets - A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. | 05-22-2014 |
20140143293 | Managing Assets - A system or computer usable program product for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. | 05-22-2014 |
20140143392 | DEPLOYMENT OF SOFTWARE IMAGES WITH RUN-TIME RECONNECTION - A processor-implemented method, system, and/or computer program product deploys software images onto a computing system. A first computing machine is instantiated from a software image onto a computing system. The first computing machine has a first old access identifier, and is initially connected to a second computing machine in the computing system via a second old access identifier for the second computing machine. The second computing machine is reconfigured to have a new access identifier by: retrieving the new access identifier for said second computing machine, and associating the new access identifier with the second old access identifier; and redirecting each outbound communication, from the first old access identifier to the second old access identifier, to the new access identifier of the second computing machine. | 05-22-2014 |
20140143529 | CONFIGURATION OF COMPONENTIZED SOFTWARE APPLICATIONS - Centrally managing configuration of software application components includes creating configuration metadata for each component of the application; providing a specific configuration for a component; checking validity of the specific configuration using the metadata for said component; and monitoring the application component configuration for consistency with said specific configuration. | 05-22-2014 |
20140147052 | Detecting Broken Lamps In a Public Lighting System Via Analyzation of Satellite Images - A computer receives a first image of a plurality of lamps. The computer receives a second image of a plurality of lamps. The computer transforms the second image so a location depicted in a plurality of pixels of the first image is depicted in a corresponding plurality of pixels in the second image. The computer determines a brightness variation exists between a pixel of the plurality of pixels of the second image and a corresponding pixel of the plurality of pixels of the first image. The computer identifies a location corresponding to the pixel of the plurality of pixels of the second image where the brightness variation exists. | 05-29-2014 |
20140325514 | Maintenance of Offline Virtual Machines Based on a Maintenance Register - A solution is proposed for maintaining virtual machines being available in a data-processing system. A mechanism determines a list of software components installed on each virtual machine, retrieves a set of maintenance policies for each software component, each maintenance policy being indicative of a patch to be applied to the corresponding software component. The mechanism determines a set of old virtual machines having at least one old software component thereof requiring the application of at least a new one of the corresponding patches according to a comparison among the maintenance policies and a maintenance register indicative of a current state of the software components of the virtual machines. The mechanism applies the corresponding at least one new patch to each old software component of each old virtual machine and updates the maintenance register according to the application of said at least one new patch to each old software component of each old virtual machine. | 10-30-2014 |
20140359617 | Patching a Virtual Image - A mechanism for patching a virtual image modifies a selected dormant virtual image to be patched by injecting a corresponding patch logic and patch material to be applied on next boot during an off-line preparation phase. The mechanism downloads a boot medium and creates a temporary disk for a selected target virtual machine with corresponding deployment data The mechanism changes a master boot record of said temporary disk associated with the target virtual machine to boot next on the boot medium. The mechanism executes the patch logic to install the patch material in case the target virtual machine associated with the virtual image to be patched is booted. | 12-04-2014 |
20140380035 | ENCRYPTING AND DECRYPTING A VIRTUAL DISC - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 12-25-2014 |
20150089070 | OPTIMIZATION OF MULTIMEDIA SERVICE OVER AN IMS NETWORK - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 03-26-2015 |