Patent application number | Description | Published |
20090083378 | SYSTEM AND METHOD TO CONTROL COLLABORATION PARTICIPATION - A system and method is provided for controlling collaboration participation. The system includes a computing infrastructure configured to monitor endpoint collaboration devices and/or users. The computing infrastructure is also configured to authorize collaboration between one or more of the endpoint collaboration devices and/or users with an initiating device if the computing infrastructure finds a match between stored attributes and information related to the one or more endpoint collaboration devices and/or users. | 03-26-2009 |
20100034363 | Telephonic Repeat Method - A method, system and computer program product for assigning one or more conditions to a telephonic communication system to enable recording, replaying, and pausing of a telephone conversation. Recording of a telephone conversation may be manually or dynamically initiated during the telephone conversation. Dynamic replay of a telephone conversation is automatically initiated when a conversation experiences insufficient call quality, an interruption to the telephone service is detected, the user is distracted, a displacement of the user's phone is detected, or the user toggles between listening modes. A pause mode is automatically entered into during the telephone conversation when a section of the telephone conversation is replayed. An automated pause alert may be played during repeat of the telephone conversation to inform one or more parties that the user is temporarily unavailable. Real-time access to the telephone conversation is resumed when the replaying of the recorded telephone conversation has ended. | 02-11-2010 |
20100035583 | MANAGING WIRELESS TRANSMISSIONS UPON UNINTENTIONAL DISCONNECTION OF SERVICE - Disclosed are a method, system and computer program product for managing unintentional disconnection of a communication device. A system detects a first device to a transmission has been unintentionally disconnected from an ongoing communication with a second communication device. The connected second device is signaled regarding the disconnection. Recording of a disconnection voicemail message for the disconnected first communication device is enabled before disconnecting the second communication device. The second device may set an expiration time on the disconnection voicemail message. Upon resumption of service, the disconnected first device is informed of a new voicemail message left by the second device during the disconnection. A disconnection-specific voicemail greeting may be recorded by a user of the disconnected first device's system for use when a disconnection occurs. The disconnection-specific voicemail greeting is played to the connected second device when disconnection occurs. | 02-11-2010 |
20100035584 | Managing Voicemail Greeting Based On Location of Wireless Communication Device - Disclosed are a method, system and computer program product for managing voicemail greetings on a wireless communication device based on the device's location. A user records location-specific voicemail greetings on the user's wireless communication device, and associates the greetings with specific locations. When an authorized caller calls the user's wireless communication device, the location of the user's wireless communication device is detected, and location information of the user's device is sent to a call switching component. The call switching component presents the caller with the voicemail greeting associated with the location of the user's wireless communication device. The date and time the user's wireless communication device entered the location can be provided via a timestamp and presented to the caller along with the location-specific voicemail greeting, to enable the caller to determine when the user may be available to communicate, based on the combination of the information in the greeting and the timestamp information. | 02-11-2010 |
20100035585 | Managing Voicemail Messages Based On Location of Caller's Wireless Communication Device - Disclosed are a method, system and computer program product for processing voicemail messages to a user's wireless communication device based on a location of a caller's wireless communication device. Call answering protocols are assigned for implementation based on the location of the caller's wireless communication device at a time a call is received from the caller's device. Call answering protocol entries are received via a wireless communication device. When a call is received, a location of the caller's wireless communication device is detected. Location information regarding the caller's wireless communication device is received at a call switching component. The call is processed at the call switching component based on the call answering protocol for handling a caller's call received from the location of the caller's wireless communication device. | 02-11-2010 |
20100036604 | ROUTE NAVIGATION FOR OPTIMAL MOBILE COVERAGE - A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point. | 02-11-2010 |
20100150320 | HANDLING COMMUNICATION SESSION DISCONNECTION AND RECONNECTION - A method, system and computer program product records missed information that is communicated between one or more connected communication terminals during a disconnection period and replays the missed information when a temporarily-disconnected communication terminal reconnects to the active communication session. The method comprises: detecting disconnection of the communication terminal from the active communication session; in response to detecting the disconnection, automatically recording the missed information exchanged between the one or more connected communication terminals remaining in the active communication session; detecting reconnection of the disconnected terminal to the active communication session; and delivering the recorded information exchange to the reconnected terminal, in response to detecting the reconnection. | 06-17-2010 |
20110302430 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 12-08-2011 |
20110320828 | POWER MANAGEMENT AND PRIORITY CHARGING ASSIGNMENTS - Systems and methods are provided for managing power to devices in a network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving scheduled upcoming calendar events and/or activities from one or more of a plurality of devices connected in a network. The method further includes centrally managing power consumption of a device of the plurality of devices in the network based on the scheduled upcoming calendar events and/or activities. | 12-29-2011 |
20110320832 | MANAGING ELECTRICAL POWER IN A VIRTUAL POWER DELIVERY NETWORK - Systems and methods are provided for managing power to devices in a virtual power delivery network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving device information from one or more devices connected in a virtual power delivery network. The method further includes managing power consumption of the one or more devices in the virtual power delivery network based on the received device information. | 12-29-2011 |
20120020468 | CONFERENCE CALL MANAGEMENT METHOD AND SYSTEM - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 01-26-2012 |
20120116789 | OPTIMIZING QUEUE LOADING THROUGH VARIABLE ADMITTANCE FEES - Attraction attendance levels experienced by a customer are dynamically managed as a function of customer admission pricing. A customer is offered an opportunity to pay a regular admission fee or a higher premium admission fee for admission to a facility with one or more attractions, wherein the customer is provided with information as to an amount of reduced queue loading that will be achieved by the customer if the customer pays the premium admission fee. Queue loading is monitored, and a queue load diminishment relative to an expected queue load is identified, the amount of reduced queue loading achievable by the customer through paying the premium admission fee updated accordingly. The customer is notified of the updated amount of reduced queue loading achievable through paying the premium admission fee as a function of customer metadata. | 05-10-2012 |
20120116863 | OPTIMAL SCHEDULING OF VENUE ATTENDANCE BASED ON QUEUE SIZE AND LOCATION - Embodiments of the invention provide for managing attraction attendance levels through tracking current attendance levels and notifying patrons of incentives to alter their attraction selections in real-time. Examples identify an attraction queue that has a customer wait time failing to meet a threshold and determine a geographic relationship of a tracking device associated with a registered customer to the queue. Accordingly, an incentive is created from metadata associated with the queue and offered to the registered customer to urge the registered customer to take a queue balancing action. The queue balancing action may be leaving the queue if the customer wait time exceeds a threshold maximum wait time and the tracking device is within the queue, or choosing to enter the queue if the customer wait time is less than a threshold minimum wait time and the tracking device is outside of the queue. | 05-10-2012 |
20120128146 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-24-2012 |
20120201366 | CONFERENCE CALL MANAGEMENT - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 08-09-2012 |
20120296515 | METHOD AND SYSTEM TO MODIFY ROUTING INFORMATION BASED ON DETECTION OF RATE OF CHANGE OF PRESSURE IN TIRES - Embodiments of the present invention relate to a method, system and program product for monitoring the rate of deflation or inflation in vehicular tires to determine the time or distance it takes before the tire pressure of one or more tires enters an undesirable state. Under the present invention, tire specifications, environmental modifiers, vehicular modifiers, road and weather conditions, and current tire pressure for each tire are recorded as input to provide an alert with a route plan for a driver to bring a vehicle to a service station before tire pressure reaches an undesirable condition. In one embodiment, the system can inform the driver at what time in the future a tire will reach an undesirable condition. In another embodiment, the system can inform the driver at what distance (measured in miles, for example) a tire will reach an undesirable condition. In yet another embodiment, the system can modify a route in order to avoid an unsafe tire condition. | 11-22-2012 |
20120310392 | AUDIO MEDIA MOOD VISUALIZATION METHOD AND SYSTEM - An audio media visualization method and system. The method includes receiving by a computing processor, mood description data describing different human emotions/moods. The computer processor an audio file comprising audio data and generates a mood descriptor file comprising portions of the audio data associated with specified descriptions of the mood description data. The computer processor receives a mood tag library file comprising mood tags mapped to animated and/or still objects representing various emotions/moods and associates each animated and/or still object with an associated description. The computer processor synchronizes the animated and/or still objects with the portions of said audio data and presents the animated and/or still objects synchronized with the portions of said audio data. | 12-06-2012 |
20130031480 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - A method and system for controlling access to a resource. Visual representations of the resource and an entity are included in a display. Assignments of an access control requirement to the resource visual representation and an attribute to the entity visual representation are received. A movement in the display of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. The attribute assigned to the entity visual representation is determined to satisfy the access control requirement assigned to the resource visual representation. The entity is permitted to access the resource based on the attribute satisfying the access control requirement. A movement in the display of the entity visual representation across the boundary and a placement of the entity visual representation within the boundary of the resource visual representation are permitted based on the entity being permitted to access the resource. | 01-31-2013 |
20130035207 | ROUTINE-BASED MANAGEMENT OF EXERCISE EQUIPMENT ACCESS - A solution for managing access to exercise equipment in a fitness facility is provided. A planned exercise routine for a user, which includes data corresponding to a plurality of exercises desired to be performed by the user at the fitness facility is used for providing location information for presentation to the user. Each exercise can require use of an exercise apparatus. The exercise can be mapped to at least one exercise apparatus located at the fitness facility. A target exercise apparatus can be identified from the mapped exercise apparatus(es). Location information for one or more of the target exercise apparatuses can be provided for presentation to the user. | 02-07-2013 |
20130103219 | PROTECTING ELECTRONIC DEVICES FROM ELECTRICAL SUPPLY DISTURBANCES - Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source. | 04-25-2013 |
20130135616 | CABLE IDENTIFICATION USING A UNIQUE CABLE SLEEVE - A cable identification system is provided. The cable identification system includes a cable sleeve with some predetermined unique properties. The cable sleeve is adapted to receive a cable therein. The cable includes one or more electrical conductors therein. The cable identification system further includes a portable measuring device configured to detect the predetermined unique properties of the cable sleeve when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130137291 | CABLE IDENTIFICATION USING A UNIQUE SIGNAL CARRIED ON AN UNUSED CONDUCTOR - A cable identification system is provided. The cable identification system includes a multiconductor cable with an electrical connector secured to at least one end. The electrical connector is adapted to connect a plurality of conductors in the cable to a mating connector. The cable identification system further includes a signal generator adapted to connect the electrical connector to the mating connector. The signal generator is configured to select an unused conductor from the plurality of conductors and generate and transmit a unique signal over the selected conductor in the cable. The cable identification system further includes a portable device configured to detect the unique signal when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130137292 | CABLE IDENTIFICATION USING A UNIQUE SIGNAL CARRIED ON AN EXTERNAL CONDUCTOR - A cable identification system is provided. The cable identification system includes a cable having a plurality of conductors with an electrical connector secured to at least one end. All but one of the conductors are enclosed in a shield conductor. The remaining additional conductor is positioned external to the outer surface of the shield conductor. The electrical connector is adapted to connect the plurality of conductors to a mating connector. The cable identification system further includes a signal generator adapted to connect the electrical connector to the mating connector. The signal generator is configured to generate and transmit a unique signal over the additional conductor in the cable. The cable identification system further includes a portable device configured to detect the unique signal when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130138839 | CABLE IDENTIFICATION USING DATA TRAFFIC ACTIVITY INFORMATION - A cable identification system is provided. The cable identification system includes a cable having a plurality of conductors with an electrical connector on at least one end of the cable. The electrical connector is adapted to connect all conductors in the cable to a mating connector. The cable identification system further includes a signal generator connectable between the electrical connector and the mating connector on a network device. The signal generator includes a controller configured to measure and analyze parameters indicative of data traffic in the cable. The cable identification system further includes a cable sleeve adapted to receive the cable therein and coupled to the electrical connector. The cable sleeve has one or more segments which are electrically activatable to change an appearance based on a signal sent by the electrical connector in response to the measurements of the parameters indicative of traffic in the cable. | 05-30-2013 |
20130184931 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 07-18-2013 |
20130198362 | System for Identifying a Server to be Decommissioned - An embodiment of the invention provides a device for monitoring activity of a computing device connected to a network cable. The device includes a first interface for connecting the device to the network cable, a second interface for connecting the device to the computing device, and a third interface for connecting the device to a power cable. The device includes a first sensor for measuring network traffic to the computing device and/or network traffic from the computing device. The first sensor identifies an IP address accessing the computing device and/or a protocol used to access the computing device. The device further includes a second sensor for measuring power consumption of the computing device and a third sensor for identifying the computing device. A wireless communications module connected to the first sensor and/or the second sensor wirelessly transmits data from the first sensor and/or the second sensor to an external device. | 08-01-2013 |
20130235731 | IDENTIFYING AND TRANSITIONING TO AN IMPROVED VOIP SESSION - An additional session is established for voice over internet protocol communication between a pair of endpoints in a network, wherein a current session is already established between the endpoints and is currently used for data packet communication between endpoints. Qualities of each of the sessions for voice over internet protocol communication are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and additional sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints. | 09-12-2013 |
20130289823 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 10-31-2013 |
20130332561 | Control of Collaboration Workspaces and Information Objects using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20130332564 | Control of Collaboration Workspaces and Information Objects Using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20140018061 | ROUTE NAVIGATION FOR OPTIMAL MOBILE COVERAGE - A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point. | 01-16-2014 |
20140072112 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR CONTACTING CONFERENCE CALL PARTICIPANTS - The present invention provides a method, system, and program product for managing conference calls. Specifically, prospective conference call participants (e.g., moderators and/or invitees) will initially provide user profiles. A participant's profile will include, among other things, a set of contact numbers at which the participant can be reached. Thereafter, a moderator and a set of invitees of a conference call to be held are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. When the moderator later initiates the conference call, the present invention will access the profile of each invitee that accepted the invitation, and then call the invitees at the respective contact numbers set forth therein. When contact is made with an invitee, the call will be merged into the conference call with the moderator. | 03-13-2014 |
20140072113 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR CONTACTING CONFERENCE CALL PARTICIPANTS - The present invention provides a method, system, and program product for managing conference calls. Specifically, prospective conference call participants (e.g., moderators and/or invitees) will initially provide user profiles. A participant's profile will include, among other things, a set of contact numbers at which the participant can be reached. Thereafter, a moderator and a set of invitees of a conference call to be held are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. When the moderator later initiates the conference call, the present invention will access the profile of each invitee that accepted the invitation, and then call the invitees at the respective contact numbers set forth therein. When contact is made with an invitee, the call will be merged into the conference call with the moderator. | 03-13-2014 |
20140072114 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR CONTACTING CONFERENCE CALL PARTICIPANTS - The present invention provides a method, system, and program product for managing conference calls. Specifically, prospective conference call participants (e.g., moderators and/or invitees) will initially provide user profiles. A participant's profile will include, among other things, a set of contact numbers at which the participant can be reached. Thereafter, a moderator and a set of invitees of a conference call to be held are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. When the moderator later initiates the conference call, the present invention will access the profile of each invitee that accepted the invitation, and then call the invitees at the respective contact numbers set forth therein. When contact is made with an invitee, the call will be merged into the conference call with the moderator. | 03-13-2014 |
20140075367 | Supplementing a Virtual Input Keyboard - Supplementing a virtual input keyboard is provided. A form and a virtual input keyboard are displayed in a display of a data processing system. An input is received selecting a particular field within the form. One or more character key sets are retrieved corresponding to previous data entries of the particular field selected. A delta set of character keys is determined based on character keys in the one or more character key sets that do not match displayed character keys on the virtual input keyboard. A set of delta character supplemental virtual input keyboards is generated based on the delta set of character keys. Then, the set of delta character supplemental virtual input keyboards are displayed in the display. | 03-13-2014 |
20140077952 | OPTIMIZATION OF LUGGAGE PLACEMENT IN STORAGE COMPARTMENTS - Aspects of the present invention disclose a system, method and computer program product for automatically assigning a location to a luggage belonging to a passenger in a passenger carrier. In an example, a computer system evaluates characteristics of the luggage. The computer system evaluates characteristics of the passenger. The computer system assigns a location associated with an RFID tag to the luggage. The computer system confirms the luggage being correctly located in the assigned location. | 03-20-2014 |
20140095332 | SENDING A COUNTER-OFFER TO USE AN ALTERNATE PAYMENT OPTION - In a method for sending a counter-offer in response to receiving an indication about a point-of-sale transaction, a computer receives from a point-of-sale program a point-of-sale transaction and an indication that the point-of-sale transaction is to be paid for utilizing a first payment option and is to be recorded using a second payment option. The computer determines that a counter-offer is appropriate. The counter-offer includes a request that the point-of-sale transaction be paid for utilizing the second payment option. The computer sends to the point-of-sale program the counter-offer. | 04-03-2014 |
20140115371 | Decommission of a Server in Wireless Environment - An embodiment of the invention provides a device for monitoring activity of a computing device wirelessly connected to a network, wherein the device includes a first interface for connecting the device to the computing device. A second interface wirelessly connects the device to the network. A sensor connected to the second interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. Another embodiment of the invention provides a computing device having an interface for wirelessly connecting to a network. A sensor connected to the interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. A processor connected to the sensor compares the network traffic to the computing device and/or the network traffic from the computing device to one or more thresholds to determine whether the computing device should be decommissioned. | 04-24-2014 |
20140126710 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-08-2014 |
20140128022 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 05-08-2014 |
20140129385 | BANDWIDTH MANAGEMENT - A computer identifies a plurality of available network connections, wherein at least one of the identified network connections is contractually available to the computer under terms of a monthly data plan. The computer determines, based, at least in part, on characteristics of each network connection of the plurality of network connections and anticipated bandwidth consumption of the computer, a network connection to connect to from the plurality of network connections. The computer connects to the determined network connection. The computer determines, based, at least in part, on anticipated bandwidth consumption of the computer and contractual terms of the monthly data plan, an amount of excess bandwidth available for sale. | 05-08-2014 |
20140152470 | Vehicle-Induced Roadway Debris Monitoring - In an embodiment, a computer-implemented method of monitoring vehicles is provided, the method including: generating a debris report of an incident relating to vehicle-induced roadway debris, the debris report generated by a reporting vehicle; in a monitored vehicle distinct from the reporting vehicle, updating an incident record for the monitored vehicle based on the debris report and determining, based on the updated incident record, whether the monitored vehicle is associated with the incident or in a vicinity of the incident; and initiating a safety action to be performed on the monitored vehicle in response to a determination that the monitored vehicle is associated with the incident or in the vicinity of the incident. | 06-05-2014 |
20140195068 | INTELLIGENT ROAD SIGNS - An approach is provided for providing customized information to a driver of a vehicle. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: obtain one or more parameters of a vehicle; obtain environmental conditions outside of the vehicle; and calculate a speed at which the vehicle should traverse a portion of a road. The calculating is based on the one or more parameters of the vehicle and the environmental conditions outside of the vehicle. The approach is further operable to provide the calculated speed to the vehicle. | 07-10-2014 |
20140244484 | NETWORK COMPUTING ENVIRONMENT COLLECTION AND NOTIFICATION OF POINT OF SALE INFORMATION - Automated information collection and notification ancillary to the acquisition of a product or service includes determining transaction and information thresholds for application to attributes of a transaction for goods or services, a card account used to purchase an item or service pursuant to the transaction and associated with application of the thresholds. When the purchase of the item or service is accomplished, additional informational items to be retained are determined in response to an attribute of the additional informational items meeting the information threshold, an attribute of the transaction meeting the transaction threshold, and execution of the transaction via the identified card account. Authoritative source locations for retrieval of copies of the additional information, and ancillary storage devices for holding copies of or links to the additional information items, are identified. | 08-28-2014 |
20140245429 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. A movement in the display of the entity representation to a position proximate to a boundary of the resource representation is detected. An attribute assigned to the entity representation is determined to not satisfy an access control requirement assigned to the resource representation. The entity is not permitted to access the resource based on the attribute not satisfying the access control requirement. Based on the entity not being permitted to access the resource, a visual cue is presented that indicates the entity representation is prevented from moving in the display across, and being placed within, the boundary of the resource representation. | 08-28-2014 |
20140248851 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 09-04-2014 |
20140288960 | ROUTINE-BASED MANAGEMENT OF EXERCISE EQUIPMENT ACCESS - A solution for managing access to exercise equipment in a fitness facility is provided. A planned exercise routine for a user, which includes data corresponding to a plurality of exercises desired to be performed by the user at the fitness facility is used for providing location information for presentation to the user. Each exercise can require use of an exercise apparatus. The exercise can be mapped to at least one exercise apparatus located at the fitness facility. A target exercise apparatus can be identified from the mapped exercise apparatus(es). Location information for one or more of the target exercise apparatuses can be provided for presentation to the user. | 09-25-2014 |
20140304619 | IDENTIFYING INTENDED COMMUNICATION PARTNERS IN ELECTRONIC COMMUNICATIONS - An apparatus, computer program product, and method for assisting communication with an intended communication partner. The apparatus may include a user interface and at least one computer processor. The computer processor initiates a communication session with a first contact. The processor identifies at least one second contact that has a potential to be confused with the first contact and highlights at least one difference between the first contact and the second contact in the user interface. | 10-09-2014 |
20140304621 | IDENTIFYING INTENDED COMMUNICATION PARTNERS IN ELECTRONIC COMMUNICATIONS - An apparatus, computer program product, and method for assisting communication with an intended communication partner. The apparatus may include a user interface and at least one computer processor. The computer processor initiates a communication session with a first contact. The processor identifies at least one second contact that has a potential to be confused with the first contact and highlights at least one difference between the first contact and the second contact in the user interface. | 10-09-2014 |
20140317050 | ENSURING ACCESS TO LONG-TERM STORED ELECTRONIC DOCUMENTS - Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more methods may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents. | 10-23-2014 |
20140317610 | ENSURING ACCESS TO LONG-TERM STORED ELECTRONIC DOCUMENTS - Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more systems may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents. | 10-23-2014 |
20140337316 | INFORMATIVE COMMUNICATION HISTORY - An approach for retrieving and storing telephone numbers along with related contextual information associated with inbound/outbound communications to/from a device. The approach includes a method that includes combining, by at least one processing device, identification information of an entity and a related communication mechanism used to initiate a communication to a device. The method further includes providing, by the at least one processing device, a soft record that includes the identification information and the related communication mechanism. | 11-13-2014 |
20140372631 | ADAPTIVE CABLE INTERFACE - A computer implemented method, a computer program product, and a computer negotiate pin assignment for a cabling interface. A cabling interface discovers an attached device through an interrogation from a connected port. The cabling interface performs a handshake with the attached device. The handshake shares information on the protocols, bandwidth needs, streams and pins supported by the attached device. The cabling interface declares a set of supported streams needed for communication by the cabling interface. The cabling interface negotiates pin layout for each streams that will be used for communication between the cabling interface and the attached device. The cabling interface assigns pins based on needs of the attached device and needs of the cabling interface. | 12-18-2014 |
20140376385 | MITIGATING NETWORK CONNECTION PROBLEMS USING SUPPORTING DEVICES - An approach for mitigating network connection problems when a first computing device is unable to connect to a remote resource is described. A second computing device receives a request for diagnostic testing over a second network from the first computing device. The second computing device performs diagnostic tests on a data path to a desired remote resource. The second computing device sends over the second network, results from the diagnostic tests regarding the data path connectivity to the first device that is unable to connect to desired remote resource. The results are analyzed to determine the location of network connectivity failure. | 12-25-2014 |
20150066698 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150066700 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150082059 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 03-19-2015 |
Patent application number | Description | Published |
20090063639 | METHOD AND SYSTEM FOR USING BUSINESS RULES TO CONTROL INVITATIONS TO JOIN INSTANT MESSAGE COLLABORATIONS - A method and system for using business rules to control invitations to participate in instant message (IM) collaborations. A primary invitee is invited to participate in an IM collaboration via a first IM. A business rule associated with the primary invitee is applied to determine that the primary invitee is unavailable to participate in the IM collaboration. A second IM is sent to automatically invite a backup invitee to participate in the IM collaboration. In another embodiment, a primary invitee with credentials specified by a business rule is to be invited to an IM collaboration at a specified time. An application of the business rule determines that the specified time is outside a valid invitation time period or the primary invitee's credentials are not included in a set of predefined credentials. Following the application of the business rule, a backup invitee is invited. | 03-05-2009 |
20090168661 | VISUAL METERING AND RESPONSE TO MAINTAIN VOICE QUALITY IN A VOICE OVER INTERNET PROTOCOL CALL - A computer implemented method, apparatus, and computer usable program product for managing a voice over Internet Protocol call. A selected set of resources associated with a quality of the voice over Internet Protocol call in a data processing system is monitored during the voice over Internet Protocol call. A determination is made as to whether the quality of the voice over Internet Protocol call in a data processing has fallen below a desired level. A corrective action is performed with respect to the selected set of resources in response to the quality of the voice over Internet Protocol call falling below the desired level. | 07-02-2009 |
20090193086 | CONTROL OF AN INSTANT MESSAGE SYSTEM THAT ALLOWS MULTIPLE CLIENTS WITH IDENTICAL CREDENTIALS - A method and system for improving control of an instant messaging system. Multiple instant message (IM) instances are initiated with identical credentials of a user of multiple users participating in an IM session controlled by an IM server. A front-of-screen representation enables the user to manage instance attributes and allows any user to view conversational connectivity information. The IM server receives the user's selection of a graphical element that represents a remote IM instance of the multiple IM instances. Via the first IM instance, the IM server receives the user's request for a computing device to perform an action that includes an interaction with the remote IM instance. The computing device performing the action is located remotely from the user and is executing the remote IM instance. The action is performed by controlling a remote system function of the computing device. | 07-30-2009 |
20090245095 | Voice Over Internet Protocol Clarity During Degradation - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for improving voice over Internet Protocol clarity during degradation. In one illustrative embodiment, the computer implemented method comprises monitoring a call, determining whether degradation exists; and responsive to a determination that degradation exists, applying a corrective action. The computer implemented method further comprises determining whether a quality of the call has improved and responsive to determining that the quality of the call has improved, further monitoring the call to form a monitored quality. The computer implemented method further comprises, determining whether monitored quality is acceptable, and responsive to determining monitored quality acceptable, removing the corrective action. | 10-01-2009 |
20090247147 | Predictive Mobile Phone Service Disruption Service - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for a predictive mobile phone service disruption service. In one illustrative embodiment, the computer implemented method comprises monitoring a cellular call of a caller, calculating a location and vector of the caller, and determining whether the caller is approaching a drop zone. The computer implemented method responsive to determining the caller is approaching a drop zone, estimates a duration of a loss of service, and responsive to determining the caller is approaching a drop zone, selectively notifying the caller. | 10-01-2009 |
20140081748 | CUSTOMIZED TELEVISION COMMERCIALS - A method of presenting a commercial to a viewer by a media player includes downloading, by the media player, a data portfolio from a remote server, wherein the data portfolio comprises a plurality of commercials and a viewing strategy, determining, by the media player, whether one of the commercials has been viewed previously by a same viewer, and presenting, by the media player, an other one of the commercials based on the viewing strategy. | 03-20-2014 |
20140081749 | CUSTOMIZED TELEVISION COMMERCIALS - A media player includes a memory device storing a computer program, a processor configured to execute the computer program, and network interface configured to enable communications between the media player and a network. The program is configured to download a data portfolio from a remote server across the network, determine whether one of a plurality of commercials included within the data portfolio has been viewed previously by a same viewer, and output an other one of the commercials based on a viewing strategy included within the data portfolio. | 03-20-2014 |
20140139703 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140139704 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140343796 | Detect Driver Persona in a Vehicle - An embodiment of the invention provides a method and system for detecting driver persona in a vehicle wherein an attribute of a user is identified via at least one sensor in the interior of the vehicle. The attribute of the user can include the body weight of the user and/or a sequence of activities performed by the user when entering the vehicle. An electronic storage device is queried with the attribute of the user to determine whether the attribute of the user matches a stored driver attribute. The electronic storage device includes one or more driver profiles that include one or more driver attributes and stored driver settings. Driver settings are set in the vehicle with a processor based on the stored driver settings when the attribute of the user matches a stored driver attribute in the electronic storage device. | 11-20-2014 |
20150066645 | Enhancing Marketing Funnel Conversion Through Intelligent Social Tagging and Attribution - An embodiment of the invention provides a method and system for enhancing marketing funnel conversion through intelligent social tagging and attribution. A processor identifies search terms entered into a search engine and websites visited in response to web searches for the search terms. A compiler extracts consumer annotations from the websites visited, wherein the consumer annotations are generated by individuals who previously visited the websites and reviewed products on the websites. The compiler also extracts product specifications from the websites visited, wherein the product specifications are created by a seller and/or manufacturer of a product. The search terms, the websites visited, the extracted consumer annotations, and the product specifications are saved in an electronic database. An access controller permits access to the search terms, the websites visited, the extracted consumer annotations, and the product specifications to potential consumers. | 03-05-2015 |
20150073985 | Selectively Using Degree Confidence for Image Validation to Authorize Transactions - An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold. | 03-12-2015 |