Patent application number | Description | Published |
20100100369 | Translating Source Locale Input String To Target Locale Output String - A dictionary mapping source locale strings to target locale strings is constructed. A tree is constructed from the dictionary. The tree has nodes including a start node, end nodes, and string nodes. The nodes form node chains of the tree that correspond to the source locale strings. Each node chain links a collection of the nodes from the start node to a string node. Each node other than the start node has a parent node and corresponds to a character of the source locale strings. Each node other than the end nodes has one or more child nodes. Each string node ends a node chain, and corresponds to a mapping within the dictionary of a source locale string to a target locale string. An input string having the source locale is processed against the tree to generate an output string having the target locale. | 04-22-2010 |
20120173535 | Allowing External Access to Private Information of a Local Data Store - Techniques provided for allowing external access by other users to private information that is maintained on local storage of a computer and owned by an information owner. The private information is uploaded from the local storage to an externally accessible information source that is accessible by the other users. A request from a user to access the private information is received by the owner, who determines whether to allow access the private information. If so, the owner sends a private information sharing authorization to a collaboration orchestrator, which retrieves the private information from the external source and provides the private information to the user. The owner optionally requests to collaborate with the user before deciding whether to allow access to the private information. One or both of the identities of the owner and user can remain anonymous until agreeing on revealing identities. A system and program product is also provided. | 07-05-2012 |
20120209885 | Allowing External Access to Private Information of a Local Data Store - Techniques provided for allowing external access by other users to private information that is maintained on local storage of a computer and owned by an information owner. The private information is uploaded from the local storage to an externally accessible information source that is accessible by the other users. A request from a user to access the private information is received by the owner, who determines whether to allow access the private information. If so, the owner sends a private information sharing authorization to a collaboration orchestrator, which retrieves the private information from the external source and provides the private information to the user. The owner optionally requests to collaborate with the user before deciding whether to allow access to the private information. One or both of the identities of the owner and user can remain anonymous until agreeing on revealing identities. A system and program product is also provided. | 08-16-2012 |
20120284697 | CODE EVALUATION BASED ON FAILURE PREDICTION - A method and apparatus for evaluating code. A likelihood that a set of segments of the code will not run as desired based on a policy is identified. A risk of the code not performing as desired is evaluated based on a result from a code coverage test and the likelihood that the set of segments of the code will not run as desired. | 11-08-2012 |
20130103982 | LOG FILE COMPRESSION - A compression system identifies one or more fields in a log file based on at least one field rule from among multiple field rules specified in a log file framework. The compression system extracts contents of the log file associated with the one or more fields. The compression system passes the contents associated with the one or more fields to corresponding compression engines from among a multiple compression engines each specified for performing a separate type of compression from among multiple types of compression for each of the one or more fields, wherein each of the one or more fields corresponds to one or more compression engines from among the multiple compression engines. | 04-25-2013 |
20140006455 | ATTRIBUTE-BASED LINKED TRIES FOR RULE EVALUATION | 01-02-2014 |
20140006456 | ATTRIBUTE-BASED LINKED TRIES FOR RULE EVALUATION | 01-02-2014 |
20140006656 | Optimizing an Operating System I/O Operation that Pertains to a Specific Program and File | 01-02-2014 |
20140006657 | OPTIMIZING AN OPERATING SYSTEM I/O OPERATION THAT PERTAINS TO A SPECIFIC PROGRAM AND FILE | 01-02-2014 |
20140379981 | APPLICATION DISCOVERY USING STORAGE SYSTEM SIGNATURES - Exemplary embodiments of the present invention disclose a method and system for identifying one or more applications stored on a storage system that is shared by one or more computer systems. In a step, an exemplary embodiment accesses the storage system. In another step, an exemplary accesses one or more file tables associated with the storage system. In another step, an exemplary embodiment analyzes the one or more file tables and one or more files on the storage system that are associated with the one or more applications to identify the one or more applications. In another step, an exemplary embodiment analyzes the one or more file tables and the one or more files to identify a respective dependency of the one or more applications. | 12-25-2014 |
20150067501 | METHOD TO GENERATE DYNAMIC CUSTOMIZED CONTEXT-SENSITIVE HELP - Embodiments of the present invention disclose a method, computer program product, and system for customizing help screens. A computer receives a request for help content. The computer identifies an annotated help file that corresponds to the request for help content. The computer identifies one or more variables in the identified annotated help file. The computer retrieves a value for each of the one or more variables from a software product. The computer replaces each of the one or more variables in the identified annotated help file with the retrieved value to generate customized help content. | 03-05-2015 |
20150067645 | METHOD TO GENERATE DYNAMIC CUSTOMIZED CONTEXT-SENSITIVE HELP - Embodiments of the present invention disclose a method, computer program product, and system for customizing help screens. A computer receives a request for help content. The computer identifies an annotated help file that corresponds to the request for help content. The computer identifies one or more variables in the identified annotated help file. The computer retrieves a value for each of the one or more variables from a software product. The computer replaces each of the one or more variables in the identified annotated help file with the retrieved value to generate customized help content. | 03-05-2015 |
20150074229 | DYNAMIC HELP PAGES USING LINKED DATA - Help page techniques including: (i) sending, by a customer computer, heterogeneous software context data to a central registry over a communication network; (ii) receiving, by the customer computer, from a registry server over the communication network, a set of network address information including at least a first network address information for contacting a first provider server relating to the first software product and a second network address information for contacting a second provider server relating to the second software product; and (iii) linking, by the customer computer, the first and second network address information on a single set of help page(s). | 03-12-2015 |
20150074231 | DYNAMIC HELP PAGES USING LINKED DATA - Help page techniques including: (i) sending, by a customer computer, heterogeneous software context data to a central registry over a communication network; (ii) receiving, by the customer computer, from a registry server over the communication network, a set of network address information including at least a first network address information for contacting a first provider server relating to the first software product and a second network address information for contacting a second provider server relating to the second software product; and (iii) linking, by the customer computer, the first and second network address information on a single set of help page(s). | 03-12-2015 |
20150089405 | INTEGRATED USER INTERFACE USING LINKED DATA - A computer receives user input regarding at least a first and a second resource. The computer retrieves navigational content for the first and second resource. The computer displays the retrieved navigational content in a single interface. The computer receives user selection of at least one element of the retrieved navigational content. The computer then retrieves page content associated with the selected at least one element of the retrieved navigational content. | 03-26-2015 |
20150089412 | INTEGRATED USER INTERFACE USING LINKED DATA - A computer receives user input regarding at least a first and a second resource. The computer retrieves navigational content for the first and second resource. The computer displays the retrieved navigational content in a single interface. The computer receives user selection of at least one element of the retrieved navigational content. The computer then retrieves page content associated with the selected at least one element of the retrieved navigational content. | 03-26-2015 |
20150142816 | Managing Searches for Information Associated with a Message - A method for managing information about a product. A processor searches documents for a location of a message of the product using a set of rules that are based on instructions for generating the message. The instructions are in a resource of the product. The processor then adds the location to an index of locations of the message in the documents. | 05-21-2015 |
20150143182 | Varying Logging Depth Based On User Defined Policies - Techniques for writing logging files, where the logging files include multiple pieces of logging information. The pieces of logging information are based on operation of a computer system. The writing of the logging information includes the following steps (not necessarily in the following order): (i) choosing a set of logging rules; which logging rules determine the selection of which pieces of operational information relating to the computer system will be written to a non-volatile log file; (ii) operating the computer system; (iii) during operation of the computer system, collecting a first set of pieces of operational information; (iv) saving the first set of pieces of operational information to a volatile buffer memory; and (v) writing only a first sub-set of the first set of pieces of operational information to a first log file. | 05-21-2015 |
20150149147 | LANGUAGE INDEPENDENT PROCESSING OF LOGS IN A LOG ANALYTICS SYSTEM - Log files include log file content, some of which (especially a non-runtime portion) is in human-readable language. Translation of log file content is accomplished by: (i) generating first log content in a first human-readable language using a first resource bundle related to data translation; and (ii) translating the first log content to second log content, which corresponds to the first log content but is in a second human-readable language, using the first resource bundle. The translated log content may have annotations and/or processing rules applied to it. The translation of the present invention can help to keep the translation accurate and uniform so that the translated log content may be more effectively used in various ways. | 05-28-2015 |
20150149148 | LANGUAGE INDEPENDENT PROCESSING OF LOGS IN A LOG ANALYTICS SYSTEM - Log files include log file content, some of which (especially a non-runtime portion) is in human-readable language. Translation of log file content is accomplished by: (i) generating first log content in a first human-readable language using a first resource bundle related to data translation; and (ii) translating the first log content to second log content, which corresponds to the first log content but is in a second human-readable language, using the first resource bundle. The translated log content may have annotations and/or processing rules applied to it. The translation of the present invention can help to keep the translation accurate and uniform so that the translated log content may be more effectively used in various ways. | 05-28-2015 |
20150293837 | RISK-BASED TEST COVERAGE AND PRIORITIZATION - A processor receives a rule containing a first set of code statements. The processor compares the first set of code statements of the rule to a second set of code statements of a plurality of code statements of source code. The processor responds to a match of the first set of code statements of the rule and the second set of code statements of the plurality of code statements of the source code, by applying a weight modifier to the rule, which adds a weighted value to the rule, and the processor, in response to a second matching of the first set of code statements of the rule to the second set of code statements of the plurality of code statements of the source code, applies the weight modifier to the rule, which includes a weighted value, and the weight modifier adjusts the weighted value of the rule. | 10-15-2015 |
20150347429 | Managing Searches for Information Associated with a Message - A method for managing information about a product. A processor searches documents for a location of a message of the product using a set of rules that are based on instructions for generating the message. The instructions are in a resource of the product. The processor then adds the location to an index of locations of the message in the documents. | 12-03-2015 |
20160132205 | SYSTEM AND METHOD FOR LINKING APPLICATIONS - A system and method includes a device and a processor. In some embodiments the processor is operable to display a first representation for a first application at a first location on the touchscreen display and a second representation for a second application. In some embodiments, the device detects a contact on a touchscreen display at the first location. In some embodiments, the device detects a gesture on the touchscreen display and links the first application with the second application. In some embodiments the device links the first application with the second application when the gesture conforms to a predetermined gesture. | 05-12-2016 |
Patent application number | Description | Published |
20110082883 | INTELLIGENT EVENT-BASED DATA MINING OF UNSTRUCTURED INFORMATION - A method, system and computer program product is disclosed for intelligent data mining. The method comprises receiving an event from an application, assigning property weights to properties of the event, and building a query from these properties based on the property weights. The method further comprises assigning search engine weights to a group of search engines, selecting at least some of the search engines based on the search engine weights, and sending the built query to the selected search engines. Results from the selected search engines are stored in a knowledge repository and used to adjust the property weights and the search engine weights. The invention may be used to provide an analysis with information about a problem, and to manage a solutions database which can be used for problem determination. The invention provides a low cost solution for collecting relevant information from online sources. | 04-07-2011 |
20110145313 | METHOD AND SYSTEM FOR DATA TRANSPORT COMPRESSION BASED ON AN ENCODING DICTIONARY PATCH - A method and system for transport data compression between a server and a client based on patches to the dictionaries used for encoding the data. The method includes requesting the server for data, returning the data and a dictionary patch to the client where data having been compressed based on a previously used dictionary and the dictionary patch, and decompressing the returned data using the dictionary and the dictionary patch. The dictionary patch includes updates to the previously used dictionary. Each dictionary has a dictionary identifier that the server and client use to identify the dictionary in their requests and responses. The identifier might be a unique identification or a network session number. Upon receiving a response, the client updates the previously used dictionary with information in the patch and decompresses the returned data using the updated dictionary. | 06-16-2011 |
20140089308 | Tracking Documents in Computing Devices - A method and system for tracking documents in computing devices is provided. The method includes creating a unique identifier for a document in a computing device based on contents of the document and meta-data associated with the document. The unique identifier is then used for tracking the document in one or more computing devices. The tracking of the document can be done for all the documents in plurality of computing devices. The method further tracks propagation of the document in the plurality computing devices. | 03-27-2014 |
20140281755 | Identify Failed Components During Data Collection - A mechanism is provided for identifying failed components during data collection. For each data source combination in a plurality of data sources, a determination is made as to whether a standard deviation (σ) for an estimated collection interval of the data source is above a predetermined standard deviation threshold (σ | 09-18-2014 |
20140282966 | PREVENTION OF PASSWORD LEAKAGE WITH SINGLE SIGN ON IN CONJUNCTION WITH COMMAND LINE INTERFACES - Provided are techniques for transmitting a lightweight domain access protocol (LDAP) request from an user interface application (UIA) to a LDAP server receiving, at the UIA, a LTPA token in response to the transmitting of the LDAP request; transmitting, from the UIA, to a command line interface associated with an application, the LTPA token in conjunction with a command to be executed by the application; verifying by the application the LTPA token; and in response to the verifying, executing, by the application the command. The techniques also include transmitting, from the application, to a second command line interface associated with a second application, the LTPA token in conjunction with a second command to be executed by the second application; verifying by the second application the LTPA token; and in response to the verifying by the second application, executing, by the second application the second command. | 09-18-2014 |
20150134634 | SEARCH RESULTS BASED ON AN ENVIRONMENT CONTEXT - A computer performs a search and generates a context-aware search result. The computer crawls a plurality of servers to fetch a plurality of knowledge documents, parses the plurality of knowledge documents, and indexes the plurality of parsed knowledge documents in a search index. Parsing can include annotating at least one of the plurality of knowledge documents, and indexing can include building a term index and an annotation index. The computer receives from a requestor a search request including a search term, and requests and receives a context of an asset environment associated with the requestor. The computer determines a context-aware search result based, at least in part, on the search term, on the context, and on information stored in the search index, and transmits the context-aware search result to the requestor. | 05-14-2015 |
20150134635 | SEARCH RESULTS BASED ON AN ENVIRONMENT CONTEXT - A computer performs a search and generates a context-aware search result. The computer crawls a plurality of servers to fetch a plurality of knowledge documents, parses the plurality of knowledge documents, and indexes the plurality of parsed knowledge documents in a search index. Parsing can include annotating at least one of the plurality of knowledge documents, and indexing can include building a term index and an annotation index. The computer receives from a requestor a search request including a search term, and requests and receives a context of an asset environment associated with the requestor. The computer determines a context-aware search result based, at least in part, on the search term, on the context, and on information stored in the search index, and transmits the context-aware search result to the requestor. | 05-14-2015 |
20150254221 | MANAGING PRODUCT CONFIGURATION - A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document. | 09-10-2015 |
20160103818 | MANAGING PRODUCT CONFIGURATION - A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document. | 04-14-2016 |
Patent application number | Description | Published |
20110196154 | AMORPHOUS PEMETREXED DISODIUM - Processes for the preparation of amorphous pemetrexed disodium, and removal of residual solvents from amorphous pemetrexed disodium. | 08-11-2011 |
20110213159 | PROCESS FOR PREPARATION OF CELECOXIB CRYSTALLINE FORM - Celecoxib crystalline Form Ill substantially free of celecoxib crystalline Forms I and II and a process for its preparation. | 09-01-2011 |
20110250454 | PREPARATION OF NEBIVOLOL - Processes for the synthesis of pharmacologically active 2,2-iminobisethanol derivatives, e.g., 2H-1-benzopyran-2 methanol-α,α′-iminobis(methylene)]bis-[6-fluoro-3,4-dihydro-[2R*[R*[R*(S*)]]]], and their pharmaceutically acceptable salts. | 10-13-2011 |
20130225805 | PREPARATION OF CRYSTALLINE BAZEDOXIFENE AND ITS SALTS - Aspects of the present disclosure include crystalline bazedoxifene free base, crystalline bazedoxifene acetate Form D, and processes for their preparation. The drug compound having the adopted name “bazedoxifene acetate” has a chemical name 1-[4-(2-azepan-1-yl-ethoxy)benzyl]-2-(4-hydroxyphenyl)-3-methyl-1H-indol-5-ol acetic acid, and has the chemical structure shown below as Formula I. | 08-29-2013 |
20150126525 | CRYSTALLINE FORMS OF VILAZODONE HYDROCHLORIDE AND VILAZODONE FREE BASE - Provided are crystalline and amorphous vilazodone hydrochloride. Further provided are amorphous solid dispersions of vilazodone hydrochloride with pharmaceutically acceptable carries. Also provided is a process for the preparation of form I of vilazodone free base. | 05-07-2015 |
20160130252 | POLYMORPHIC FORMS OF NILOTINIB HYDROCHLORIDE - Crystalline Forms R5, R5a, R5b and R6 of nilotinib hydrochloride and processes for their preparation. | 05-12-2016 |