Patent application number | Description | Published |
20080222149 | Collation Regression Testing - A method, data processing system, and computer usable code are provided for collation regression testing. Collation elements are extracted from a locale seed file into an element list. A sorted list is generated from the element list both in a released product and an updated product that is being validated. A comparison is performed of the two lists to produce test results indicating a passing or failing of the collation produced by the updated product as compared to the released product. | 09-11-2008 |
20080229129 | Remote Control Save and Sleep Override - An approach is provided that handles a power down signal received by a device. Other types of signals, such as suspend or save and sleep, may also be handled. A device, such as a parent device, sends a power down signal to another device, such as a child device. The power down signal is received by the child device and acted upon, based on the activities currently being executed by the child device. Each activity currently being executed by the child device is handled according to its corresponding setting in an activity list. For example, if the child device is currently executing a preferred activity, the power down signal is ignored. A user of the child device may also send an explanation (or explanations) to the parent device. | 09-18-2008 |
20080235811 | Method for Device Dependent Access Control for Device Independent Web Content - A method, an apparatus, and computer instructions are provided for device-dependent access control for device independent web content. In an illustrative embodiment, a module may be implemented in a computer program detects a client device and security level from a request for a resource by a client device. The module loads, from a data source or configuration file, a three-dimensional device dependent access control matrix, which includes a user role axis, a device axis, and a resource axis. Based on the security level of the device indicated by the device matrix, the module grants or denies access to the resource by the user device. The security levels may include security protocols implemented by different devices, encryption schemes implemented by different devices, and security patches applied by the same device. | 09-25-2008 |
20090103809 | INPUT METHOD TRANSFORM - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for transforming character data input between a first writing system and a second writing system. The computer implemented method comprises receiving character data input of a first writing system and ensuring the character data input contains normalized characters. A predefined transform is selected based on the character data input of the first writing system and output to a second writing system to transform the normalized characters of the first writing system to character data output of the second writing system, and providing the character data output to a display process. | 04-23-2009 |
20090106147 | SYSTEM FOR PROCESSING CONDITIONAL PAYMENT REQUEST IN AN ELECTRONIC FINANCIAL TRANSACTION - A mechanism is presented for processing conditional payment requests in an electronic financial transaction system. In particular, the mechanism provides for the handling of concurrent conditional payment events. The status of a payment condition may be categorized into three categories, and a priority assigned relative to the category. In this way, concurrent events may be prioritized according to their respective categories. Events may then be executed in order of assigned priority. | 04-23-2009 |
20090132639 | Systems, Methods, and Media for Managing Multiple Sessions for a User of a Portal - Systems, methods and media for managing multiple sessions for a user on a portal are disclosed. More particularly, hardware and/or software for managing multiple user sessions with backend applications of a portal are disclosed. Embodiments include a portal having a client interaction module for interacting with a user and a portlet application module for interacting with a backend application on an application server. A further embodiment, provides a session manager for retrieving application session data from an application session data cache and inserting it into a user request, and for removing application session data from a content transmission from a backend application. In some embodiments, a session data cache for storing portal session data and application session data is provided. The session data cache may store application session data for each session established by a user with backend applications. | 05-21-2009 |
20100217891 | Document Source Debugger - Embodiments of the invention are directed to a data transfer network having a server side and a client side, wherein content is sent from the server side to the client side in successive output streams to dynamically create a document on the client side, and the content for different output streams is provided, respectively from different ones of a plurality of originating sources that are located on the server side. One embodiment, directed to a method, includes the steps of intercepting a given output stream, and determining whether or not a debug directive can be inserted into the intercepted output stream, wherein the determination is made in conformance with prespecified lexeme rules associated with the intercepted output stream. Responsive to a determination that a debug directive can be inserted into the intercepted stream, a debug directive is created that contains information identifying the originating source on the server side which provided the content for the intercepted output stream. The method further includes inserting the created debug directive into the intercepted stream at a selected insertion location. | 08-26-2010 |
20110246965 | CORRECTING DOCUMENT GENERATION FOR POLICY COMPLIANCE - A method, system, and computer usable program product for correcting document generation for policy compliance are provided in the illustrative embodiments. An error is detected in an electronic document at a first application. A code location associated with the error is identified. The electronic document has embedded debugging code including a set of code locations including the code location. An input is received, the input being usable in correcting the error. An information usable in correcting the error is created, the information including the input. The information is sent to a second application executing in a second data processing system. The information is usable to modify a third application. | 10-06-2011 |
20110282894 | System and Method for Remote File Search Integrated with Network Installable File System - A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep). | 11-17-2011 |
20110313902 | Budget Management in a Compute Cloud - A mechanism is provided for managing a budget for a customer in a compute cloud. A cloud budget manager calculates charges for usage of compute cloud resources by each of the customer's services associated with the customer from a beginning of a time period to a current time thereby forming calculated charges. The cloud budget manager estimates charges for a remaining time in the time period thereby forming estimated charges. The cloud budget manager determines whether a sum of the calculated charges and the estimated charges exceeds an allocated budget. The cloud budget manager implements a policy in a plurality of policies that adjusts the level of services of the customer in order to fall within the allocated budget in real time in response to a determination that the sum of the calculated charges and the estimated charges exceeds the allocated budget. | 12-22-2011 |
20120042037 | SOURCE IDENTIFICATION FOR MULTIPART CONTENT VALIDATION - A method, system, and computer usable program product for source identification for multipart content validation are provided in the illustrative embodiments. An identification information of a source server is obtained by parsing an update request, the update request being configured to request from the source server an update of a part of the multipart content. The identification information is recorded. A change in a part of the multipart content is observed. The change in the part results in an updated multipart content. A debugging directive is constructed, the debugging directive including the identification information of the source server. The debugging directive is inserted relative to the part that has changed thereby associating the source server with the part of the multipart content. The updated multipart content including the debugging directive is transmitted to a validation server executing in a second data processing system. | 02-16-2012 |
20120109987 | REMOTE FILE SHARING BASED ON CONTENT FILTERING - Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system. | 05-03-2012 |
20120110384 | Source Identification of Compliance Errors in a Web Page with Custom Widgets - A mechanism is provided to automate the mapping so that custom widgets that cause compliance errors in the Web page can be identified automatically. The mechanism dynamically creates and inserts debug directives into the HTML code generated from a custom widget in a Web page so that a compliance error found in the generated code can be traced back to the custom widget that caused the error. | 05-03-2012 |
20120124067 | User Identifier Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing user identifiers presented in accordance with an illustrative embodiment. In an illustrative embodiment, a determination is made whether the new user identifier matches an existing user identifier according to a policy for a minimum degree of character variation between the new user identifier and the existing user identifier responsive to receiving a request to store a new user identifier. The request to store the new user identifier is rejected responsive to a determination that the new user identifier matches the existing user identifier according to the policy. The request is approved responsive to an absence of a determination that the new user identifier matches the existing user identifier according to the policy. | 05-17-2012 |
20120209866 | User Identifier Management - The different illustrative embodiments provide a method for managing user identifiers presented in accordance with an illustrative embodiment. In an illustrative embodiment, a determination is made whether the new user identifier matches an existing user identifier according to a policy for a minimum degree of character variation between the new user identifier and the existing user identifier responsive to receiving a request to store a new user identifier. The request to store the new user identifier is rejected responsive to a determination that the new user identifier matches the existing user identifier according to the policy. The request is approved responsive to an absence of a determination that the new user identifier matches the existing user identifier according to the policy. | 08-16-2012 |
20130007116 | SOURCE IDENTIFICATION FOR MULTIPART CONTENT VALIDATION - A method, system, and computer usable program product for source identification for multipart content validation are provided in the illustrative embodiments. An identification information of a source server is obtained by parsing an update request, the update request being configured to request from the source server an update of a part of the multipart content. The identification information is recorded. A change in a part of the multipart content is observed. The change in the part results in an updated multipart content. A debugging directive is constructed, the debugging directive including the identification information of the source server. The debugging directive is inserted relative to the part that has changed thereby associating the source server with the part of the multipart content. The updated multipart content including the debugging directive is transmitted to a validation server executing in a second data processing system. | 01-03-2013 |
20130027406 | System And Method For Improved Font Substitution With Character Variant Replacement - Text is presented at a computer system in a font that lacks a visual representation for a character by substituting the visual representation of a variant of the character in the text. For example, a character having a Unicode code point is associated with variants in a character variant table, each variant having a code point different from the character. In one embodiment, if text calls for presentation of the character in a font not supported by a computer system, a variant is selected that supports the font and a graphical representation of the variant is substituted for the character. | 01-31-2013 |
20130159296 | ACTIVITIES BASED DYNAMIC DATA PRIORITIZATION - A system, and computer program product for activity based dynamic data prioritization are provided in the illustrative embodiments. A user activity corresponding to a user is selected. A query is constructed corresponding to the user activity. The query is executed on a data source to obtain a result set of data. A prioritization rule is constructed using a feature of the query and a policy. Data items in the result set of data are prioritized according to the prioritization rule to form prioritized data. The prioritized data is presented relative to the user activity. | 06-20-2013 |
20130159297 | ACTIVITIES BASED DYNAMIC DATA PRIORITIZATION - A method for activity based dynamic data prioritization is provided in the illustrative embodiments. A user activity corresponding to a user is selected. A query is constructed corresponding to the user activity. The query is executed on a data source to obtain a result set of data. A prioritization rule is constructed using a feature of the query and a policy. Data items in the result set of data are prioritized according to the prioritization rule to form prioritized data. The prioritized data is presented relative to the user activity. | 06-20-2013 |
20130275403 | Search Improvement Using Historic Code Points Associated with Characters - A mechanism is provided for improving search results. A user query is analyzed to identify a set of characters in the user query and an encoding code point associated with each character. A determination is made as to whether any of the encoding code points exist within a historic code point table. Responsive to at least one encoding code point existing within the historic code point table, all code points associated with each identified encoding code point in the user query are retrieved from the historic code point table. A modified user query is then created that utilizes the encoding code points of the user query and the code points from the historic code point table. The modified user query is then executed. | 10-17-2013 |
20130304772 | MANAGING THE PRODUCT OF TEMPORARY GROUPS IN A COMMUNITY - A method, system, and computer program product for managing the products of a sub-community operating within a community are provided in the illustrative embodiments. The sub-community is defined in an application executing on a data processing system using a processor and a memory. The community comprises a set of members working for a common objective. The sub-community comprises a subset of the set of members working for a part of the common objective. The defining of the sub-community also configures a closing condition for the sub-community. A plurality of members is added to the sub-community. The sub-community is created. | 11-14-2013 |
20140007249 | Privacy Control in a Social Network | 01-02-2014 |
20140007255 | Privacy Control in a Social Network | 01-02-2014 |
20140074857 | WEIGHTED RANKING OF VIDEO DATA - A method, system, and computer program product for weighted ranking of video data are provided in the illustrative embodiments. A weight is assigned to an aspect of the video data. A weight is assigned to a person expected to feature in the video data. A weight of the video data is computed, the weight of the video data being a factor of the weight assigned the aspect and the weight assigned the person. A ranking of the video data is computed using the weight computed for the video data. | 03-13-2014 |
20140075298 | DOCUMENT ANALYSIS AND PRESENTATION FOR USERS WITH SPECIAL NEEDS - A method, system, and computer program product for document analysis and presentation to a user, the user having a special need, are provided in the illustrative embodiments. A document is received for presentation to the user, the document including a plurality of parts, the plurality of parts including a preferred part, and wherein the user has to reach the preferred part in the document by sequentially processing a subset of parts preceding the preferred part in the document. The document is analyzed according to a set of attributes. The document is restructured to form a restructured document such that user can directly access the preferred part of the restructured document without having to sequentially process the restructured document. The restructured document is presented to the user having special needs. | 03-13-2014 |
20140088961 | Captioning Using Socially Derived Acoustic Profiles - Mechanisms for performing dynamic automatic speech recognition on a portion of multimedia content are provided. Multimedia content is segmented into homogeneous segments of content with regard to speakers and background sounds. For the at least one segment, a speaker providing speech in an audio track of the at least one segment is identified using information retrieved from a social network service source. A speech profile for the speaker is generated using information retrieved from the social network service source, an acoustic profile for the segment is generated based on the generated speech profile, and an automatic speech recognition engine is dynamically configured for operation on the at least one segment based on the acoustic profile. Automatic speech recognition operations are performed on the audio track of the at least one segment to generate a textual representation of speech content in the audio track corresponding to the speaker. | 03-27-2014 |
20140201573 | DEFECT ANALYSIS SYSTEM FOR ERROR IMPACT REDUCTION - An apparatus includes a network interface, memory, and a processor. The processor is coupled with the network interface and memory. The processor is configured to analyze a first set of data associated with a plurality of data sources. Analyzing the first set of data associated with the plurality of data sources determines a plurality of relationships among the first set of data. The processor is configured to store indications of the plurality of relationships among the first set of data. An indication of a relationship indicates a possible software defect. The processor is configured to generate rules based, at least in part, on the first set of data associated with a plurality of data sources. A rule indicates a possible software defect. | 07-17-2014 |
20140316860 | COMMON CONDITIONS FOR PAST PROJECTS AS EVIDENCE FOR SUCCESS CAUSES - A processor-implemented method, system, and/or computer program product identifies a cause of a level of success in multiple projects from a set of past projects. Multiple artifacts describe conditions associated with each project from a set of past projects, where a cause for a level of success in the past projects is initially unknown. Logic identifies a set of common artifacts in multiple projects from the set of past projects, where the set of common artifacts describes common conditions that are common to all of the multiple projects. Additional logic identifies a level of success experienced by each of the multiple projects. In response to a particular set of projects having a same level of success, common conditions identified by the set of common artifacts are identified as the cause for the same level of success experienced by all of the projects in the particular set of projects. | 10-23-2014 |
20140379796 | MANAGING PAST ACTIVITIES BASED ON RELATIONSHIP CHANGES IN A SOCIAL NETWORK - Various embodiments provide for dynamically and automatically managing activities of two parties (e.g., friends, business associates, family members) based on a change in relationship (e.g., no longer friends, break-up, divorce, no longer working together) between the two parties in a network (e.g., a social network implemented using a social networking website). In one specific example, mechanisms are provided for dynamically and automatically adjusting privacy control (e.g. removing, hiding, scraping, deleting, obscuring) of past activity data (e.g. social network wall posts, social network wall re-posts, pictures, forum posts, blog posts, blog comments, documents, files, videos, tags etc.) of the two parties upon detecting a change in relationship between the two parties in the social network. | 12-25-2014 |
20150019200 | SOCIALLY DERIVED TRANSLATION PROFILES TO ENHANCE TRANSLATION QUALITY OF SOCIAL CONTENT USING A MACHINE TRANSLATION - The present disclosure relates generally to the field of socially derived translation profiles to enhance translation quality of social content using a machine translation. In various embodiments, methodologies may be provided that automatically use socially derived translation profiles to enhance translation quality of social content using a machine translation. | 01-15-2015 |
20150035835 | ENHANCED VIDEO DESCRIPTION - A method includes a computer creating scene description templates; the computer creating people profiles; analyzing video frames of a video to identify visual elements containing scenes and people; generating timelines for the identified visual elements; matching the identified visual elements with the scene description templates and the people profiles; and combining the matched identified visual elements and the timelines into the video. | 02-05-2015 |
20150039567 | PROTECTING STORAGE DATA DURING SYSTEM MIGRATION - Provided are techniques for determining whether a character code point value of a first plurality of character code point values corresponds to a second character code point value from a second plurality of character code point values, first value associated with a first encoding version and the second value associated with a second encoding. In response to the first value does not corresponding to any of the second character code point values, a determination is made as to whether the value corresponds to a third character code point value of a third plurality of code point values stored in a character value record table (CVRT). In response the value corresponding to the third value, an entry in the CVRT that associates the character with the third value is made; and the character is stored in conjunction with an application associated with the second encoding using the third value. | 02-05-2015 |
20150039569 | PROTECTING STORAGE DATA DURING SYSTEM MIGRATION - Provided are techniques for determining whether a character code point value of a first plurality of character code point values corresponds to a second character code point value from a second plurality of character code point values, first value associated with a first encoding version and the second value associated with a second encoding. In response to the first value does not corresponding to any of the second character code point values, a determination is made as to whether the value corresponds to a third character code point value of a third plurality of code point values stored in a character value record table (CVRT). In response the value corresponding to the third value, an entry in the CVRT that associates the character with the third value is made; and the character is stored in conjunction with an application associated with the second encoding using the third value. | 02-05-2015 |