Patent application number | Description | Published |
20080215699 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MESSAGE MAPPING OF COMMUNICATIONS - A method, system, and computer program product for implementing message mapping of communications is provided. The method includes receiving a communication and a time-stamp of the communication from a messaging system of an originating terminal device and receiving a request to respond to the communication from a messaging system at a recipient terminal device. The request includes a first response and a first selected portion of the communication to which the first response is directed. The method also includes generating an index that defines parameters of the first selected portion in context with the communication and generating a responsive communication that includes the first response and the index. The index is operable for communicating the parameters of the first selected portion to the originating terminal device. The method further includes mapping the responsive communication to the communication via the time-stamp. | 09-04-2008 |
20080243852 | System and Methods for Enabling Collaboration in Online Enterprise Applications - A method for enabling collaboration in online enterprise applications includes, during development of the online enterprise application, selecting at least one webpage to be in wiki format; creating an access control list for the at least one webpage; and selecting at least one control for the at least one webpage. The at least one webpage may be edited directly within the online enterprise application. A system for enabling collaboration in online enterprise applications includes an agent for allowing selection and setup of at least one webpage in wiki format during development of an online enterprise application and a database for storing editable content of the at least one webpage in wiki format. | 10-02-2008 |
20080281785 | METHOD AND SYSTEM FOR REMOTE BINDING OF META-CONTENT TO A UNIFORM RESOURCE IDENTIFIER - A method and system for remote binding of meta-content to a uniform resource indicator are provided. The method includes providing a script to a web browser application in response to the web browser, application accessing the uniform resource identifier of a content provider system and requesting an asset therefrom. The script is generated by a remote server system and is provided to the web browser application by routing the web browser application from the content provider system to the remote server system. The method also includes receiving a call from the web browser application at the remote server system via the script. The call includes the uniform resource identifier of the content provider system. Using the uniform resource identifier, the remote server system queries a data source to determine whether meta-content for the asset is available. Upon determining the meta-content is available for the asset, the method includes returning the meta-content to the web browser application for interpretation. | 11-13-2008 |
20120030238 | AUTOMATICALLY IDENTIFYING PERSONALIZED SUPPORT - Embodiments of the present invention leverage information of the end-user and personal annotations/tags attached to resources and/or support related thereto (e.g., people, documents, etc.) to provide personalized support. Among other things, these embodiments allow for the mapping of expert “system”-based support to social technology to enable dynamic, localized support. In a typical embodiment, the system will analyze a profile of a user, as well as tags the user has attached to requested computer resources. Based on the profile and the tags, individualized support can be provided automatically. | 02-02-2012 |
20120110143 | DIFFERENTIATING IMAGE FILES IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon. | 05-03-2012 |
20120180040 | TECHNIQUES FOR PERSONALIZING FEED CONTENT IN VIRTUALIZED COMPUTING ENVIRONMENTS - A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata. | 07-12-2012 |
20120311135 | AUTOMATED RECOMMENDATIONS FOR CLOUD-COMPUTING OPTIONS - Systems, computer storage devices, and methods receive a request from a first user. The first user has at least one instance running within a cloud-computing environment. The systems, computer storage devices, and methods automatically analyze the first user instance to produce first user instance characteristics, and automatically analyze characteristics of other user instances running within the cloud-computing environment. Other users, who are different from the first user, operate the other user instances. The systems, computer storage devices, and methods automatically match the first user instance to instances of the other user instances by determining which of the other user instances have the same characteristics as the first user instance characteristics. The systems, computer storage devices, and methods automatically identify cloud-computing options selected by such other users that operate the matching instances that are related to the request. The systems, computer storage devices, and methods then automatically make recommendations to the first user using the computing devices. | 12-06-2012 |
20120311156 | Autoconfiguration of a Cloud Instance Based on Contextual Parameters - An embodiment of the invention provides a method and system for autoconfiguring a cloud instance based on contextual parameters. More specifically, an interface receives a request for a resource from a user; and, an analysis module connected to the interface examines parameters of the resource. The parameters of the resource include an encryption parameter and a language parameter. The analysis module also examines properties of the request, including a location of the user, at least one rule at the location of the user, and a dominant language at the location of the user. A processor connected to the analysis module determines whether the encryption parameter of the resource violates the rule at the location of the user. An instance generator connected to the processor creates a customized instance of the resource when the encryption parameter of the resource violates the rule at the location of the user. | 12-06-2012 |
20130036217 | NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center. | 02-07-2013 |
20130073716 | DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center. | 03-21-2013 |
20130080543 | ELECTRONIC MESSAGE MONITORING - A tool for preventing incorrect addressing of an electronic message. The tool analyzes incoming and outgoing electronic messages for indications that the user previously sent a message to a recipient mistakenly. The tool flags the recipient as potentially incorrect for future electronic messages. When selecting a recipient from a list, flagged recipient IDs display lower than other recipient IDs. The tool may require verification if a flagged recipient ID is selected. | 03-28-2013 |
20130101107 | TELECONFERENCE PRESENTATION RETRIEVAL MANAGEMENT - A system, method and program product for delivering to an invitee of a teleconference an electronic file attached to or referenced by a meeting notice for the teleconference. The teleconference hosted by a server computer, the invitee has a telephone to call-in to the teleconference via a telephone connection, and an invitee computer downloads the electronic file from the server computer via a first network in response to selection by the invitee of a representation of the electronic file from the meeting notice. The server computer receives a notification that a predetermined combination of keys has been pressed by the invitee on the telephone. In response, the server computer determines an e-mail address or instant message address for the invitee. The server computer attaches and sends the electronic file to an e-mail or instant message with the attached electronic file to the e-mail address or instant message address. | 04-25-2013 |
20130103823 | EVENT PREDICTION AND PREEMPTIVE ACTION IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold). | 04-25-2013 |
20130124809 | DISTRIBUTING DATA AMONG DATA STORAGE PARTITIONS BASED ON A FORECASTED DEMAND IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to forecast a potential demand for partitioned/sharded data and to distribute the data among a set of data partitions based on forecasted demand to optimize network characteristics (e.g., network bandwidth) and/or expedite data retrieval. For example, the data may be distributed among the partitions based on a quantity of trends/requests/hits on the data, so that requests for the data can be balanced among the partitions geographically. | 05-16-2013 |
20130125009 | REMOTE DESKTOP LOCALIZED CONTENT SHARING - Illustrative embodiments disclose managing content displayed in a remote data processing system by identifying a set of links displayed in the content of the remote data processing system during a desktop sharing session between a local data processing system and the remote data processing system. The local data processing system obtains information about the set of links identified. Responsive to a selection of a link in the set of links displayed on the remote data processing system during the desktop sharing session, the local data processing system retrieving content using the link on the local data processing system using the information obtained about the set of links. | 05-16-2013 |
20130132556 | PROVIDING STATUS INFORMATION FOR VIRTUAL RESOURCE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for an image provider to specify data (e.g., commands to run, files to read), etc., about an image of a virtual resource (e.g., virtual machine, etc.) in a networked computing environment (e.g., a cloud computing environment). Such data may be used (e.g., at runtime) by a client application to obtain specific information about a running instance that is provisioned based on the image (e.g., operating system health, middleware health, etc.). | 05-23-2013 |
20130145304 | CONFIRMING INPUT INTENT USING EYE TRACKING - A tool for detecting potential unintentional user input. Eye tracking technology is used to keep a record of where on a display a user is looking or if the user is even looking at the display. When input, such as a mouse selection or a tap on a touch screen, is received, the location of the selection is compared to a location of the user's gaze around when the selection was made. If the gaze location is outside of an acceptable range from the selection location, it is determined that the selection may have been in error and the selection is disregarded or a confirmation is requested of the user. | 06-06-2013 |
20130151629 | PRE-TRANSMISSION CONTEXTUAL ELECTRONIC MESSAGE PROMPTING - Embodiments of the present invention provide a system, method, and program product to provide to a user creating an electronic message one or more informational messages related to the content and addressees of the electronic message. A computer system identifies one or more addressees of the electronic message created by the user. The computer system identifies any informational messages associated with each of the addressees, and displays to the user the identified informational messages. Each step is performed prior to the computer system transmitting the electronic message for delivery to any addressee. The informational messages can be predefined by the addressees of the electronic message and include hyperlinks and other programmable elements for execution by the user. The electronic message can be an e-mail, instant message, or other form of electronic message. | 06-13-2013 |
20130151935 | GENERATING AN ELECTRONIC FORM LOCALLY ON A CLIENT COMPUTER FROM INPUT PARAMETERS - A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form. | 06-13-2013 |
20130173781 | ACTIVITY-BASED VIRTUAL MACHINE AVAILABILITY IN A NETWORKED COMPUTING ENVIRONMENT - An approach for activity-based virtual machine (VM) availability in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a system provided under the present approach monitors and logs network traffic and performs network packet inspections. Based on the contents of the network packets, the system may determine which applications/processes on particular VMs that are associated with the traffic. Users of this system may configure rules and thresholds. Regardless, if an availability threshold is not met as compared to a volume of network traffic, certain network traffic disablement actions can be taken. Users may also configure those conditions that will result in re-enablement of the network and/or processes that were disabled. | 07-04-2013 |
20130174168 | POLICY-BASED SCALING OF COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy. | 07-04-2013 |
20130184982 | GENERATING ROUTES - A method, data processing system and computer program product for generating a route. A beginning location is received. A set of preferences for generating a set of routes is received. A set of routes is generated based upon the set of preferences, wherein each route in the set of routes starts and ends at the beginning location, and wherein at least a portion of a specified route in the set of routes does not overlap any other portion of the specified route in the set of routes. | 07-18-2013 |
20130185363 | Selective Display of Past Instant Messages - A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant. | 07-18-2013 |
20130191923 | SOFTWARE LICENSE MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated. | 07-25-2013 |
20130205218 | EVENT TRIGGERED VIEWING - In a method for viewing an event, a computer registers agents such that each agent is communicatively coupled to each other agent. Each agent is associated with a graphical user interface (GUI) session. The computer monitors a first graphical user interface (GUI) session that includes contents viewable on a display device coupled to the computer. The first agent receives, from a second agent, monitoring data associated with a second GUI session. The second GUI session includes contents hidden from view on the display device. The first agent detects an event associated with the second GUI session. In response, the computer displays, on the display device, the event within the contents of the first GUI session. | 08-08-2013 |
20130212276 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 08-15-2013 |
20130218922 | LOCATING PREVIOUSLY COMMUNICATED ELECTRONIC MESSAGES - Embodiments of the present invention provide an approach for locating previously communicated electronic messages (e.g., emails, etc.). Specifically, the system will receive a request to locate/retrieve a previously communicated electronic message (“message”). The request can be issued by a sender or a recipient of the message. In any event, the request will include a set (one or more) of characteristics pertaining to the message such as a set of recipients thereof. One or more electronic messaging databases will then be searched based on the set of recipients and the message located. Once located, an alert will be sent to the requester and/or other message parties. The alert will indicate the message that was located. If the alert is validated (e.g., the message was the correct message), the message will be displayed. | 08-22-2013 |
20130227525 | Delivery of Changesets by Environment - A method for allowing selective delivery of changesets by environment includes selecting at least one value in software code of a software program; specifying at least one environment for the selected at least one value; compiling the software code in each specified at least one environment; delivering the software code to a central repository; determining how the specified at least one environment is defined; and choosing at least one environment to build against, thereby ensuring that only software code for the chosen environment is pulled from the central repository. | 08-29-2013 |
20130238713 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 09-12-2013 |
20130247022 | IDENTIFYING OPTIMAL UPGRADE SCENARIOS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested. | 09-19-2013 |
20130251125 | MANAGING MULTIPLE PASSCODES RELATED TO A SINGLE CALL-IN NUMBER USED BY A PHONE DEVICE - An embodiment of the invention is used with a conference calling system that includes a plurality of client phones, and a conference call center. Passcodes are entered into a list contained in a given client phone, wherein all listed passcodes are associated with a specified phone number that can be used to establish a connection between the given client phone and the conference call center. The specified phone number is used at the given client phone to access the passcode list. A passcode is selected from the list for transmission from the given client phone to the conference call center, over the phone connection established using the specified phone number. In response to receiving the selected passcode at the conference call center, the conference call center is operated to connect the given client phone into a conference call with one or more other client phones. | 09-26-2013 |
20130254681 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130254682 | PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER - Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session. | 09-26-2013 |
20130275521 | MESSAGING CLIENT-BASED REMINDERS - Implementing messaging client-based reminders includes monitoring, via a computer processor, a communication exchange for a communication session and determining an occurrence of an alarm event from contents of the communication exchange in response to the monitoring. Upon determining the occurrence of the alarm event, a reminder is generated and a timer is set indicating a time value corresponding to a time expression in the communication exchange. Upon expiration of the timer, the reminder is transmitted. | 10-17-2013 |
20130275523 | MESSAGING CLIENT-BASED REMINDERS - Implementing messaging client-based reminders includes monitoring, via a computer processor, a communication exchange for a communication session and determining an occurrence of an alarm event from contents of the communication exchange in response to the monitoring. Upon determining the occurrence of the alarm event, a reminder is generated and a timer is set indicating a time value corresponding to a time expression in the communication exchange. Upon expiration of the timer, the reminder is transmitted. | 10-17-2013 |
20130304788 | APPLICATION COMPONENT DECOMPOSITION AND DEPLOYMENT - A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns. | 11-14-2013 |
20130308764 | ADDING A TELECONFERENCE CALLER TO A GROUP INSTANT MESSAGING CHAT - In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat. | 11-21-2013 |
20130311497 | GROUP BOOKMARKS - Group bookmarks are provided. A uniform resource locator (URL) is received and parsed to identify a URL domain, a parameter, and a first parameter value. Multiple bookmarks are examined to determine whether a pattern match is found for a bookmark including the URL domain and the parameter. The bookmark has a second parameter value. The first parameter value is stored with the bookmark as a group bookmark. The group bookmark includes: the URL domain, the parameter, and entries for the first parameter value and the second parameter value. | 11-21-2013 |
20130311869 | GROUP BOOKMARKS - Group bookmarks are provided. A uniform resource locator (URL) is received and parsed to identify a URL domain, a parameter, and a first parameter value. Multiple bookmarks are examined to determine whether a pattern match is found for a bookmark including the URL domain and the parameter. The bookmark has a second parameter value. The first parameter value is stored with the bookmark as a group bookmark. The group bookmark includes: the URL domain, the parameter, and entries for the first parameter value and the second parameter value. | 11-21-2013 |
20130318447 | Prompting of Recipient Expertise in Collaboration Environment - A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface. | 11-28-2013 |
20130346243 | TRANSACTION MANAGEMENT BASED ON INDIVIDUAL ORDERS OR NUMBER OF DEVICES AT TABLE FOR DESIRED DISTRIBUTION - A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations. | 12-26-2013 |
20140025653 | Source Control Inheritance Locking - An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process. | 01-23-2014 |
20140026116 | SOURCE CONTROL EXECUTION PATH LOCKING - An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user. | 01-23-2014 |
20140026117 | Source Control Execution Path Locking - An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user. | 01-23-2014 |
20140026119 | INTEGRATED DEVELOPMENT ENVIRONMENT-BASED WORKLOAD TESTING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an integrated development environment (IDE)-based approach for testing development projects (e.g., comprising one or more intended workloads). In a typical embodiment, a designation of a project (e.g. having a set of workloads) for testing on a network resource group is received via a user interface associated with an IDE. A current server instance in the network resource group having a highest availability for testing the project may then be identified (e.g., based on an analysis of various computing/cost characteristics). The project may then be deployed to the current server instance, and a network address corresponding to the current server instance may be associated with the project in a computer storage device. The project may then be tested by processing the set of intended workloads using the current server instance. | 01-23-2014 |
20140068075 | OPTIMIZING SERVICE FACTORS FOR COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - An approach is provided for optimizing service factors for computing resources in a networked computing environment. Specifically, under one approach, a cloud broker/aggregator, a cloud offering optimizer, and a user workload optimizer may be provided. The cloud aggregator may aggregate information/data pertaining to a set of service factors associated with a set of resources distributed among a set of deployment groups (e.g., cloud pods). The cloud offering optimizer may analyze this information and may determine a reallocation plan to optimize values of the service factors associated with the set of resources. The user workload optimizer may then receive the reallocation plan from the cloud offering optimizer and/or application event information, and modify the deployment topology accordingly. | 03-06-2014 |
20140081693 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein are a computer-implemented method, computer program and system to invite one or more people to a meeting. The method includes, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people, such as in one or both of a database and a social network space, in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list of located identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140082000 | SYSTEM AND METHOD CONFIGURED TO AUTOMATICALLY INVITE PARTICIPANTS TO A MEETING BASED ON RELATION TO MEETING MATERIALS - Disclosed herein in part is a data processing system configured to invite one or more people to a meeting. The data processing system includes at least one data processor connected with at least one memory storing computer program code. Execution of the computer program code by the at least one data processor results in operations being performed that include, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list comprising identified people, the list being a list of people who are suggested to the user to be invited to the meeting. | 03-20-2014 |
20140164446 | SHARING ELECTRONIC FILE METADATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like. | 06-12-2014 |
20140164510 | RESCHEDULING UNFINISHED MEETING AGENDA TOPICS - Rescheduling unfinished meeting agenda topics includes detecting an unfinished meeting agenda topic at a conclusion of a meeting and rescheduling with a meeting management engine the unfinished meeting agenda topic to be addressed in a later meeting. | 06-12-2014 |
20140189865 | SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level. | 07-03-2014 |
20140201345 | MANAGING USER PRIVILEGES FOR COMPUTER RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided. | 07-17-2014 |
20140208444 | SYSTEM AND METHOD FOR TEMPORARY OBFUSCATION DURING COLLABORATIVE COMMUNICATIONS - Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device. | 07-24-2014 |
20140208445 | SYSTEM AND METHOD FOR TEMPORARY OBFUSCATION DURING COLLABORATIVE COMMUNICATIONS - Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device. | 07-24-2014 |
20140215436 | MANAGING CHANGE-SET DELIVERY - An approach that analyzes and manages unresolved (i.e., pending, outgoing) change-sets is provided. Specifically, this approach parses the change-set into a plurality (i.e., one or more) of changes to determine the impact each change may have. An alert may be provided to the user indicating whether the change-set should be checked-in based on the determined impact. Specifically, a change-set management tool provides this capability. The change-set management tool includes a parsing module configured to receive an outgoing change-set; and parse the change-set into a plurality of changes. The change-set management tool further comprises an evaluation module configured to evaluate an impact that each of the plurality of changes within the change-set has on other changes of the plurality of changes within the change-set. | 07-31-2014 |
20140245394 | TRUST-BASED COMPUTING RESOURCE AUTHORIZATION IN A NETWORKED COMPUTING ENVIRONMENT - A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources). | 08-28-2014 |
20140297760 | MANAGING E-MAIL MESSAGES BETWEEN RELATED ACCOUNTS - In a method for managing e-mail messages between related e-mail accounts, an e-mail message is received from a first e-mail account of a user. It is determined that the e-mail message should be listed as a sent e-mail message in a second e-mail account of the user. The e-mail message is listed as a sent e-mail message in the second e-mail account. | 10-02-2014 |
20140317263 | IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration. | 10-23-2014 |
20140325077 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 10-30-2014 |
20140330782 | REPLICATION OF CONTENT TO ONE OR MORE SERVERS - An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties. | 11-06-2014 |
20140330975 | ENHANCED COMMAND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource. | 11-06-2014 |
20140359110 | AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted. | 12-04-2014 |
20150019271 | ESTIMATING WAIT TIME FOR AN ESTABLISHMENT - A computer collects resource reservation history for a resource for a plurality of reservation time blocks. The computer collects resource reservation wait time history for the resource for each reservation time block. The computer determines a number of patrons that utilized the resource during each reservation time block and creates a resource reservation wait time model. The computer receives a request for a resource reservation wait time estimate for a first reservation time block and collects a first plurality of social media content. The computer determines an estimated number of patrons that intend to utilize the resource during the first reservation time block based on at least the first plurality of social media content. The computer determines a first estimated wait time for the first reservation time block by comparing at least the estimated number of patrons to the resource reservation wait time model. | 01-15-2015 |
20150058127 | DIRECTIONAL VEHICULAR ADVERTISEMENTS - Directional vehicular advertisements displayed on a vehicle. A system in accordance with an embodiment includes: a location system for determining a location and a direction of travel of a vehicle; at least one forward facing advertisement slot on the vehicle, wherein each forward facing advertisement slot faces oncoming traffic travelling in a direction opposite to the direction of travel of the vehicle; a plurality of advertisements, each advertisement associated with a location; and a controller configured to select and display at least one of the advertisements via at least one of the forward facing advertisement slots, wherein each displayed advertisement is associated with a location that the oncoming traffic has yet to pass. | 02-26-2015 |
20150074211 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING PREVIOUSLY IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 03-12-2015 |
20150077419 | VISUALIZATION OF DATA RELATED TO UNSTRUCTURED TEXT - In a method for visualizing data related to unstructured text, a computer identifies at least two data points in a portion of unstructured text of a document, a relationship between the at least two data points, and a label for each of the at least two data points. The computer determines a type of graph to create based on the identified data. The computer causes the at least two data points and the label for each of the at least two data points, and the relationship between the at least two data points to be visualized on a graph. The computer causes a modified graph based on the received instructions to be visualized. The computer causes the modified graph to be displayed in the document having the unstructured text. | 03-19-2015 |