Patent application number | Description | Published |
20080244594 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-02-2008 |
20080253546 | Telephone Conference Call Management - Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise. | 10-16-2008 |
20080275951 | INTEGRATED LOGGING FOR REMOTE SCRIPT EXECUTION - An integrated logging system includes a client-side logging component and a server-side logging component. The client-side logging component possesses the capability of logging client-side activity information, such as may relate to the execution of a script or other suitable client-side code that is controlled and executed independently of a remote server associated with the server-side logging component. The client-side logging component may also communicate logged activity information back to the corresponding server-side logging component. Messages including logged client-side activity information are received from the client-side logging component by the server-side logging component, and the logged activity information is integrated into the server-side log(s) of a server-side logging system. Thus, activity information from an independently controlled and operated processing device, which may be used, for example for problem determination, is integrated from sources that are distributed between systems. | 11-06-2008 |
20080320007 | EDGE DEPLOYED DATABASE PROXY DRIVER - An edge-deployed database proxy. A database access system which has been configured with the database proxy can include a universal database connectivity driver having a first exposed interface through which access to a database server can be provided; a database proxy driver registered with the universal database connectivity driver; and, a database driven application programmatically linked to the database proxy driver. Significantly, the database proxy driver can have a second exposed interface which conforms with the first exposed interface of the universal database connectivity driver. The database proxy driver further can have a configuration for invoking at least one auxiliary task in addition to providing access to the database server through the first exposed interface of the universal database connectivity driver. | 12-25-2008 |
20090037542 | METHOD AND SYSTEM FOR IMPROVING EFFICIENCY OF EMAIL FORWARDING BY REMOVING DUPLICATION - In a method and system for removing email forwarding duplication, when an email was sent for the first time, the email was assigned a unique identifier. An aggregate recipient list was created and associated with the unique identifier. When the email is to be forwarded, the aggregate recipient list has recipients previously forwarded the email. The recipient list of the forwarding email is compared with the aggregate recipient list. If duplicate email addresses are found, the duplicate email addresses are displayed to a sender of the forwarding email. If the sender chooses not to send the forwarding email to the duplicate email addresses, the duplicate email addresses are removed from the recipient list of the forwarding email. New recipients of the forwarding email are added to the aggregate recipient list. The forwarding email with the unique identifier is sent to the recipient list. | 02-05-2009 |
20090055234 | SYSTEM AND METHODS FOR SCHEDULING MEETINGS BY MATCHING A MEETING PROFILE WITH VIRTUAL RESOURCES - A system for scheduling meetings by matching a scheduler-defined meeting profile against a pool of virtual resources is provided. The system includes an electronic data storage comprising data defining a set of virtual resources, at least one property being associated with each resource. The system also includes a meeting profiler module that is configured to define a meeting profile which specifies one or more resources required for a meeting based upon received user input. The system further includes a profile-resource matching module that searches the data of the electronic data storage and matches elements of the set of virtual resources to the one or more resources required for the meeting defined by the meeting profiler module, and, based thereon, automatically generates at least one meeting schedule candidate. | 02-26-2009 |
20090063961 | TYPE-AHEAD HINTS WITH DYNAMICALLY CONFIGURABLE USER PREFERENCES - An improved solution for dynamically configurable user preferences in a type-ahead hint system is provided. In an embodiment of the invention, a method for providing type-ahead hints includes: receiving an input string; providing a configurable preference interface; obtaining a preference from the interface; and generating at least one type-ahead hint, based upon the input string and the preference. | 03-05-2009 |
20090094616 | Comparing Middleware Configurations - A system and method for comparing middleware configurations on a plurality of data processing systems. A comparison manager organizes a first set of configuration objects into a first representative tree structure and a second set of configuration objects into a second representative tree structure. The comparison manager uniquely identifies (utilizing a key value) each configuration object in the first and second set of configuration objects. If at least two configuration objects have matching key values, the comparison manager compares the property values of the at least two configuration objects. The comparison manager then outputs the result of the comparison. | 04-09-2009 |
20090094623 | SYSTEM AND METHOD FOR PROGRAMMATICALLY GENERATING TO-DO LIST AND CREATING NOTIFICATION BETWEEN CALENDAR AND OTHER APPLICATIONS - A method, apparatus, and program product are provided for integrating a calendar todo list with information from other applications. The method comprises the steps of: dynamically extracting data for open application processes, and creating task listings using the data for the open application processes. The apparatus comprises a processor adapted to dynamically extract data for open processes and create task listings using the data for the open application processes, and a memory having stored thereon a calendar application with a list of tasks. The program product comprises a machine readable media having encoded thereon, machine executable instructions for dynamically extracting data for open application processes, and creating task listings using the data for the open application processes. | 04-09-2009 |
20090113383 | SYSTEM AND METHOD OF USING CUSTOMIZABLE TEMPLATES TO RETRIEVE AND DISPLAY A SYSTEM CONFIGURATION TOPOLOGY GRAPH - A method, system, and computer program product for implementing a customizable visual configuration (VC) template to retrieve and display a working set of system configuration objects. The computer-implementable method includes selecting a current system configuration object. Once a system configuration object is selected, a VC utility examines all available VC templates. The VC utility displays available VC templates whose starting configuration object matches the selected current system configuration object. In response to a selected VC template, the VC utility retrieves and displays system configuration objects defined by the selected VC template. | 04-30-2009 |
20090150397 | METHOD OF TAGGING INSTANT MESSAGING (IM) CONVERSATIONS FOR EASY INFORMATION SHARING - A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection. | 06-11-2009 |
20090171937 | System and Method for Solving Ambiguous Meanings of Unknown Words Used in Instant Messaging - A system and method for identifying an unknown word's likely definition based upon a common social networking group is presented. A user receives a message and selects an unknown word in the message. In turn, the recipient client identifies a common social networking group between the sending client and the recipient client. The recipient client then uses the common social networking group to identify the unknown word's definitions using one or more unknown word repositories, such as the sending client unknown word repository, the recipient client unknown word repository, or a mutual client unknown word repository, which corresponds to a mutual client included in the common social networking group. Once the recipient client identifies the unknown word's definitions, the recipient client orders and displays the definitions based upon the common social networking group and social networking group frequency values. | 07-02-2009 |
20090249216 | INTERACTING WITH MULTIPLE BROWSERS SIMULTANEOUSLY USING LINKED BROWSERS CONTROLLED FROM A PRIMARY BROWSER INTERFACE - A Web application can be loaded into a set of different Web browsers. A set of user interactions directed to one of the Web browsers can be received. A state of that Web browser can be altered in accordance with each user interaction. For each received user interaction, an equivalent interaction data element can be conveyed to each of the other Web browsers. The equivalent interaction data element can emulates the received user interaction in context of the Web browser for which the equivalent interaction data is intended. A state of each of the other Web browsers can be altered in accordance with the equivalent interaction data that is received and processed by that Web browser. | 10-01-2009 |
20090287989 | PRESENTING TAG CLOUDS BASED ON USER INFORMATION - In some embodiments, a method comprises detecting a request to display a tag cloud, where the tag cloud includes a plurality of tags and the tags hyperlink to related web content. The method can also comprise determining a user's interests and preferences based on the information provided by the user. The method can include using the information to determine the tags relevant to the user's preferences and interests. The method can also include displaying the tags in the tag cloud. | 11-19-2009 |
20090300709 | AUTOMATED CORRECTION AND REPORTING FOR DYNAMIC WEB APPLICATIONS - Changes to dynamic web content are monitored for compliance with web content compliance rules. A noncompliant element associated with a change to the dynamic web content is identified based upon the web content compliance rules. Automated correction of the noncompliant element is performed based upon the web content compliance rules. The noncompliant element is reported to a server associated with the change to the dynamic web content. | 12-03-2009 |
20090313274 | Persona management system for communications - A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine coupled to the communication analyzer. The communication analyzer identifies an element of original content of a written communication and determines that the element of the original content of the written communication is incompatible with a selected persona style. The selected persona style defines a communication style. The modification engine modifies the original content of the written communication to replace the element of the original content with a substitute element that is compatible with the selected persona style. | 12-17-2009 |
20100011066 | CONTROLLING EMAIL DISTRIBUTION LISTS USING POLICIES - A policy can be established that is associated with an email distribution list. The policy can specify an extent that email addresses contained in the email distribution list are visible to recipients. An email message to be conveyed to at least the email distribution list can be identified. A set of recipient messages can be created from the identified email message—one recipient message for each of the recipients. The policy can be applied to each recipient message to determine an extent that email addresses contained in the email distribution list are visible to that recipient. Different ones of the recipient email messages can have different visibility regarding email addresses of members of the distribution list based upon the applied policy. | 01-14-2010 |
20110055177 | COLLABORATIVE CONTENT RETRIEVAL USING CALENDAR TASK LISTS - Calendar applications typically require users to enter information about unfinished tasks and notify users of the unfinished tasks by generating reminders at set times. Collaboration on shared content is not effective unless all collaborators are aware of a current status, a current version of the shared content, and modifications made to the shared content. Functionality can be implemented to link the calendar application to the shared content via an interface to enable the collaborators to store different versions of the shared content, access the shared content from any location via the calendar application, and receive notifications of the modifications made to the shared content. Moreover, the calendar application being used to control access to the shared content among the collaborators can also ensure collaboration without the need for configuring and using a version controlling system or collaborative servers. | 03-03-2011 |
20110107077 | OBSCURING FORM DATA THROUGH OBFUSCATION - Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string. | 05-05-2011 |
20110107190 | OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. | 05-05-2011 |
20110119338 | EMAIL COMPOSITION AND PROCESSING - A computer implemented user interface allows composition of an electronic mail message. A user selects at least one pre-existing email from an email inbox. An envelope is then created by parsing each of the selected pre-existing emails. The pre-existing email is displayed as a tree structure comprising an envelope with at least a label sub-node in a new email view. A new email is composed by selecting parts from the tree structure. The sub-nodes may further comprise a content sub-node. The content sub-node further comprises multi-media parts, and the new email body is composed by selecting parts from the content sub-node. | 05-19-2011 |
20110154247 | VIRTUAL CALENDAR - A calendar event may be created by creating a data entry field and defining the event with the field. A template may be used to create the field. The template may contain a plurality of entry fields that may be user configurable, such as with a wizard, or selected from a palette of fields. | 06-23-2011 |
20110161425 | Automatic Notification of Document Changes - Included are method, article of manufacture, and device that serve to identify one or more tracked categories in a document, the tracked category representing a portion of the document, identify a change in one or more of the tracked categories of the document, identify a client to notify of the change in the tracked category, and send a notification to a client, where the notification provides notice that a change has occurred in a tracked category of a document. | 06-30-2011 |
20110321147 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 12-29-2011 |
20120005275 | ACCELERATED MICRO BLOGGING USING CORRELATED HISTORY AND TARGETED ITEM ACTIONS - A computer implemented method correlates a digital resource with an electronic message. A processor detects a focus on a targeted item that identifies a digital resource. The targeted item is in a user history that presents a history of a user's access to multiple digital resources. The processor then auto-populates a draft of an electronic message with the targeted item that was focused in the user history. | 01-05-2012 |
20120167227 | OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. | 06-28-2012 |
20120246710 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 09-27-2012 |
20120260254 | VISUAL SCRIPTING OF WEB SERVICES FOR TASK AUTOMATION - Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated. | 10-11-2012 |
20120331125 | Resource Use Management System - A method and apparatus for managing resources is provided. Responsive to a request for a set of resources by a user, a token is added to a response to the request generated by a server application. The requests are monitored from the user. The token identifies the user. A pattern of use by the user is identified. A determination is made as to whether overuse of the set of resources has occurred based on the pattern of use and a policy. | 12-27-2012 |
20130007125 | INFORMATION EXCHANGE IN THE SOCIAL NETWORK ENVIRONMENT - A method for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest. | 01-03-2013 |
20130007141 | INFORMATION EXCHANGE IN THE SOCIAL NETWORK ENVIRONMENT - A method, system and computer program product for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest. | 01-03-2013 |
20130007656 | CONTENT AND WINDOW OVERLAY AND CONFIGURATION - Some embodiments of the inventive subject matter are directed to selecting an area of a first window, which contains first content, in response to user input, generating a second window that contains second content that is substantially similar to a portion of the first content contained within the area of the first window, and superimposing the second window over a target window. The target window can be the first window or a third window. Some embodiments are further directed to affixing the second window to remain stationary and above the target window when the target window is active or in focus. Some embodiments are further directed to modifying target content in the target window in response to the activation of the second content (e.g., sorting target content based on activation of a sorting control within the second window, modifying number values in the target window based on number values of the second content, etc.). | 01-03-2013 |
20130007746 | Working sets of sub-application programs of application programs currently running on computing system - A pattern corresponds to a task that a computing system can perform. The pattern at least indirectly identifies one or more sub-application programs of one or more application programs that the computing system can run and that are relevant to the task. Application of the pattern to sub-application programs of application programs currently running on the computing system identifies a working set of one or more sub-application programs of one or more application programs currently running on the computing system and that are relevant to the task. The computing system hides, within a graphical user interface that the computing system presents, the sub-application programs of the application programs currently running on the computing system that are not part of the working set, and the application programs currently running on the computing system that do not include any sub-application program that is part of the working set. | 01-03-2013 |
20130067302 | INTEGRATING A CALENDARING SYSTEM WITH A MASHUP PAGE CONTAINING WIDGETS TO PROVIDE INFORMATION REGARDING THE CALENDARED EVENT - A method, system and computer program product for integrating a calendaring system with a mashup page. A mashup server accesses the calendar data inputted by a user to create or edit an entry in a calendar application. The mashup server provides the user access to widgets to be included on a mashup page, where the widgets use the accessed calendar information so that the widgets provide information to the recipients of the calendared event. In this manner, the widgets provide information that normally would be accessible by the participants via links to a myriad of disjoint applications thereby negating the fractured experience of the participants. Upon finalizing the mashup page, the mashup page is saved as a Uniform Resource Location (URL) in the created/edited calendar entry. The mashup page is later transmitted by the mashup server to the recipients of the calendar entry. | 03-14-2013 |
20140059112 | AUTOMATED CORRECTION AND REPORTING FOR DYNAMIC WEB APPLICATIONS - A run-time application-generated change to dynamic web content, generated during an application run-time by a dynamic web application, is detected in response to user run-time interactions with the dynamic web content rendered by the dynamic web application that changed the dynamic web content during the run-time. The detected run-time application-generated change to the dynamic web content is parsed. The parsed run-time application-generated change to the dynamic web content is compared with web content compliance rules that define specifications for web content representation. A noncompliant element associated with the parsed run-time application-generated change is identified based upon the comparison with the web content compliance rules. A run-time correction of the identified noncompliant element within the dynamic web content changed by the dynamic web application is performed to cause the identified noncompliant element to comply with the web content compliance rules. | 02-27-2014 |
20140222816 | FEEDBACK ANALYSIS FOR CONTENT IMPROVEMENT TASKS - Provided are a method, computer program product, and system for improving content. Feedback related to the content is received from a reviewer. The feedback is analyzed with text analytics and classified by on the feedback analysis. A reviewer score is generated and a task is generated for reviewing the feedback wherein the task includes the feedback classification and the reviewer score. | 08-07-2014 |
20140304023 | EXTENDING CALENDAR SYSTEM TO EXECUTE DISCOVERABLE TASKS PRIOR TO THE MEETING - There are provided a method, a system and a computer program product for managing an on-line meeting. The system determines one or more tasks to prepare for the on-line meeting. The system calculates a time period that takes in order to complete the one or more tasks before the on-line meeting starts. The system runs the one or more tasks the calculated time period ahead before the on-line meeting starts. | 10-09-2014 |
20150032821 | ACTIVITY ANALYSIS FOR MONITORING AND UPDATING A PERSONAL PROFILE - Provided are techniques for activity analysis for monitoring and updating a personal profile. User activities are monitored to create a user activity log. The user activity log and a user profile are analyzed using one or more profile entity to activity mappings to identify one or more suggestions for updating the user profile. The one or more suggestions are provided to update the user profile. In response to acceptance of at least one of the suggestions, the user profile is updated. | 01-29-2015 |
20150032873 | ACTIVITY ANALYSIS FOR MONITORING AND UPDATING A PERSONAL PROFILE - Provided are techniques for activity analysis for monitoring and updating a personal profile. User activities are monitored to create a user activity log. The user activity log and a user profile are analyzed using one or more profile entity to activity mappings to identify one or more suggestions for updating the user profile. The one or more suggestions are provided to update the user profile. In response to acceptance of at least one of the suggestions, the user profile is updated. | 01-29-2015 |