Patent application number | Description | Published |
20090164934 | METHOD OF DISPLAYING TAB TITLES - A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width. If the number of tabs is greater than the maximum number of tabs is to be displayed, the method collapses some of the tabs in to a tab of tabs. | 06-25-2009 |
20100036767 | Reserving amount of payment from financial account balance - In response to a payor planning a specific payment for a given amount to a payee, the given amount is reserved from a balance of a financial account of the payor from which the specific payment is to be made. As such, the given amount reserved from the balance is only available for settling the specific payment and is otherwise unavailable. After the payor has planned the specific payment for the given amount to the payee, in response to the specific payment for the given amount actually being made to the payee, the given amount reserved from the balance of the financial account is used to settle the specific payment for the given amount being made to the payee. | 02-11-2010 |
20100054443 | Phone call screening - A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user. | 03-04-2010 |
20100274698 | Soft Limits for Credit Card Transactions - A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account. | 10-28-2010 |
20110264991 | Method and System for Management of Electronic Mail Communication - A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine. | 10-27-2011 |
20110320235 | COMPUTER CONTROLLED MEETINGS CALENDAR SCHEDULER BASED UPON IMPORTANCE OF MEETING ATTRIBUTES - An invitee who is receiving invitations to meetings, usually via telecommunication, is enabled to predetermine a set of invitee-specific attributes that will be applied to each invitation and to relate the attributes of the invitation to the specific needs of the invitee in the determination of whether the proposed meeting may be scheduled on the specific invitee's calendar. | 12-29-2011 |
20120016890 | ASSIGNING VISUAL CHARACTERISTICS TO RECORDS - Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records. | 01-19-2012 |
20120260246 | SOFTWARE APPLICATION INSTALLATION - Systems, methods and computer program products may provide software installation on a computer in a computer system. A software installation method may include installing at a server in a computer system a first files package including computer program files for a first software application, the computer system including at least a first computer installed with a first configuration package, the first configuration package including files necessary to configure and register the first software application, receiving a request at the server from the first computer for access to the first files package, and making the first files package available for use by the first computer. | 10-11-2012 |
20120323481 | NAVIGATING OUT OF A PARKING LOT - In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route. | 12-20-2012 |
20130007609 | CONSTRAINT BASED READING RECOMMENDATION - Systems, methods and computer program products may provide a constraint based reading recommendation on a computer. A method for generating a constraint based reading recommendation may include receiving an indication from a user indicating a desire to read a text item and determining a text item constraint including at least one of a time window constraint and an environmental constraint. The method may further include generating one or more approved text items in response to the text item constraint, the one or more approved text items including a recommended text item and displaying the recommended text item to the user. | 01-03-2013 |
20130054868 | IMAGE STORAGE OPTIMIZATION IN VIRTUAL ENVIRONMENTS - Method, system and computer program product for monitoring and managing virtual machine image storage in a virtualized computing environment, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image. | 02-28-2013 |
20130055108 | Managing an On-Line Conference Session - Embodiments of the invention relate to an on-line communication tool. A set of windows are employed to manage threads of communication. A first window maintains a list of threads available for discussion during the communication. A second window maintains a continuous log of the communication, and functions in a read-only mode. A third window maintains a read-write channel for a thread of the communication, and functions in a read-write mode. One or more threads may be selected from the first window, with each thread selection opening a separate third window. Text pertaining to a specific thread of the communication may be entered into the specific third window and populated to the continuous log of the second window. | 02-28-2013 |
20130055382 | Managing Access to Storage Media - Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user. | 02-28-2013 |
20130080399 | DYNAMICALLY REDIRECTING A FILE DESCRIPTOR - An apparatus for dynamically redirecting a file descriptor includes an identification module, a disassociation module, and an association module. The identification module identifies a first executing process using a second executing process. The first executing process may include a file descriptor and the first executing process may be independent of the second executing process. The disassociation module disassociates the file descriptor from a first data stream using the second executing process without involvement of the first executing process. The association module associates the file descriptor with a second data stream using the second executing process without involvement of the first executing process in response to the disassociation module disassociating the file descriptor from the first data stream. | 03-28-2013 |
20130081017 | DYNAMICALLY REDIRECTING A FILE DESCRIPTOR - The method includes identifying a first executing process using a second executing process. The first executing process may include a file descriptor and the first executing process may be independent of the second executing process. The method includes disassociating the file descriptor from a first data stream using the second executing process without involvement of the first executing process. The method includes associating the file descriptor with a second data stream using the second executing process without involvement of the first executing process in response to disassociating the file descriptor from the first data stream. | 03-28-2013 |
20130151888 | Avoiding A Ping-Pong Effect On Active-Passive Storage - A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback. | 06-13-2013 |
20140089557 | IMAGE STORAGE OPTIMIZATION IN VIRTUAL ENVIRONMENTS - A method for monitoring and managing virtual machine image storage in a virtualized computing environment is proposed, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image. | 03-27-2014 |
20140259008 | PERFORMING UNATTENDED SOFTWARE INSTALLATION - Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The systems and computer program products may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files. | 09-11-2014 |
20140259009 | PERFORMING UNATTENDED SOFTWARE INSTALLATION - Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files. | 09-11-2014 |