Patent application number | Description | Published |
20080219647 | Digital video recording device ticker playback system and method - The present invention is a system and method of controlling the playback of the event stream information of a particular television channel by a digital video recorder (DVR). The DVR is a computer system configured with a hard drive and video decoder/encoder devices. The hardware environment of DVR ( | 09-11-2008 |
20080260349 | Digital Video Recording System With Extended Program Content Recording - Systems, methods and media for managing extended program content for a digital video recorder (DVR) are disclosed. Embodiments of a method may include determining an amount of extended program content to record in addition to the program to be recorded, where the extended program content is associated with the program to be recorded. The extended content may include either or both of program pre-content or program post-content. The method may also include recording the determined amount of extended program content and the program to be recorded. In a further embodiment, the method may include receiving an indication that the user desires to view extended program content and playing at least part of the extended program content. Determining the amount of extended program content to record may be based on one or more of available storage space, a specified time, a specified file size, user preferences, or other factors. | 10-23-2008 |
20090033681 | Method and Apparatus for Consolidating Overlapping Map Markers - A computer implemented method, apparatus, and computer usable code for consolidating overlapping markers in a mapping application. The process identifies a plurality of points for display from data describing locations and associated data about locations. The process then determines whether displaying graphical indicators for a set of points in the plurality of points will result in graphical indicators overlapping each other. The process generates a consolidated marker for the set of points, in response to a determination that displaying graphical indicators for the set of points will result in graphical indicators overlapping each other. The process then associates a listing for the set of points with the consolidated marker. The listing comprises at least a portion of the associated data about locations for the plurality of points. | 02-05-2009 |
20090079766 | Method and Apparatus for Displaying Overlapping Markers - A computer implemented method, apparatus, and computer usable code for rendering graphical markers in a manner that avoids overlap of graphical markers on a map display. The process identifies a plurality of points for display from data describing locations and associated data about locations. The process determines whether displaying graphical markers for a set of points in the plurality of points will result in graphical markers overlapping each other. If the process determines that displaying graphical markers for the set of points will result in graphical markers overlapping each other, the process displays the graphical markers for the set of points in an arrangement that avoids overlap. Each graphical marker representing a point in the set of points does not overlap with any other marker associated with the map display when displayed in the arrangement that avoids overlap. | 03-26-2009 |
20120173327 | PROMOTING, DELIVERING AND SELLING INFORMATION TO INTRANET USERS - A method and system for managing targeted placement of content on an intranet. An ad server within the intranet collects statistics summarizing anonymized intranet user attributes and securely provides the statistics to a marketplace computer outside the intranet. The marketplace computer receives an ad, parameter values, and a bid from a publisher outside the intranet. The bid is based on the statistics. The ad server receives the ad, parameter values and bid and determines the ad is acceptable for placement on an intranet page. The ad server identifies intranet users to view the ad by matching the parameter values to user attributes retrieved from intranet data repositories that are not accessible to the publisher. The ad is placed on the intranet page displayed to the identified users. Clicks and/or impressions data associated with the ad are recorded and presented to the publisher. | 07-05-2012 |
20120179832 | MINIMIZING BANDWIDTH USAGE IN MULTIMEDIA STREAMING - A system and associated method for minimizing network traffic in playing a media stream with a media module running in a client computer system. The media stream is stored in a media content server. A video file of the media stream is processed to generate an audio file corresponding to the video file, such that the media module downloads and plays the audio file when the media module is invisible on a computer screen of the client computer system. When the media module becomes visible, the media module switches back to downloading and playing the video file. A current location is tracked by a location sync file stored in the media content server to synchronize the video file and the audio file. | 07-12-2012 |
20120311091 | DIGITAL RIGHTS PROTECTION THROUGH CONTENT EXPIRATION ENFORCEMENT - A method for controlling content distribution is implemented in a computer infrastructure and includes receiving a request for content from an end user computing device. The method also includes analyzing metadata embedded in the content to determine whether the content has expired. The method also includes serving the content to the end user computing device when content is not expired. The method also includes blocking the content from being served to the end user computing device when the content is expired | 12-06-2012 |
20130004139 | INCORPORATING A CURRENT EVENT DATA STREAM ONTO A PRE-RECORDED VIDEO STREAM FOR PLAYBACK - A method and system for incorporating a current event data stream from a television broadcasted video signal onto a pre-recorded video stream for playback on a television set. A first digital video stream, which includes television program content and a first event data stream, is retrieved. If it is ascertained that a current event is located in the current event data stream in the television broadcasted video signal, then the first event data stream is replaced with the current event data stream in the retrieved first digital video stream, and the television program content is played back concurrently with the current event data stream on the television set. If it is ascertained that the current event is not located in the current event data stream in the television broadcasted video signal, then the television program content in the retained first digital video stream is played back on the television set. | 01-03-2013 |
20130080952 | DATA RECOVERY - A data recovery method and system is provided. The method includes initializing and presenting by a processor, a computer generated presentation data. The processor monitors input cursor focus, a cursor, and data input from a user with respect to the computer generated presentation data. The data input is automatically stored within a specified memory unit. A portion of the data input is directed to an associated area in the computer generated presentation data. A focus change with respect to the cursor, the associated area, and the data input is detected and in response, a message a message indicating the focus change is presented to the user. The processor receives a command from the user in response to the message. | 03-28-2013 |
20130136246 | INITIATING A TELEPHONIC CONNECTION - A solution for initiating a telephonic connection is provided. A calling user can provide data identifying a receiving device and corresponding to a call message. In response to requesting initiation of the telephonic connection, the length of the call message can be determined, and a transmission solution for the call message can be selected based on the length. When the length is sufficiently short, the call message can be included in caller ID information for the telephonic connection. When the length is longer, the call message can be transmitted as a data message and initiation of the telephonic connection can subsequently take place after a delay. | 05-30-2013 |
20130232494 | AUTOMATING SEQUENTIAL CROSS-APPLICATION DATA TRANSFER OPERATIONS - Illustrative embodiments disclose performing a task between software components. A computer executed process identifies a first region of a source software component as a source location for the task. The computer also identifies a second region of a target software component as a target location for the task. The computer responsively identifies a set of data in the source location. The computer determines a set of actions to perform the task between the source and the target software components. The set of actions to perform the task includes at least a first action to select a portion of the set of data in the source location, a second action to perform on the selected portion of the set of data that generates new data, and a third action using the new data in the target location. The computer performs the set of actions for the task. | 09-05-2013 |
20140040436 | MEDIA STREAMING - A system and associated method for minimizing network traffic in playing a media stream with a media module running in a client computer system. The media stream is stored in a media content server. A video file of the media stream is processed to generate an audio file corresponding to the video file, such that the media module downloads and plays the audio file when the media module is invisible on a computer screen of the client computer system. When the media module becomes visible, the media module switches back to downloading and playing the video file. A current location is tracked by a location sync file stored in the media content server to synchronize the video file and the audio file. | 02-06-2014 |
20140082133 | DELIVERING OFFERS - A method and system for delivering offers is provided. The method includes enabling for a user via a device, a Web browser and an associated URL. A processor determines a manufacturer and model of the device and that the device is associated with a shared device list. A user agent receives the manufacturer and model of the device and the processor transmits the user agent, the manufacturer and model of the device, and the associated URL. The manufacturer and model of the hardware device is extracted from the user agent and a rules engine is evaluated with respect to the manufacturer and model of the device. Specified content associated with the device is determined based on results of the evaluation. The specified content is transmitted to the Web browser. | 03-20-2014 |
20140099980 | MANAGEMENT OF AN ELECTRONIC CALENDAR USING SHORT MESSAGE SERVICE (SMS) - Approaches are provided for managing an electronic calendar using short message service (SMS). Specifically, an approach is provided that is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to receive an SMS text message including an SMS command to manage an electronic calendar with at least one pre-existing event. The SMS command includes an instruction to modify the at least one pre-existing event. The programming instructions are further operable to execute the SMS command such that the at least one pre-existing event is modified. | 04-10-2014 |
20140188601 | INTEGRATION BETWEEN BRICK-AND-MORTAR ESTABLISHMENTS AND WEB BASED ESTABLISHMENTS - Approaches are provided for quick response (QR) code and barcode based integration between brick-and-mortar stores and web store fronts. Specifically, an approach is provided that is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine whether an item is in inventory at a physical location of a user, one or more alternate locations, or an on-line store of a merchant, by leveraging a scanned SQ code or bar code of the item. The program instructions are operable to add the item to a virtual cart associated with a mobile device of a user based on the scanned SQ code or bar code. The program instructions are operable to complete an order of the item at one of the physical location of the user, the one or more alternate locations, and the on-line store of a merchant. | 07-03-2014 |
20140283111 | SPATIAL SECURITY FOR STORED DATA - Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or sector of the hard disk drive. The method also includes locking the at least one track and/or sector as a default setting. The method additionally includes determining the user has moved into a predefined area. The method further includes unlocking the at least one track and/or sector based on the determining the user has moved into the predefined area. | 09-18-2014 |
20140325616 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 10-30-2014 |
20150046597 | SPATIAL SECURITY IN A SESSION INITIATION PROTOCOL (SIP) CONFERENCE - In a method for securing a session initiation protocol (SIP) conference session, first location information of a SIP conference session invitee attempting to connect to a SIP conference session is received. The computer determines that the received first location information at least partially matches a location requirement assigned to the invitee attempting to connect to the SIP conference session. The computer causes the invitee to be connected to the SIP conference session. | 02-12-2015 |
20150067065 | TRANSMISSION OF MESSAGES AND NOTIFICATIONS IN VIRTUALIZED WIRELESS MOBILE COMPUTING DEVICES - A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message. | 03-05-2015 |
Patent application number | Description | Published |
20110282908 | Security Monitoring - Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level. | 11-17-2011 |
20110283356 | Security Monitoring - Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined. | 11-17-2011 |
20140259164 | SECURITY MONITORING - Disclosed are systems, apparatus, methods, and computer readable media for determining a confidentiality for a site record. In one embodiment, a site record for analysis is identified at a computing device. The computing device may identify a source for the site record and determine, based on the source, a source-based confidentiality for the site record. The computing device may identify, based on the site record, a designated confidentiality for the site record, and determine that the designated confidentiality is different from the source-based confidentiality. Responsive to the determination that the designated confidentiality is different from the source-based confidentiality, the computing device may store the source-based confidentiality for the site record on a storage medium. | 09-11-2014 |