Patent application number | Description | Published |
20080201435 | METHOD AND SYSTEM FOR ORDERING ADDRESSEES IN ADDRESS FIELDS - A method and system for ordering addressees in address fields ( | 08-21-2008 |
20080201694 | CODE RECOVERY SYSTEM AND METHOD - A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner. | 08-21-2008 |
20080208981 | Providing Information Regarding Mailing List Aliases - A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias. | 08-28-2008 |
20080208983 | Providing Information Regarding Mailing List Aliases - Systems and methods for providing information regarding mailing list aliases to recipients of email messages that are sent using mailing list aliases are provided in the present invention. A method for providing information regarding mailing list aliases in an email message is provided. The method includes displaying an email message including at least one mailing list alias, and displaying a scope indicator in association with the mailing list alias, wherein the scope indicator provides a visual indication that a plurality of email addresses are mapped to the mailing list alias. | 08-28-2008 |
20080222700 | Challenge/Response in a Multiple Operating System Environment - a secure challenge-response virtualization system including a computer having a memory divided into at least a first and a second logical partition, where the first partition is operative to receive a challenge from an entity, and a challenge/response manager configured with the second partition, where the first partition is configured to provide the challenge to the challenge/response manager configured with the second partition, and where the challenge/response manager is configured to generate a response to the challenge and provide the response to the first partition. | 09-11-2008 |
20080235024 | METHOD AND SYSTEM FOR TEXT-TO-SPEECH SYNTHESIS WITH PERSONALIZED VOICE - A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input ( | 09-25-2008 |
20080250114 | MITIGATING ADDRESS BOOK WEAKNESSES THAT PERMIT THE SENDING OF E-MAIL TO WRONG ADDRESSES - A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender. | 10-09-2008 |
20080276306 | Implicit Authentication to Computer Resources and Error Recovery - A method for implicit authorization to a computer resource includes defining a behavioral signature including a plurality of defined computer actions known to an authorized user of the computer resource. A first performed computer action of a user is registered. The first performed computer action is compared with a first defined computer action of the plurality of defined computer actions, wherein, if the first performed computer action and the first defined computer action match, an authentication state is changed from a first authentication state to a second authentication state. | 11-06-2008 |
20080310605 | CALL CONNECTION SYSTEM & METHOD - A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device. | 12-18-2008 |
20080320574 | SYSTEM, METHOD AND PROGRAM FOR AUTHENTICATION AND ACCESS CONTROL - System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password. In response, the production server authenticates the GroupID with the group password and grants the user access to the file. | 12-25-2008 |
20090055481 | AUTOMATICALLY GENERATED SUBJECT RECOMMENDATIONS FOR EMAIL MESSAGES BASED ON EMAIL MESSAGE CONTENT - The present invention discloses an email application that includes a subject evaluation engine, which is able to automatically generate a subject heading suggestion for an email message based upon content contained in the email message. The subject evaluation engine can also compare a pre-existing subject heading of the email message against content contained in the email message. User selectable interface elements can be included in the email application for invoking the suggestion and comparison functions of the subject evaluation engine. Further, the subject evaluation can automatically be initiated before an email message is sent, can be used to notify a user when the message's subject is inconsistent with the message's content, and can suggest one or more replacement subject headings for the current heading. | 02-26-2009 |
20090100419 | METHOD FOR DETERMINING PRIORITY FOR INSTALLING A PATCH INTO MULTIPLE PATCH RECIPIENTS OF A NETWORK - Embodiments of the invention provide a computer implemented method and system for installing a patch on at least some of the servers of a network having multiple servers. The method comprises the steps of identifying a plurality of servers of the network that each requires installation of the patch, and assigning two or more priority values to each of the identified servers. The priority values for a given identified server are each associated with a different criterion in a set of criteria. The method further comprises selectively processing the assigned priority values for respective identified servers, in order to determine an initial priority, comprising a first sort order, for installing the patch on each identified server. The first sort order is revised in accordance with information pertaining to prior use of respective identified servers, to provide a second sort order. The patch is installed on each of the identified servers, in an order determined at least in part by the second sort order. As an option, one or more additional sort orders can be provided for use in determining the order for installing the patch. | 04-16-2009 |
20090100497 | METHOD AND APPARATUS FOR PREVENTING A SET OF USERS FROM ACCESSING A MESSAGE IN AN INSTANT MESSAGING SYSTEM - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for preventing a set of users from accessing a message in an instant messaging system. The process determines whether a message received by a receiving computing device from a sending computing device is undetected by a set of users associated with the receiving computing device. The process notifies the sending computing device that the message is undetected by the set of users in response to determining that the message is undetected by the set of users associated with the receiving computing device. The process prevents the set of users from accessing the message in response to receiving a request to prevent the set of users from accessing the message. | 04-16-2009 |
20090113014 | Device, Method and Computer Program Product for Providing an Alert Indication - A method for providing an alert indication, the method includes: allowing a first user to define an alert to be generated in response to an availability of a second user to participate in an instant messaging session; and sending to the second user an alert indication indicative of the alert. | 04-30-2009 |
20090157858 | Managing Virtual Addresses Of Blade Servers In A Data Center - Methods, apparatus, and products for managing virtual addresses of blade servers in a data center are disclosed that include storing, by a blade server management module (‘BSMM’) in non-volatile memory of a blade server, a parameter block, the parameter block including one or more virtual addresses for communications adapters of the blade server and one or more action identifiers; detecting, by a BIOS module of the blade server upon powering on the blade server, the parameter block; disabling, by the BIOS module, in dependence upon the one or more action identifiers of the parameter block, an original address of at least one communications adapter of the blade server; and setting, by the BIOS module, an address of the communications adapter to a virtual address included in the parameter block. | 06-18-2009 |
20090174534 | Vehicle Antitheft System and Method - A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset. | 07-09-2009 |
20090178135 | LANGUAGE INDEPENDENT LOGIN METHOD AND SYSTEM - The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access. | 07-09-2009 |
20090204946 | INTELLIGENT SOFTWARE CODE UPDATER - A method for modifying executable logic code stored on a computing system is provided. The method comprises assessing a risk level associated with modifying a first code block and assessing an urgency level associated with modifying the first code block and then evaluating whether the first code block should be modified. | 08-13-2009 |
20090249044 | Apparatus for and Method for Life-Time Test Coverage for Executable Code - a novel and useful apparatus for and method of associating a dedicated coverage bit to each instruction in a software system. Coverage bits are set every time the software application runs, enabling a more comprehensive and on-going code coverage analysis. The code coverage bit mechanism enables code coverage analysis for all installations of a software application, not just software in development mode or at a specific installation. Code coverage bits are implemented in either the instruction set architecture (ISA) of the central processing unit, the executable file of a software application, a companion file to the executable file or a code coverage table residing in memory of the computer system. | 10-01-2009 |
20100031146 | Parallel Visual Radio Station Selection - A computer implemented method in a data processing system and a computer program product enable visual selection of a media signal. A set of media signals is received from a set of media providers. A subject matter and a performer of the subject matter are then identified for at least one of the set of media signals. A set of icons is then identified. Each of the set of icons corresponds to at least one of media signals. The set of icons and the set of media providers are then forwarded to a client media player. | 02-04-2010 |
20100031343 | USER POLICY MANAGEABLE STRENGTH-BASED PASSWORD AGING - Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period. | 02-04-2010 |
20100036916 | Facilitating an Extended IM Session in a Secure Way - A method includes steps of: receiving a prompt from a user to activate a message interface in order to begin a session; activating the message interface such that said message interface is presented to the user and is able to receipt input from the user; receiving user input from the message interface, including: a user selection of at least one target correspondent; and a first message to be sent to the at least one target correspondent; identifying the session with a unique identifier; and sending the first message to a messaging system for delivery to the target correspondent when the target correspondent is available. | 02-11-2010 |
20100042412 | SKIPPING RADIO/TELEVISION PROGRAM SEGMENTS - Techniques for notifying at least one entity of an occurrence of an event in an audio signal are provided. At least one preference is obtained from the at least one entity. An occurrence of an event in the audio signal is determined. The event is related to at least one of at least one speaker and at least one topic. The at least one entity is notified of the occurrence of the event in the audio signal, in accordance with the at least one preference. | 02-18-2010 |
20100048182 | Reaching a Communications Service Subscriber Who is Not Answering an Incoming Communications Request - A method for reaching a communications service subscriber who does not answer an incoming communications request to the subscriber's communications device, the method including detecting that an incoming communications request received at a first communications device is not answered, locating a second communications device within a predefined distance from the first communications device, and sending a message to the second communications device indicating the receipt of the incoming communications request at the first communications device. | 02-25-2010 |
20100070587 | EMBEDDING RESURFACING TRIGGERS IN CLIENT SIDE RECIPIENT ELECTRONIC MAIL - A method for utilizing embedded resurfacing logic in electronic mail (email), the method includes: receiving an email with embedded resurfacing logic at a recipient's email client; determining whether the recipient has opened the email; wherein in the event the email has not been opened: determining whether a triggering event has occurred; wherein in the event a triggering event has occurred and has not exceeded a maximum number of triggering events: generating a resurfaced email entry at the top of the recipients email inbox, and wherein the triggering event is a predefined time interval in which the recipient has not opened the email. | 03-18-2010 |
20100088343 | Customized Context Menu for Files Based on Their Content - Techniques are disclosed for customizing a context structure such as a context menu based on content associated with an object such as a computer file. For example, a computer-implemented method for customizing a context structure associated with an object comprises the following steps. A content analysis is performed on the object. The context structure associated with the object is modified based on at least a portion of results of the content analysis. | 04-08-2010 |
20100175068 | LIMITING THE AVAILABILITY OF COMPUTATIONAL RESOURCES TO A DEVICE TO STIMULATE A USER OF THE DEVICE TO APPLY NECESSARY UPDATES - Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied. | 07-08-2010 |
20100180228 | METHOD AND APPARATUS FOR REDUCING POWER CONSUMPTION OF AN ELECTRONIC DISPLAY - A method, system, and computer program product for reducing power consumption in a display area of an electronic device is provided. The method includes selecting a first window within the display area to be highlighted using a first input command of a user; locating the first window in the display area; and reducing power to at least portions of the display area not corresponding to the first window | 07-15-2010 |
20100223350 | Method for Providing an alert indication - A method for providing an alert indication, the method includes: allowing a first user to define an alert to be generated in response to an availability of a second user to participate in an instant messaging session; and sending to the second user an alert indication indicative of the alert. | 09-02-2010 |
20100228935 | CONDITIONAL STORAGE OF MULTIPLE INFORMATION ITEMS - A method for consistent version of multiple information items is provided. The method includes receiving a conditional request to copy a version of multiple information items at a condition fulfillment point of time that is associated with a fulfillment of a condition of the conditional request. Then determining that the condition is fulfilled, and participating in generating a condition fulfillment point in time version of the multiple information items. | 09-09-2010 |
20100250682 | UTILIZING E-MAIL RESPONSE TIME STATISTICS FOR MORE EFFICIENT AND EFFECTIVE USER COMMUNICATION - A method of increasing email correspondence responsiveness may include detecting a first set of email messages transmitted by a first correspondent to a second correspondent, creating a tracking record based on the responsiveness of the second correspondent to each email message of the first set of email messages, performing a first statistical analysis of the tracking record, generating a set of responsiveness metrics based on the first statistical analysis, detecting new outgoing email messages addressed to the second correspondent, and providing a user-configurable email message format for each detected outgoing message, the user-configurable email message format. According to the example embodiment, the user-configurable email message format is configured to increase effective email response time from the second correspondent and the user-configurable email message format is based on the set of responsiveness metrics. | 09-30-2010 |
20100269163 | COMPUTER ACCESS SECURITY - A method is provided for improved computer access security, the method including protecting an access record to prevent password access to a computer via the access record, creating an alternate access record corresponding to the protected record, enabling password access to the computer via the alternate record, providing the alternate record with the access level of the protected record, and configuring the alternate record to indicate a supplemental security program to be executed once a correct password for the alternate record is provided. | 10-21-2010 |
20100306392 | CREATING CONTEXT-SENSITIVE WEBPAGE TIME-OUT INTERVALS - An approach is provided to establish, over a network adapter, network sessions with various client computer systems. Requests for a webpage are received at the network adapter from the client computer systems. The requested webpage is retrieved from a storage area. Multiple timeout intervals are initialized and stored in a memory area, wherein each of the plurality timeout intervals corresponds to one of the client computer systems. The timeout intervals that are initialized are different for at least some of the client computer systems. The requested webpage is returned to the client computer systems. When a timeout interval elapses for any of the client computer systems, the system terminates the session that was established with the client computer system. | 12-02-2010 |
20110314450 | ANALYZING COMPUTER CODE DEVELOPMENT ACTIONS AND PROCESS - A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor. | 12-22-2011 |
20120173908 | Hibernation During Meetings - A method, computer program product, and system for hibernation during meetings is described. A method may comprise designating a base computer system of a meeting. The method may further comprise determining if a user is in the meeting. The method may also comprise hibernating a computer system associated with the user based upon, at least in part, a hibernation policy, if it is determined that the user is in the meeting. | 07-05-2012 |
20120191459 | SKIPPING RADIO/TELEVISION PROGRAM SEGMENTS - Techniques for notifying at least one entity of an occurrence of an event in an audio signal are provided. At least one preference is obtained from the at least one entity. An occurrence of an event in the audio signal is determined. The event is related to at least one of at least one speaker and at least one topic. The at least one entity is notified of the occurrence of the event in the audio signal, in accordance with the at least one preference. | 07-26-2012 |
20120254634 | PREDICTING BATTERY POWER USAGE - A method for predicting battery power usage includes, collecting information relating to battery power consumption due to tasks performed by the physical computing system powered by a battery, and notifying a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the physical computing system are projected to exhaust the battery. A computing system includes a processor, a memory communicatively coupled to the processor, and a battery to power the computing system. The processor is configured to collect information relating to battery power consumption due to tasks performed by the computing system, and notify a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the computing system are projected to exhaust the battery. | 10-04-2012 |
20120330951 | PROVIDING ACCURATE RECIPIENT LISTS BY CORRELATING TAGGED KEYWORDS TO RECIPIENT LISTS - A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used. | 12-27-2012 |
20130007481 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130007487 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130013666 | MONITORING DATA ACCESS REQUESTS TO OPTIMIZE DATA TRANSFER - A data transmission optimization method and system. The method comprises analyzing program code to identify data access calls in the program code, using one or more processor; determining whether a first data access call is for retrieving target data stored in a data structure with a plurality of fields, wherein the target data is stored in one or more target fields of the data structure; determining whether servicing the first data access call will result in transfer of non-target data stored in one or more non-target fields in the data structure; and replacing the first data access call with a second data access call, wherein servicing the second data access call will result in transfer of the target data and minimizes the transfer of non-target data. | 01-10-2013 |
20130055370 | SECURITY FOR FUTURE LOG-ON LOCATION - A system includes a location look-up module that determines a current location for a user log-on to the network, and determines a next location of the user log-on to the network. An analyzer module analyzes at least one portion of the network for potential future location information for authenticating with the determined next location by an authorization module. The authorization module authenticates the next log-on to the network based on a comparison with the potential future location information. | 02-28-2013 |
20130179479 | INTELLIGENT FILE MANAGEMENT - In one example, an indication is detected that an application has performed a file operation on a file and a computing system determines whether a datastore includes an association between an application identifier that identifies the application and a file identifier that identifies the file. If not, the association between the application identifier and the file identifier is stored. A computing system also determines whether execution behavior of the application changes when the file is not accessible to the application. Responsive to a change in execution behavior of the application, a status indicator is associated with the file identifier to indicate that the execution behavior of the application changes when the file is not accessible to the application. | 07-11-2013 |
20130238716 | PROVIDING A COLLABORATIVE STATUS MESSAGE IN AN INSTANT MESSAGING SYSTEM - A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question. | 09-12-2013 |
20130238737 | PROVIDING A COLLABORATIVE STATUS MESSAGE IN AN INSTANT MESSAGING SYSTEM - A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question. | 09-12-2013 |
20140114942 | Dynamic Pruning of a Search Index Based on Search Results - A search index for a collection of documents includes a plurality of keywords associated with the documents. Access to individual documents is detected based on searches employing the search index and keywords are recorded that are utilized in the searches and resulted in document access. The search index is modified to maintain the recorded keywords and remove keywords absent from the searches resulting in the document access. | 04-24-2014 |
20140189199 | FALSE POWER FAILURE ALERT IMPACT MITIGATION - Apparatus and computer program products implement embodiments of the present invention that include copying, by a storage system having a volatile memory configured as a write cache, write cache data from the volatile memory to a solid state device, upon receiving a signal indicating a loss of power to the storage system. Subsequent to copying the write cache data, the solid state device is configured as the write cache. | 07-03-2014 |
20140189214 | FALSE POWER FAILURE ALERT IMPACT MITIGATION - Methods, apparatus and computer program products implement embodiments of the present invention that include copying, by a storage system having a volatile memory configured as a write cache, write cache data from the volatile memory to a solid state device, upon receiving a signal indicating a loss of power to the storage system. Subsequent to copying the write cache data, the solid state device is configured as the write cache. | 07-03-2014 |
20140201480 | Data Recovery Scheme Based on Data Backup Status - Machines, systems and methods for increasing data resiliency in a computing system, the method comprising distinguishing between first data and second data stored in one or more data storage mediums, wherein the first data is more vulnerable than the second data for the purpose of recovering lost data; and recovering the first data before recovering the second data. Increasing redundancy protection for the first data to increase chances for data recovery by way of data reconstruction; and decreasing redundancy protection for the first data, after the first data has been backed up at least once. | 07-17-2014 |
20140343832 | USING PASS CODE VERIFICATION TO ORGANIZE A VEHICLE CARAVAN - A reference pass code is received from a first user. Location information of a vehicle of the first user is received from a first computer. A pass code is received from a second user. Location information of a vehicle of the second user is received from a second computer. One or more computer processors verify that the pass code received from the second user matches the reference pass code. Based on verification of the pass code received from the second user, the location information of the vehicle of the first user is transmitted to the second computer and the location information of the vehicle of the second user is transmitted to the first computer. | 11-20-2014 |
20140344369 | ELECTRONIC MAIL READ RECEIPT PROCESSING - Processing electronic mail includes receiving an electronic mail having a read receipt request and determining, using a processor, that the electronic mail includes a read receipt distribution list. The read receipt distribution list specifies at least one sender-defined user including a subset of at least one recipient of the electronic mail. Using the processor, a read receipt is sent to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. | 11-20-2014 |
20150025891 | METHOD AND SYSTEM FOR TEXT-TO-SPEECH SYNTHESIS WITH PERSONALIZED VOICE - A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input ( | 01-22-2015 |
20150058294 | ADDING COOPERATIVE FILE COLORING IN A SIMILARITY BASED DEDUPLICATION SYSTEM - For adding cooperative file coloring in a similarity based deduplication system using a processor device in a computing environment. Input streams of backup application are parsed and the data segments are marked with file coloring that represents a source file of the backup application for comparing the data segments to determine if the data segments are identical during a similarity check operation. | 02-26-2015 |
20150058297 | ADDING COOPERATIVE FILE COLORING PROTOCOLS IN A DATA DEDUPLICATION SYSTEM - For adding cooperative file coloring protocols in a data deduplication system using a processor device in a computing environment, a preferred character is represented for file coloring in a file using a code selected from a multiplicity of codes that represent a variety of contexts. The original meaning of the preferred character is retained when representing the preferred character for the file coloring by the code selected from the multiplicity of codes. | 02-26-2015 |
20150074064 | DEFRAGMENTATION-LESS DEDUPLICATION - For defragmentation-less deduplication using a processor device, holes are punched in a file in a data deduplication process for avoiding the use of defragmenting by allowing a file system to use the punched holes for reclaiming the free space for adding to a free space pool of the file system. | 03-12-2015 |