Patent application number | Description | Published |
20080256474 | Interactive Progress Bar - A method, system and computer-usable medium are disclosed for using an interactive progress indicator bar to graphically display, and interact with, the completion status information of a plurality of computer operations before they are completed. An interactive progress indicator bar is implemented in a graphical user interface (GUI) and comprises a plurality of progress indicator segments. As computer operations are completed, the details of their completion status are entered into a computer operation log and indexed to their corresponding progress indicator segments. Concurrently, color attributes are applied to progress indicator segments to graphically indicate the completion status of their associated computer operations. Predetermined levels of completion status details are displayed through a user gesture as the cursor is placed over a computer operation's corresponding progress indicator segment. A contextual level of completion status information is displayed in a computer operation log that is automatically scrolled to the corresponding completion status information. | 10-16-2008 |
20080270928 | Implementation of an Interactive Progress Bar in a Test Application Environment - A computer-implementable method, system and computer-readable medium for implementing an interactive progress bar that is associated with an executing test program are presented. In a preferred embodiment, the computer-implementable method includes linking each of multiple sectors in a progress bar to a corresponding section of a test program. The progress bar is displayed while the test program is being executed, such that test program code is not displayed with the progress bar on the same User Interface (UI). In response to the system detecting a signal that a specific sector of the progress bar has been selected, the computer displays, on the UI, an underlying log of activities for the corresponding section of the test program, such that the test program continues to be executed while the underlying log is displayed. | 10-30-2008 |
20080301220 | Persisting Forms Data in a Composite Web Application Environment - Forms data is reusable in a first webpage after a user goes to a second webpage, and then returns to the first webpage. After providing access to a first webpage via a portal User Interface (UI) on a display on a client computer, a data entry input of forms data for the first webpage is received from a user of the client computer. The user is then provided access to a second webpage via the portal UI. In response to providing access to the second webpage, the server stores the forms data. In response to the user inputting a request to return to the first webpage from the second webpage, the server creates a populated first webpage by populating the first webpage with the multiple forms data that is stored in the server, and then returns the populated first webpage to the portal UI. | 12-04-2008 |
20090006979 | TEXT EXCHANGE FACILITY FOR JOINING MULTIPLE TEXT EXCHANGE COMMUNICATIONS INTO A SINGLE TOPIC BASED COMMUNICATION - The present invention discloses a text exchange facility that permits a user to combine multiple pre-existing text exchange interfaces into a single interface. When previous text exchange interfaces are joined, different tabs can be presented in a joined interface. A one-to-one correspondence can exist between tabs in the joined interface and active real-time text exchange sessions. Joining interfaces can have no effect on the underlying text exchange sessions or upon communications/activities experienced by communicators with whom the user exchanges textual messages. Joined interfaces can be identified by a user specified topic or name. In one embodiment, history and/or records concerning text exchange contents can be maintained on a topic-by-topic manner. | 01-01-2009 |
20090030673 | Automatically identifying unique language independent keys correlated with appropriate text strings of various locales by key search - A method, system and computer program product for automatically identifying unique language independent keys. A “key search” is performed which searches for various language independent keys in a properties file associated with a value or text string entered in a first locale. A second locale is suggested to narrow the number of language independent keys displayed in connection with the value entered in the first locale. Upon receiving the value for the second locale, another key search is performed, where this key search is performed on the language independent keys displayed in connection with the first value entered in association with the first locale. A unique language independent key may be identified based on this subsequent key search. By performing key searches and suggesting a second locale to narrow the number of language independent keys, the time in identifying a unique language independent key is reduced and efficiency is improved. | 01-29-2009 |
20090030674 | Automatically Identifying Unique Language Independent Keys Correlated With Appropriate Text Strings of Various Locales By Value and Key Searches - A method, system and computer program product for automatically identifying unique language independent keys. A “value search” is performed which provides a listing of values for a locale. Upon the user selecting a value in the listing, a “key search” is performed to search for various language independent keys associated with the selected value. A second locale is suggested as well as a listing of values for the second locale that are the same in meaning as the value selected by the user for the first locale in order to narrow the number of language independent keys displayed in connection with the value selected for the first locale. Upon the user selecting a value for the second locale, a subsequent key search is performed on the language independent keys displayed in connection with the first value. A unique language independent key may be identified based on this subsequent key search. | 01-29-2009 |
20090037359 | METHOD AND SYSTEM FOR ENFORCING RULE SELECTION ON USER INBOXES - A method and system for enforcing rule selection on user email inboxes include an inbox monitor and administrative rules at an email server. The inbox monitor includes a first agent for identifying inactive user inboxes from email messages stored at the email database, and a second agent for identifying, from the inactive user inboxes identified by the first agent, user inboxes without appropriate user rules activated. For each user inbox identified by the second agent, administrative rules are applied to the user inbox if the user inbox has been inactive for at least a predetermined period of time. If the user inbox has not been inactive for at least the predetermined period of time, a notification message is sent to a user associated with the user inbox. The notification message informs the user that administrative rules will be applied to the user inbox if appropriate user rules are not activated. | 02-05-2009 |
20090037537 | Tracking Electronic Mail History - Tracking history of e-mail messages. A tracking request can be sent at any time, and need not be specified prior to or during the sending of the e-mail message. In one embodiment, tracking is requested by resending an earlier-sent message to the recipient, and associated with this resent message is a tracking request X-header. A recipient of the tracking request X-header responds by returning a reply X-header in a reply message along with tracking information pertaining to the original e-mail message. One alternative embodiment embeds an e-mail object in an e-mail message to request the tracking instead of using a request X-header, and similarly, uses an e-mail object to provide the reply instead of using a reply X-header. Users may be allowed to specify whether their e-mail client will respond to tracking requests and/or may be allowed to specify criteria for automating this decision. | 02-05-2009 |
20090037538 | SYSTEM AND METHOD TO PRIORITIZE CHAT ALERTS BASED ON AN ORGANIZATIONAL HIERARCHICAL CHAIN - In a chat alert method and system, a chat user creates alert profiles that include the requestor's level in an organizational hierarchy as a parameter and the alert type for the level. When a chat client receives a chat request from a requester for a receiver, the chat client determines if there is a chat alert profile that matches the requestor's level. If so, then an alert is issued to the receiver according to the matching chat alert profile. Optionally, the chat alert profile sets an alternate alert system, where if the receiver does not respond to the request within a specified time, an alert is sent using the alternate alert system. Chat requests from requesters higher up in the reporting chain can be highlighted for the receiver. The receiver can then prioritize the chat requests that he/she receives and respond to them in a timely fashion. | 02-05-2009 |
20090037543 | SYSTEM AND METHOD TO PRIORITIZE CHAT ALERTS BASED ON AN ORGANIZATIONAL HIERARCHICAL CHAIN - In a chat alert method and system, a chat user creates alert profiles that include the requestor's level in an organizational hierarchy as a parameter and the alert type for the level. When a chat client receives a chat request from a requester for a receiver, the chat client determines if there is a chat alert profile that matches the requestor's level. If so, then an alert is issued to the receiver according to the matching chat alert profile. Optionally, the chat alert profile sets an alternate alert system, where if the receiver does not respond to the request within a specified time, an alert is sent using the alternate alert system. Chat requests from requesters higher up in the reporting chain can be highlighted for the receiver. The receiver can then prioritize the chat requests that he/she receives and respond to them in a timely fashion. | 02-05-2009 |
20090063961 | TYPE-AHEAD HINTS WITH DYNAMICALLY CONFIGURABLE USER PREFERENCES - An improved solution for dynamically configurable user preferences in a type-ahead hint system is provided. In an embodiment of the invention, a method for providing type-ahead hints includes: receiving an input string; providing a configurable preference interface; obtaining a preference from the interface; and generating at least one type-ahead hint, based upon the input string and the preference. | 03-05-2009 |
20090064004 | Dynamically configurable portlet - An improved solution for portlets is provided. In an embodiment of the invention, a method of automatically configuring a portlet includes: receiving a portlet; searching content of the portlet for a contextual aspect; and automatically applying attribute information to a portlet window object based on a discovered contextual aspect. | 03-05-2009 |
20090064033 | DYNAMICALLY CONFIGURABLE PORTLET - An improved solution for portlets is provided. In an embodiment of the invention, a system for automatically configuring a portlet includes: a module for receiving a portlet; a module for searching content of the portlet for a contextual aspect; and a module for automatically applying attribute information to a portlet window object based on a discovered contextual aspect. | 03-05-2009 |
20090090584 | PROVIDING ITEM BAGGING ADVISEMENTS TO BAGGERS - The present invention discloses a solution for providing item bagging advisements to individuals bagging purchased items during a check-out situation. The solution can include a self-checkout system and/or a human assisted checkout system capable of providing bagging assistance. A bagged item can be detected based on information such as weight, barcode data, and the like. Based on a set of rules for preferred item grouping, items can be determined to be appropriately bagged or to be in conflict with another item. Item bagging assistance can include, but is not limited to, item conflict warning, item compatibility confirmation, and assistance based on item categorization. Visual and aural confirmation and/or warning notifications can be presented to a user based on item compatibility or incompatibility. | 04-09-2009 |
20090094083 | SYSTEM AND METHOD FOR AUTOMATIC MODERATOR DELEGATION - A method and computer program product for receiving an indication of a meeting being scheduled between a plurality of attendees. At least one of the attendees is designated a moderator of the meeting. The actions of the designated moderator are monitored to determine if the designated moderator is capable of performing one or more moderator responsibilities associated with being the designated moderator. If it is determined that the designated moderator is incapable of performing the one or more moderator responsibilities, an alternate moderator chosen from the plurality of attendees is designated. | 04-09-2009 |
20090094623 | SYSTEM AND METHOD FOR PROGRAMMATICALLY GENERATING TO-DO LIST AND CREATING NOTIFICATION BETWEEN CALENDAR AND OTHER APPLICATIONS - A method, apparatus, and program product are provided for integrating a calendar todo list with information from other applications. The method comprises the steps of: dynamically extracting data for open application processes, and creating task listings using the data for the open application processes. The apparatus comprises a processor adapted to dynamically extract data for open processes and create task listings using the data for the open application processes, and a memory having stored thereon a calendar application with a list of tasks. The program product comprises a machine readable media having encoded thereon, machine executable instructions for dynamically extracting data for open application processes, and creating task listings using the data for the open application processes. | 04-09-2009 |
20090100184 | PROTECTING CONTEXT SENSITIVE INFORMATION FROM BEING TRANSMITTED FROM AN INSTANT MESSAGE CLIENT - In a method and system for protecting context sensitive information from being transmitted from an instant message client, at least one policy is received that includes an entry of one or more disallowed terms and is associated with at least one action. Words typed into an IM message of the IM client by a user are then monitored in real-time. In response to any of the words typed into the IM message matching any of one or more disallowed terms, the action associated with the policy is automatically performed. According to one embodiment, an example action that may be associated with the policy and that is automatically performed may include temporarily halting transmission of the IM message, and displaying a warning message to the user, for example. | 04-16-2009 |
20090106667 | DIVIDING A SURFACE OF A SURFACE-BASED COMPUTING DEVICE INTO PRIVATE, USER-SPECIFIC AREAS - The present invention discloses a solution for defining a private user area in a surface based computer. The solution can identify a surface of a surface based computer. At least one private user area can be defined for the surface. A region of the surface can be demarcated for each defined private user area. Input/output for each demarcated private user area can be handed in a manner specific to the private user area, which is different from how input/output is handled for other portions of the surface. In one embodiment, different users can be associated with multiple ones of a set of two or more different private user areas. Each user can concurrently utilize their own private user area as if that private user area was a computing space dedicated to that user. | 04-23-2009 |
20090106684 | System and Method to Facilitate Progress Forking - A method, system and computer-usable medium are disclosed for providing graphical completion status information for the management of serial computer operations that are forked into parallel operations. A first interactive progress bar, comprising a plurality of progress indicator segments, is implemented to show the completion status of a composite application. A second progress bar is implemented for each element of the composite application as it is executed. Elements that are serially executed may require prerequisite or dependent operations. Forking operations are performed to execute elements in parallel. One or more progress indicator segments are selected to display information about their related computer operations. The user interacts with the information to pause, modify, reorder, reverse, retarget, or reverse the selected computer operations. | 04-23-2009 |
20090113334 | System and Method to Facilitate Progress Forking - A method, system and computer-usable medium are disclosed for providing graphical completion status information for the management of serial computer operations that are forked into parallel operations. A first interactive progress bar, comprising a plurality of progress indicator segments, is implemented to show the completion status of a composite application. A second progress bar is implemented for each element of the composite application as it is executed. Elements that are serially executed may require prerequisite or dependent operations. Forking operations are performed to execute elements in parallel. One or more progress indicator segments are selected to display information about their related computer operations. The user interacts with the information to pause, modify, reorder, reverse, retarget, or reverse the selected computer operations. | 04-30-2009 |
20090116403 | SYSTEM AND METHOD FOR COMMUNICATION MANAGEMENT - A method and computer program product for managing communications with a user include defining one or more communication profiles for a user, in which defining the one or more communication profiles includes defining one or more communication channels for the user, and defining a preferred communication schedule for each of the one or more communication channels. The preferred communication schedule is associated with a respective one of the one or more communication channels. Communications with the user by a contacting user are managed based upon, at least in part, the one or more communication profiles for the user. | 05-07-2009 |
20090125817 | SYSTEM AND METHOD FOR SHARING DATA - A method and computer program product for establishing a trust relationship between a first user of a collaboration platform and at least a second user of the collaboration platform. Information concerning calendar-related events for the at least a second user is automatically forwarded to the first user. | 05-14-2009 |
20090126010 | USING OBJECT BASED SECURITY FOR CONTROLLING OBJECT SPECIFIC ACTIONS ON A SURFACE BASED COMPUTING DEVICE - The present invention discloses a solution for object level security on a surface based computing device that includes software objects and behavior tokens. The behavior tokens can control an extent that users are able to manipulate the software objects using the surface based computing device. Different levels of control can be established on an object-by-object basis for different users. The extent users are able to manipulate the software objects can also depends upon set of users proximate to the surface based computing device. | 05-14-2009 |
20090150816 | RETURNING PASSED OBJECTS IN A SURFACE BASED COMPUTING ENVIRONMENT USING A VIRTUAL BUNGEE - The present invention discloses a solution for a surface based computing device to return passed objects. That is, software of the surface based computing device can permit software objects appearing within a display of a surface based computing device to be passed among users positioned about the surface based computing device. The surface based computing device can also include software maintaining linkages between passed software objects and return positions defined for each of the passed software objects. Further software can be configured to automatically return at least one of the passed software objects from a current position on the display to an associated return position responsive to an occurrence of a return object event relating to that passed software object. Visual representation of the linkages can be optionally shown on the surface based computing device and the passing objects can be optionally animated. | 06-11-2009 |
20090150868 | Method and System for Capturing Movie Shots at the Time of an Automated Graphical User Interface Test Failure - A method of capturing movie shots at the time of an automated Graphical User Interface (GUI) test failure. When an automated GUI test application performs an action during a test of a GUI, the GUI test application adds a text description of the action to a test log and captures a screenshot image of the GUI. The GUI test application adds the screenshot image to a rolling First-In-First-Out (FIFO) queue that includes up to a most recent N screenshot images, where N is a pre-defined configurable number. If an error occurs, the GUI test application captures a final failure point screenshot image. The GUI test application adds the final screenshot image to the rolling FIFO queue and the test log. The GUI test application assembles the screenshot images from the rolling FIFO queue into a chronologically animated movie file and attaches the movie file to the test log. | 06-11-2009 |
20090157822 | SYSTEM AND METHOD FOR HIGH EFFICIENCY TUNNELLING FOR AGILE MEETINGS - A method and system provides sub-electronic meetings by: providing the main electronic meeting for a group of attendees over a first channel in a network, the main electronic meeting managed by a moderator; sending a request from the moderator to an electronic meeting service to create sub-electronic meetings for a subgroup of attendees; and providing the sub-electronic meeting over a separate second channel in the network for the subgroup, the sub-electronic meeting occurring simultaneously within the main electronic meeting without disconnecting the subgroup from the main electronic meeting. A first graphic user interface (GUI) for the main electronic meeting is provided to each of the group of attendees. A second GUI for the sub-electronic meeting is provided to each of the subgroup of attendees. The subgroup of attendees is able to communicate privately in the sub-electronic meeting while maintaining their view of the main electronic meeting in progress. | 06-18-2009 |
20090187629 | EMBEDDING A UNQUE SERIAL NUMBER INTO THE CONTENT OF AN EMAIL FOR TRACKING INFORMATION DISPERSION - The present invention discloses a solution for tracking email dispersion through content substitution. In the solution, a set of entities to receive an email can be identified, where the email can contains textual content. A subset of words contained within the textual content can be programmatically selected. A set of replacement words for each of the determined words can be determined. For each email receiving entity, at least one replacement word can be programmatically substituted for it's equivalent to generate an entity specific message. Each entity specific message can contain a unique combination of substitutions so that no two entity specific message are identical. A record of which email receiving entities are associated with which entity specific message can be maintained. The entity specific messages can be sent to the associated set of email receiving entities. | 07-23-2009 |
20090205049 | SECTION BASED SECURITY FOR A SECTIONED SURFACE-BASED COMPUTING DEVICE - The present invention discloses a method, a computer program product, a system, and a device for securing content of a surface-based computing device. In the invention, a delineated region of a surface of a surface-based computing device referred to as a section can be identified. The section can be a computing space owned by at least one user referred to as a section owner. Other regions of the surface exist that are computing spaces distinct from the section. A set of section specific settings can be established that are configurable by the section owner. An attempt to convey at least one software object across a section boundary separating the section from one of the other regions can be identified. The section specific settings can be applied to the attempt. Appropriate programmatic actions can be taken based upon the section specific settings. | 08-13-2009 |
20090210497 | SELECTIVE INSTANT MESSAGING (IM) NOTIFICATIONS BASED ON SENDER/RECEIVER RELATIONSHIPS - The present invention presents a solution for prioritizing instant messaging (IM) communications based on sender/receiver relationships and for presenting selective notifications based upon the established priorities. The invention can include a data store, a message prioritization engine, and a client-side IM application. The data store can manage information describing relationships among people and recipient configurable IM prioritizing information. The message prioritization engine can determine a priority value for IM communications based upon the relationships and recipient configurable IM prioritizing information of the data store. The client-side IM application can receive IM messages that have an associated priority value established by the message prioritization engine. The client-side application can present an indicator of the priority value for associated IM messages within a user interface. In one embodiment, the information describing relationships used by the prioritization engine can be acquired from at least one social networking system. | 08-20-2009 |
20090234686 | SYSTEM AND METHOD FOR PROVIDING ACCESS CONTROL IN A COLLABORATIVE ENVIRONMENT - A method, apparatus, and program product for providing access control in a collaborative environment are provided. A pool of approvable candidates for use in building an access control list for a project team are provided by matching attributes for potential candidates with requirements for the project, with the pool being larger than a projected size for the project team. In response to a vacant role on the project team, an invitation to join the project team is sent to an approvable candidate in the pool. At least one of the access control list or the pool is modified based upon an action by the approvable candidate. | 09-17-2009 |
20090287989 | PRESENTING TAG CLOUDS BASED ON USER INFORMATION - In some embodiments, a method comprises detecting a request to display a tag cloud, where the tag cloud includes a plurality of tags and the tags hyperlink to related web content. The method can also comprise determining a user's interests and preferences based on the information provided by the user. The method can include using the information to determine the tags relevant to the user's preferences and interests. The method can also include displaying the tags in the tag cloud. | 11-19-2009 |
20090307038 | SYSTEM AND METHOD FOR CREATION OF DATA FEEDS BASED ON CALENDER MEETING PARTICIPANTS - In some embodiments, a method for determining data feeds in an electronic calendar comprises identifying participants of a meeting scheduled in the electronic calendar and determining topics relevant to the participants of the meeting. The method can also comprise selecting data feeds based on the topics relevant to the participants of the meeting, wherein the data feeds provide information about the topics. The method can also include presenting the data feeds to one or more of the participants of the meeting. | 12-10-2009 |
20090307044 | System and method for consolidation of calendar appointments - A system and method for dynamically consolidating an appointment schedule. The system includes a client computer, a calendar server, and a server calendar management agent (CMA). The client computer displays a calendar user interface to show a first candidate appointment. The calendar server facilitates a scheduling consolidation session. The server CMA searches for a second candidate appointment for consolidation with the first candidate appointment based on at least one consolidation parameter. The server CMA also identifies a consolidated appointment for at least the first and second candidate appointments. The consolidated appointment combines the first and second candidate appointments according to the consolidation parameter. | 12-10-2009 |
20090307045 | SYSTEM AND METHOD FOR OPTIMIZATION OF MEETINGS BASED ON SUBJECT/PARTICIPANT RELATIONSHIPS - In some embodiments, a method for determining meeting participants in an electronic calendar comprises identifying, based on user input, a first set of participants to invite to a meeting scheduled in the electronic calendar, wherein the meeting is associated with a topic. The method can also comprise identifying a second set of participants based on the topic associated with the meeting. The method can include determining a union of the first and second sets of participants and generating, for this union, calendar entries in the electronic calendar. The method can also include presenting the calendar entries in the electronic calendar. | 12-10-2009 |
20090319926 | CALENDARING SYSTEM ABLE TO ASSIGN DELEGATES TO CALENDAR EVENTS OF AN ABSENT USER - A time period can be detected for which a user associated with calendar system entries is to be absent. A set of the calendar system entries associated with the user and occurring during the time period can be detected. At least a portion of the identified calendar entries can be reassigned to at least one delegate. For each reassigned calendar entry, a corresponding calendar entry can be added to a calendar of the associated delegate. | 12-24-2009 |
20090327227 | MEETING ROOM AND RESOURCE SCHEDULING AND PRIORITIZATION BASED ON ATTENDEE LOCATION - A method for meeting room scheduling includes receiving a specification for a meeting, including a list of attendees, and determining respective physical locations for each of the attendees. One or more optimal locations in which to have the meeting is found by calculating which ones of the physical locations has a highest concentration of attendees located there. An optimal room at each of the one or more optimal locations is found by selecting a room that is within a smallest average proximity to a highest number of attendees. The optimal room at each of the one or more optimal locations is then scheduled for the meeting. | 12-31-2009 |
20090327417 | Using Semantic Networks to Develop a Social Network - A method, apparatus and program product are provided for identifying common interests between users of a communication network. A program of instruction monitors activity over a communication network by users and identifies interests for users based on network activity. The program of instruction creates semantic networks based on use of the communication network and identifies other users with common interests from the semantic networks. Optionally, social networks may be created or modified by adding other users with common interests as identified by semantic networks. | 12-31-2009 |
20100011000 | MANAGING THE CREATION, DETECTION, AND MAINTENANCE OF SENSITIVE INFORMATION - A method, information processing system, and computer program storage product for managing information within an electronic file are provided. A plurality of information sets within an electronic file is analyzed. At least one of the information sets is compared to at least one statistical classification model. The statistical classification model includes one or more probabilities associated with a plurality of analyzed information sets that indicate a likelihood that a respective analyzed information set is classified sensitive information. The at least one information set is determined to substantially match at least one analyzed information set in the statistical classification model. The probability associated with the at least one analyzed information set is determined whether to be above a threshold. The at least one information set is classified as sensitive information in response to determining that the probability is above the threshold. | 01-14-2010 |
20100042704 | AUTOMATING APPLICATION STATE OF A SET OF COMPUTING DEVICES RESPONSIVE TO SCHEDULED EVENTS BASED ON HISTORICAL DATA - A programmatic event related to a meeting can be detected. At least one previous meeting similar to the meeting can be determined. A pattern relating to an application state of a set of at least one computing devices can be ascertained for at least one previous meeting. A difference between a current application state of the set of computing devices and an application state indicated by the ascertained pattern can be determined. The current application state of the set of computing devices can be automatically adjusted to lessen the determined difference. | 02-18-2010 |
20100057855 | TRACKING SUBJECT MATTER IN AN E-MAIL DISCUSSION - Methods, systems, and computer readable media for tracking subject matter of an e-mail discussion are described. A query e-mail is received, wherein the query e-mail includes an initial request and wherein the query e-mail commences the e-mail discussion. At least one marked response e-mail is received, wherein the at least one marked response e-mail includes information responsive to the query e-mail and is marked with an indication that the initial request has been resolved, and wherein the at least one marked response e-mail is appended to the e-mail discussion. At least one visual indicator in the e-mail discussion is provided that distinguishes at least one of the query e-mail and the at least one marked response e-mail when the e-mail discussion is opened at a later time. | 03-04-2010 |
20100106627 | APPLICATION OF COST CONSTRAINTS IN EVENT SCHEDULING - A cost metric is associated with each of a plurality of calendar event parameters of a proposed calendar event. A calendar event cost projection is determined based upon, at least in part, the cost metric associated with each of the plurality of the calendar event parameters. The calendar event cost projection is compared to a calendar event budget. At least one of the plurality of calendar event parameters is selected based upon, at least in part, the comparison of the calendar event cost projection to the calendar event budget. | 04-29-2010 |
20100179992 | Generatiing Context Aware Data And Conversation's Mood Level To Determine The Best Method Of Communication - A method, system and computer-usable medium are disclosed for providing information related to a user address as used in a communication session. A tag processing module is implemented for processing tags related to a user. A first user selects a second user to receive a message to initiate a communication session. The message recipient's tags, along with their preferred communication method(s) are displayed within the message sender's messaging client. The message sender then composes and sends a message to the message recipient, using the message recipient's preferred method of communication. The message is received by the message recipient and the message sender's tags are displayed within the message recipient's messaging client. If the message recipient decides to respond to the message, then a communication session is conducted. Once the communications session is ended, a linguistic analysis of the communication session is performed by the tag processing module. The message sender's tags are then updated. | 07-15-2010 |
20100268780 | Situational Application Creation Based on Observed User Behavior - A system and method of creating a situational application provides for identifying content from a plurality of sources, where the content is associated with a user's interaction with the plurality of sources. Data associated with the identified content is gathered, and a situational application is generated based on the gathered data. | 10-21-2010 |
20100317304 | Enhanced Radio - A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content. | 12-16-2010 |
20100324964 | AUTOMATICALLY MONITORING WORKING HOURS FOR PROJECTS USING INSTANT MESSENGER - An automatic work monitoring system may be implemented in an instant messaging application so that employee hours can automatically be tracked and associated with projects. The work monitoring system can determine that an activity is associated with a project based on context of the activity and an employee's work profile. The work monitoring system can determine the amount of time spent on the activity and record the amount of time in a daily work record. The work monitoring system can also update the employee's presence information to indicate that the employee is working on the project to update the employee's instant messaging contacts about the employees work activity. | 12-23-2010 |
20110022674 | ENFORCING RULE SELECTION ON USER INBOXES - Rule selection is enforced on user email inboxes using an inbox monitor and administrative rules at an email server. The inbox monitor includes a first agent for identifying inactive user inboxes from email messages stored at the email database, and a second agent for identifying, from the inactive user inboxes identified by the first agent, user inboxes without appropriate user rules activated. For each user inbox identified by the second agent, administrative rules are applied to the user inbox if the user inbox has been inactive for at least a predetermined period of time. If the user inbox has not been inactive for at least the predetermined period of time, a notification message is sent to a user associated with the user inbox. The notification message informs the user that administrative rules will be applied to the user inbox if appropriate user rules are not activated. | 01-27-2011 |
20110055177 | COLLABORATIVE CONTENT RETRIEVAL USING CALENDAR TASK LISTS - Calendar applications typically require users to enter information about unfinished tasks and notify users of the unfinished tasks by generating reminders at set times. Collaboration on shared content is not effective unless all collaborators are aware of a current status, a current version of the shared content, and modifications made to the shared content. Functionality can be implemented to link the calendar application to the shared content via an interface to enable the collaborators to store different versions of the shared content, access the shared content from any location via the calendar application, and receive notifications of the modifications made to the shared content. Moreover, the calendar application being used to control access to the shared content among the collaborators can also ensure collaboration without the need for configuring and using a version controlling system or collaborative servers. | 03-03-2011 |
20110154247 | VIRTUAL CALENDAR - A calendar event may be created by creating a data entry field and defining the event with the field. A template may be used to create the field. The template may contain a plurality of entry fields that may be user configurable, such as with a wizard, or selected from a palette of fields. | 06-23-2011 |
20110161129 | EXPERT LOCATOR BASED ON USER POLLING - According to one embodiment of the present invention, a method for locating experts is provided. The method includes receiving a first query from a first user requesting the identity of persons having desired skills. The names of persons in a database having the desired skills are then identified. A second query is sent to a plurality of additional users requesting the verification of the information relating to the skills of the identified persons. Responses from the plurality of users are used to amend the information relating to skills of the identified persons. | 06-30-2011 |
20110277012 | SYSTEM FOR AUGMENTING ACCESS TO RESOURCES - The different illustrative embodiments provide a method, data processing system, and computer program product for managing access to resources. A number of access permissions of a first user to a number of resources in a computer system are provided to a second user in response to a presentation of first credentials for the first user to the computer system. A level of presence of the first user relative to the computer system and/or the second user is monitored. The number of access permissions of the first user to the number of resources in the computer system continues to be provided to the second user as long as a preselected level of presence of the first user is present. | 11-10-2011 |
20110307562 | RECOMMENDATION ENGINE FOR EVENT ANALYZER WITH INTEGRATED INFORMATION - A computer implemented method manages responses to electronic messages. A computer detects a receipt of an electronic message by a recipient. The computer generates a summary of a content of the electronic message. The summary describes a need for a meeting between the recipient and an other party. The computer generates a recommendation for a communication channel for the meeting between the recipient and the other party. | 12-15-2011 |
20110321147 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 12-29-2011 |
20120005566 | ADDING A COMPREHENSION MARKER TO A SOCIAL NETWORK TEXT ENTRY - A computer implemented method provides dynamically altered versions of a comprehension marker for a social network text entry. A computer presents a comprehension marker for a text entry in a social network. The comprehension marker provides additional information to explain the text entry. Dynamically altered versions of the comprehension marker from other readers are then received and presented. | 01-05-2012 |
20120005577 | Building Mashups on Touch Screen Mobile Devices - Systems and methods of constructing mashups may involve receiving a mashup creation input via a touch screen of a mobile device. A mashup can be built based on the mashup creation input, wherein the mashup is presented to a user via the touch screen. In one example, the mashup creation input includes a selection of an icon associated with a widget. | 01-05-2012 |
20120011140 | Analytics of historical conversations in relation to present communication - A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications. | 01-12-2012 |
20120110073 | SOCIAL NETWORK INFORMED MASHUP CREATION - A plurality of mashups created by a plurality of mashup authors indicated as being in a community relevant to a mashup based, at least in part, on social network data are identified in response to indication of a mashup building operation. Frequencies of a plurality of mashup configurations used by the plurality of mashup authors in the plurality of mashups are determined according to data about the plurality of mashups. A set of one or more recommendations that are associated with a set of one or more of the plurality of mashup configurations is generated for the mashup. | 05-03-2012 |
20120117159 | COMPUTER METHOD AND SYSTEM FOR ATTACHMENT REDUCTION - Computer method, apparatus and system reduces size of attachments for an electronic communication. The method/system automatically selects a part (portion) of a working document to serve as the electronic communication attachment or upload. A monitoring unit monitors sender-user activity with respect to the working document and logs indications of the portions of the working document that are read by the user. During email composition, an attachment engine automatically selects the logged and indicated document portions to serve as an attachment reduced in size. During other electronic communication composition, such as to a blog, wiki or computer network forum, the attachment engine automatically selects the logged and indicated document portions to serve as the upload reduced in size. | 05-10-2012 |
20120117633 | Enhanced Security For Pervasive Devices Using A Weighting System - An approach is provided where one or more biometric inputs are received at a biometric receiver accessible by a mobile pervasive computing device. The biometric inputs are from a current user of the mobile pervasive computing device. One or more sets of expected biometric data are retrieved with the sets of expected biometric data corresponding to one or more authorized users of the mobile pervasive computing device. The received biometric inputs are compared with the retrieved sets of expected biometric data. Themobile pervasive computing device is secured using one or more security actions if the comparison reveals a mismatch between the biometric inputs and the retrieved sets of expected biometric data. | 05-10-2012 |
20120131677 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-24-2012 |
20120136866 | ASSISTING USERS TO INTERACT APPROPRIATELY TO CONFORM TO THE NORM OF THE SOCIAL NETWORKING GROUP - A method, system and computer program product for assisting users to interact appropriately in social networking groups. Content posts in a social networking group are scanned and parsed in order to identify the events that led to these content posts. Each event is categorized and assigned a level of importance based on various factors, such as age, the number of comments and the environmental factors. These categorized events are grouped based on importance. A baseline of normal social acceptable behavior for the social networking group is established based on these grouped categorizations. Once a baseline of normal social acceptable behavior for the social networking group has been established, the user's content posts are analyzed in light of this baseline so that the user may be informed of potential faux pas in the social networking group and provided assistance to conform to the norm of that social networking group. | 05-31-2012 |
20120157157 | Sharing Contact Information - A method for exchanging contact information includes, with a mobile computing device, establishing communication with a peer mobile computing device within a specified distance from the mobile computing device, determining if the peer mobile computing device meets a trust policy, automatically receiving contact information from the peer mobile computing device, and storing the contact information in a temporary contact list. A mobile computing system includes a processor and a memory communicatively coupled to the processor. The processor is configured to establish communication with a peer mobile computing device within a specified distance from the mobile computing device, determine if the peer mobile computing device meets a trust policy, receive contact information from the peer mobile computing device, and place the contact information in a temporary contact list stored on the memory. | 06-21-2012 |
20120159315 | ASSISTING USERS TO GENERATE DESIRED MEME IN DOCUMENT - A method, system and computer program product for assisting users to generate the desired meme in a document. A document is scanned to identify parts of speech, numerical text or numbers and images (collectively the “terms”) that provide positive/negative memes. A score for each of these terms is assigned. A score may then be assigned to each designated primary object (e.g., individual, company) discussed in the document using the scores assigned to the identified terms. Options may then be provided to modify the document to provide the type of meme (e.g., positive or negative meme) desired by the author to be associated with the particular designated primary object. Upon receiving a selection of one or more of these options, the document is modified accordingly to generate the desired meme in the document. | 06-21-2012 |
20120159400 | SYSTEM FOR LEARNED MOUSE MOVEMENT AFFINITIES - A system for learned mouse affinities, including: a context listener to determine a context in which a user is operating, wherein the context listener also listens for an occurrence of a trigger event within the context; a mouse listener to recognize a mouse action by the user; and a mapping stored on a memory device, wherein the mapping includes mouse actions mapped to context actions, wherein the context actions correspond to the trigger event, wherein the context action is implemented in response to the mouse action according to the profile and after the occurrence of the trigger event. | 06-21-2012 |
20120166188 | SELECTIVE NOISE FILTERING ON VOICE COMMUNICATIONS - Embodiments of the invention may provide the ability to selective filter sound from a voice communication, such as a telephone call, based on one or more attributes of the voice communication. Embodiments of the invention may select a filtering profile corresponding to the one or more attributes, and filter sound from the voice communication according to the selected profile. In one embodiment of the invention, the one or more attributes of the voice communication are determined from an electronic record corresponding to the voice communication, such as a calendar entry. | 06-28-2012 |
20120166245 | SYSTEM AND METHOD FOR AUTOMATIC MODERATOR DELEGATION - A method and computer program product for receiving an indication of a meeting being scheduled between a plurality of attendees. At least one of the attendees is designated a moderator of the meeting. The actions of the designated moderator are monitored to determine if the designated moderator is capable of performing one or more moderator responsibilities associated with being the designated moderator. If it is determined that the designated moderator is incapable of performing the one or more moderator responsibilities, an alternate moderator chosen from the plurality of attendees is designated. | 06-28-2012 |
20120173632 | EMAIL HISTORY HANDLER THAT CHOOSES HISTORY SEGMENTS TO INCLUDE WITH A COMMUNICATION REPLY - A response event to provide a communication reply can be detected. The reply can be to an email message which is part of an email conversation. The email conversation can include a sequence of zero or more response email messages to an initial email message as well as the initial email message. Attributes of different ones of the email messages can be queried. A quantity N can be determined based on values of the attributes being compared against at least one history criteria. The quantity of N can vary based on the values and the history criteria. A reply history set can be created that includes a set of history segments. Each history segment can correspond to one of the N different ones of the email messages of the email conversation. The reply history set can be incorporated within the communication reply. | 07-05-2012 |
20120173908 | Hibernation During Meetings - A method, computer program product, and system for hibernation during meetings is described. A method may comprise designating a base computer system of a meeting. The method may further comprise determining if a user is in the meeting. The method may also comprise hibernating a computer system associated with the user based upon, at least in part, a hibernation policy, if it is determined that the user is in the meeting. | 07-05-2012 |
20120173993 | POINT OF INTEREST PREVIEW FOR ELECTRONIC MAIL - One or more interactions of a user are monitored. Information associated with the one or more interactions is indexed. A point of interested is determined within an electronic mail message based upon, at least in part, the indexed information. An indicator of the point of interest is provided within a preview pane associated with the electronic mail message. | 07-05-2012 |
20120185472 | Relevancy Ranking of Search Results in a Network Based Upon a User's Computer-Related Activities - A computer-implemented method, system and computer program product providing ordered search results within a search engine. Items are retrieved from a network satisfying search criteria provided by a user. Computer-related activities performed by the user, including social networking activities, are determined, and the retrieved items are ranked based on the computer-related activities. The ranking of the retrieved items is dependent upon whether any retrieved item has been referenced by the social networking activities of the user, and the search results are provided including the retrieved items in order of the ranking. | 07-19-2012 |
20120233563 | Acclimatizing a User to a Scheduling Pattern Change - Acclimatizing a user to a scheduling pattern change includes: in a calendar system implemented by at least one processor, determining an anticipated scheduling pattern change for the user; establishing with the calendar system an acclimatization period to transition the user to the scheduling pattern change; receiving in the calendar system a request to schedule an event for the user at a time within the acclimatization period; and prompting the user to reschedule the event to a time outside of the acclimatization period with the calendar system. | 09-13-2012 |
20120240058 | DETECTING AND DISPLAYING USER STATUS - A method, computer program product, and system for detecting and displaying user status is described. A method may comprise receiving activity data from at least one of an audio input device, a video input device, and a command input device. The method may further comprise calculating a text availability index corresponding, at least in part, to a likelihood of a user to be available for text communication, a voice availability index corresponding, at least in part, to a likelihood of the user to be available for voice communication, and a video availability index corresponding, at least in part to a likelihood of the user to be available for video communication, wherein at least one of the text availability index, the voice availability index, and the video availability index is based upon, at least in part, the activity data. | 09-20-2012 |
20120246710 | DYNAMIC, TEMPORARY DATA ACCESS TOKEN - Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user. | 09-27-2012 |
20120254225 | GENERATING CONTENT BASED ON PERSONA - According to one aspect of the present invention, a method, operable on a processing device, for generating content based on a persona, the persona comprising one or more persona triggers and one or more persona parameters, may include analyzing, by the processing device, one or more events identified by one or more persona triggers resulting in one or more event characteristics. The method may also include performing, by the processing device, a comparison between the one or more event characteristics and one or more persona parameters. The method may also include generating content, by the processing device, based at least in part on the comparison between the one or more event characteristics and the one or more persona parameters. | 10-04-2012 |
20120254634 | PREDICTING BATTERY POWER USAGE - A method for predicting battery power usage includes, collecting information relating to battery power consumption due to tasks performed by the physical computing system powered by a battery, and notifying a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the physical computing system are projected to exhaust the battery. A computing system includes a processor, a memory communicatively coupled to the processor, and a battery to power the computing system. The processor is configured to collect information relating to battery power consumption due to tasks performed by the computing system, and notify a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the computing system are projected to exhaust the battery. | 10-04-2012 |
20120284249 | Relevancy Ranking of Search Results in a Network Based Upon a User's Computer-Related Activities - A computer-implemented method, system and computer program product providing ordered search results within a search engine. Items are retrieved from a network satisfying search criteria provided by a user. Computer-related activities performed by the user, including social networking activities, are determined, and the retrieved items are ranked based on the computer-related activities. The ranking of the retrieved items is dependent upon whether any retrieved item has been referenced by the social networking activities of the user, and the search results are provided including the retrieved items in order of the ranking. | 11-08-2012 |
20120284353 | ANALYTICS OF HISTORICAL CONVERSATIONS IN RELATION TO PRESENT COMMUNICATION - A method of analyzing historical communications. During a first communication session between a first user and at least a second user, at least a first communication exchanged between the first user and the second user can be detected and stored. A second communication exchanged in a second communication can be compared with the first communication to determine a degree of similarity between the first communication and the second communication. In one aspect, when the degree of similarity is at least a threshold value, an indication can be provided to at least one user participating in the second communication session that the first communication potentially is relevant to the second communication session and that the first communication is available to be reviewed. In another aspect, a report pertaining to hierarchical relationships between users and the context of the communications can be generated based on the first and second communications. | 11-08-2012 |
20120291053 | AUTOMATIC VOLUME ADJUSTMENT - A method for automatic volume adjustment performed by a physical computing system includes, with the computing system, determining a virtual proximity between a user and a number of applications running on the computing system, the virtual proximity based in part on a type of one of the number of applications, and with the computing system, automatically adjusting a volume of the number of applications linked with a sound peripheral connecting to the computing system, the volume of each of the number of applications being based on the virtual proximity. | 11-15-2012 |
20120327456 | WORKGROUP MANAGEMENT OF CATEGORIZED PRINT JOBS - Embodiments of the present invention provide a method, system and computer program product for managing categorized workgroup print jobs. In an embodiment of the invention, a method for workgroup management of categorized print jobs includes receiving from an end user a print job designated for printing in a workgroup printer and determining from the print job whether the print job is should or should not be printed based on its categorization. It additionally can be determined whether or not printing the print job on behalf of the end user encroaches within a threshold value of a remaining allocation of printing resources established for the end user. Finally, in response to determining both that the print job is within a specific category and also that the printing of the print job on behalf of the end user encroaches within the threshold value of the remaining allocation of printing resources established for the end user, further processing of the print job can be restricted. | 12-27-2012 |
20120330951 | PROVIDING ACCURATE RECIPIENT LISTS BY CORRELATING TAGGED KEYWORDS TO RECIPIENT LISTS - A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used. | 12-27-2012 |
20130007140 | SELECTIVE DELIVERY OF CONTENT VIA ELECTRONIC MAIL - A method that includes identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients are to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients. | 01-03-2013 |
20130007154 | SELECTIVE DELIVERY OF CONTENT VIA ELECTRONIC MAIL - A method that includes identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients are to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients. | 01-03-2013 |
20130007481 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130007487 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130007746 | Working sets of sub-application programs of application programs currently running on computing system - A pattern corresponds to a task that a computing system can perform. The pattern at least indirectly identifies one or more sub-application programs of one or more application programs that the computing system can run and that are relevant to the task. Application of the pattern to sub-application programs of application programs currently running on the computing system identifies a working set of one or more sub-application programs of one or more application programs currently running on the computing system and that are relevant to the task. The computing system hides, within a graphical user interface that the computing system presents, the sub-application programs of the application programs currently running on the computing system that are not part of the working set, and the application programs currently running on the computing system that do not include any sub-application program that is part of the working set. | 01-03-2013 |
20130030682 | IDENTIFICATION OF A PERSON LOCATED PROXIMITE TO A CONTACT IDENTIFIED IN AN ELECTRONIC COMMUNICATION CLIENT - A method, which includes, within an electronic communication client, identifying a first person. Via a processor, at least a second person geographically located proximate to a geographic location associated with the first person can be identified. The method further can include, within the electronic communication client, indicating that the second person is geographically located proximate to the geographic location associated with the first person. | 01-31-2013 |
20130036344 | INTELLIGENT LINK POPULATION AND RECOMMENDATION - Computer apparatus, system and method maintain a database of hyperlinks associated with activities and inactions in the past of a user. From a current work space of the user, a recommendation engine searches the database to retrieve hyperlinks based on user-specified context and topic. The recommendation engine displays recommended hyperlinks (candidates) and enables the user to filter the recommended hyperlinks by original source, activity metric or other relevance. To form and maintain the database, a context analysis engine captures activity content links. Each activity content link has a respective hyperlink associated with an activity/inaction of the user. The context analysis engine generates a metric based on the activity and records the respective hyperlink in the database along with the metric. The recommendation engine and context analysis engine may, on user command, further search social media or social networks in order to make hyperlink recommendations to the user. | 02-07-2013 |
20130091224 | Managing Meetings Relative to Messages - Methods and systems of managing meetings may involve intercepting an outgoing message from a sender to a recipient, and conducting an analysis of the outgoing message with respect to a calendar associated with the sender. In addition, delivery of the message may be suspended if the analysis indicates that the sender and the recipient have a scheduled meeting. In one example, the outgoing message includes at least one of an email message, a chat message and a text message. | 04-11-2013 |
20130097248 | COMMUNICATIONS SECURITY BY ENFORCING OFFLINE CONSUMPTION AND AUTO-TERMINATION OF ELECTRONIC MESSAGES - A restrictive presentation system can receive an electronic message configured for offline consumption expressed as user-specified delivery conditions. The electronic message can be securely conveyed to a computing device in an online state using a communications network. A client application of the restrictive presentation system can be installed upon the computing device and can receive the electronic message. The client application can detect a change of the computing device from the online state to the offline state. In response to user-acceptance, the electronic message can be presented upon the computing device while in the offline state. Upon user-termination of the presentation, the electronic message can be automatically deleted from a storage location of the computing device. When the computing device returns to the online state, the client application can notify the restrictive presentation system of the offline consumption. | 04-18-2013 |
20130103677 | CONTEXTUAL DATA VISUALIZATION - A method for contextual data visualization includes receiving data selected by a user and meta-data associated with the data. The data is analyzed, using a processor of a computing device, to determine content and structure attributes of the data that are relevant to visualization of the data. The meta-data is analyzed, using a processor of the computing device, to determine a context in which the visualization of the data will be used. A database comprising an aggregation of visualization records from a plurality of users is accessed and at least one template from the data visualization records that matches the data attributes and context is selected. A data visualization is created by applying at least one template to the data. | 04-25-2013 |
20130103756 | IDENTIFICATION TO A RECIPIENT OF AN E-MAIL OF ANOTHER USER WHO HAS ACCESSED THE E-MAIL - A method of utilizing electronic communication activity information. The method can include receiving from each of a plurality of electronic communication clients activity information relating to activities of a respective electronic communication recipient accessing information associated with the electronic communication. Based on the received activity information, via a processor, each of the electronic communication recipients can be rated to generate at least one recommendation as to who is able to provide information pertaining to the electronic communication. The recommendation can be communicated to another electronic communication recipient. | 04-25-2013 |
20130144672 | Analytics-Based Community Value Meetings - Methods and systems of managing meetings may involve scheduling a meeting, and monitoring one or more invitee communications prior to the meeting. In addition, a prioritization may be conducted of one or more attributes of the meeting based on the one or more invitee communications. | 06-06-2013 |
20130179479 | INTELLIGENT FILE MANAGEMENT - In one example, an indication is detected that an application has performed a file operation on a file and a computing system determines whether a datastore includes an association between an application identifier that identifies the application and a file identifier that identifies the file. If not, the association between the application identifier and the file identifier is stored. A computing system also determines whether execution behavior of the application changes when the file is not accessible to the application. Responsive to a change in execution behavior of the application, a status indicator is associated with the file identifier to indicate that the execution behavior of the application changes when the file is not accessible to the application. | 07-11-2013 |
20130318433 | AUTOMATIC TARGETING OF BROWSER CONTENT TO OPTIMAL RENDERING ENGINE - Embodiments of the present invention provide a method, system and computer program product for content driven selection of a rendering engine. In an embodiment of the invention, a method for or content driven selection of a rendering engine can include retrieving content for display in a content browser executing in memory by a processor of a host computer, mapping at least one directive embedded in the retrieved content to a target rendering engine, selecting the target rendering engine for rendering the content, and passing the content to the selected target rendering engine. In this regard, in an aspect of the embodiment, multiple directives embedded in the retrieved content can be mapped, each to one of a selection of different target rendering engines, and a most often mapped one of the target rendering engines can be selected for rendering the content. | 11-28-2013 |
20130325799 | AUTOMATIC REPLICATION OF AMBIGUOUS DATA BASED ON A POINT SYSTEM - A method for automatic data synchronization between a source system and a buffer system. The method includes identifying a configurable set of penalties, wherein each penalty defines a number of penalty points associated with a respective one of a plurality of events related to data set stored by the source system. The method also includes, in response detecting one or more events, calculating a total penalty score using the penalty points corresponding to each of the events. The method also includes determining that the total penalty score satisfies a predetermined penalty threshold indicating that the copy of the data set stored on the buffer system is presumed stale and, in response, initiating a data replication operation that updates the copy of data set stored on the buffer system with current data from the data set stored on the source system. | 12-05-2013 |
20130325919 | RESOLVING A DEAD SHORTENED UNIFORM RESOURCE LOCATOR - A method of resolving a dead shortened Uniform Resource Locator (URL) comprising, with a processor, recognizing that a shortened link is a dead link, gathering data associated with the dead link, comparing data associated with the dead link with a number of potential live links, and generating a ranked list of potential live links that have been compared with the associated data. A system for resolving a dead shortened Uniform Resource Locator (URL) posted within a status update of a social networking site, comprising, a processor and a discovery module, in which the discovery module, upon selection of a shortened URL by a user of the social networking site, recognizes that the shortened URL is a dead shortened URL, gathers data associated with the status update, and redirects the user to a live URL based on the data associated with the status update. | 12-05-2013 |
20130325951 | INTELLIGENT PRESENTATION OF MULTIPLE PROXIMATE AUDIBLE ALERTS - A computing device can receive an incoming message. The incoming message can be one directed to a set of different client machines at approximately the same time. The computing device can perform a mitigation action that alters a presentation characteristic of the audible alert for the incoming message. The mitigation action ensures that the computing device and at least a subset of the other client devices within a predefined audio range of the computing device do not audibly present alerts for the incoming message in an unsynchronized manner. | 12-05-2013 |
20130332816 | PAGE PEGGING - Methods and systems of displaying response data provide for initiating a retrieval of response data such as a web page and initiating an update of the web page to a screen having a display area. Additionally, a user selection of a subset of the display area can be detected, wherein the subset of the display area is defined as a pegged area corresponding to a subset of the web page. Moreover, at least the subset of the web page may be prevented from being updated to the screen in response to the user selection while retrieval of the web page continues. | 12-12-2013 |
20130346841 | Tracking Interactions with a Shared Link Through a Chain of Forwarding - Mechanisms are provided for tracking link sharing in a messaging environment of a data processing system. Message information is received that identifies a plurality of links to content included in one or more messages exchanged via the data processing system. A relationship measure is determined based on the message information. The relationship measure measures a likelihood that a first link is related to a second link in the plurality of links and points to a same source of content. An association data structure associating the first link with the second link is generated based on the relationship measure. User interactions with the first link and the second link are tracked based on the generated association data structure. | 12-26-2013 |
20140006507 | Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings | 01-02-2014 |
20140006768 | SELECTIVELY ALLOWING CHANGES TO A SYSTEM | 01-02-2014 |
20140007206 | Notification of Security Question Compromise Level based on Social Network Interactions | 01-02-2014 |
20140007242 | Notification of Security Question Compromise Level based on Social Network Interactions | 01-02-2014 |
20140007247 | Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings | 01-02-2014 |
20140037080 | THRESHOLD ACTIVATED TELECONFERENCING - Embodiments of the present invention provide a method, system and computer program product for threshold activation of an audio teleconference. In an embodiment of the invention, a method for threshold activation of an audio teleconference is provided. The method includes receiving calls into a conference bridge for an audio conference and determining whether or not a threshold number of calls from corresponding callers have been received for the audio conference. The method also includes initiating the audio conference responsive to a threshold number of callers having called into the audio conference, but prohibiting initiation of the audio conference until the threshold number of callers have called into the audio conference. | 02-06-2014 |
20140040763 | MANAGING ACTIVE GUI ELEMENTS REMOTELY - A method, system or computer usable program product for selectively forwarding activated graphical user interface (GUI) elements from a source system to a remote device for user interaction including configuring the source system for selectively forwarding to the remote device activated GUI elements that are for front of screen display on the source system, receiving user preferences for GUI elements to forward to the remote device, in response to a user request, identifying an activated GUI element for front of screen display on the source system and related information that meets the user preferences, and forwarding only the identified GUI element and related information to the remote device for interaction with the user. | 02-06-2014 |
20140052716 | Automatic Determination of Question in Text and Determination of Candidate Responses Using Data Mining - A method, a system and a computer program product provide responses to inquiries residing within text processed by an application. An inquiry is identified within text being processed by the application, and a context of the identified inquiry is determined One or more available data sources is searched to produce a series of responses to the identified inquiry, and the series of responses is evaluated to rank and determine an accuracy level value for each response. The ranked responses along with associated accuracy levels can be displayed. | 02-20-2014 |
20140052791 | Task Based Filtering of Unwanted Electronic Communications - Mechanisms are provided for dynamically generating a task-based filter rule for filtering electronic communications. Characteristic data for at least one of electronic communications exchanged by, or user interactions performed via, a data processing system are collected. The characteristic data is automatically analyzed to determine if a task-based filter rule is to be generated. The task-based filter rule is automatically generated in response to determining that the characteristic data satisfies the dynamic task-based filter rule creation condition. Future electronic communications are automatically filtered by applying the task-based filter rule to the future electronic communications such that electronic communications satisfying a condition of the task-based filter rule are not filtered out. | 02-20-2014 |
20140062895 | FINGERTIP MULTI-TOUCH INPUT DEVICE - Some embodiments of the inventive subject matter include a method for using a multi-touch device to enter multi-touch user input on a multi-touch display device. The method can include initiating a multi-touch mode for a computing device including a multi-touch display. The method can also include touching the multi-touch display with a multi-touch device, wherein the multi-touch device includes a sleeve configured to hold the multi-touch device to a finger, and a plurality of nubs connected to the sleeve and protruding radially outward from the sleeve, wherein the plurality of nubs make contact with multi-touch device. The method can also include moving the multi-touch device across the multi-touch touchscreen to provide user input. | 03-06-2014 |
20140067966 | VIRTUAL DISCUSSION THREADS FOR ACTIVITIES IN A TRUSTED NETWORK - Managing discussion threads within an electronic communication system includes detecting that an electronic message sent from a sender to a first recipient is forwarded from the sender to a second recipient and, responsive to the detecting, identifying at least one electronic message related to the forwarded message exchanged between the sender and the second recipient as a virtual discussion thread. A client is notified of that the virtual discussion thread exists and is correlated with the electronic message from the sender. The virtual discussion thread is provided to the client of the first recipient. | 03-06-2014 |
20140075292 | PROCESSING URLs ON TOUCHSCREENS - Some embodiments of the inventive subject matter may include a method shortening text on a touchscreen computing device. The method can include detecting touch input on a touchscreen. The method can include determining a selected input text appearing on the touchscreen. The method can include determining the selected input text to be shortened. The method can include determining a length of a shortened output text. The method can include transmitting the selected input text and the length of the shortened output text to an external shortener for shortening and registration. The method can include presenting the shortened output text on the touchscreen. | 03-13-2014 |
20140101607 | DISPLAYING QUANTITATIVE TRENDING OF PEGGED DATA FROM CACHE - Methods and systems of displaying response data provide for identifying a pegged area of display content during a first retrieval of the display content by a client device at a first moment in time. Additionally, first data associated with the pegged area may be stored, wherein a comparison can be conducted between the first data and additional data associated with the pegged area at one or more subsequent moments in time. In one example, a user interface is generated that highlights a quantitative trend of the pegged area between the first moment in time and the one or more subsequent moments in time. | 04-10-2014 |
20140137258 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-15-2014 |
20140164719 | CLOUD MANAGEMENT OF DEVICE MEMORY BASED ON GEOGRAPHICAL LOCATION - An apparatus and computer program product for managing memory of a device is disclosed. A computer system collects information about use, by the device, of data in the memory of the device. The information collected by the computer system includes a time and a location for which each portion of the data is used by the device. The computer system identifies patterns of use, by the device, of each portion of the data based on the information collected. The computer system then selects one or more portions of the data that are not needed in the memory of the device based on the patterns of use by the device. | 06-12-2014 |
20140164721 | CLOUD MANAGEMENT OF DEVICE MEMORY BASED ON GEOGRAPHICAL LOCATION - A method for managing memory of a device is disclosed. A computer system collects information about use, by the device, of data in the memory of the device. The information collected by the computer system includes a time and a location for which each portion of the data is used by the device. The computer system identifies patterns of use, by the device, of each portion of the data based on the information collected. The computer system then selects one or more portions of the data that are not needed in the memory of the device based on the patterns of use by the device. | 06-12-2014 |
20140184820 | SELECTING IMAGE OR VIDEO FILES FOR CLOUD STORAGE - A method responsive to receiving a data from a computing device connected to the computer in a cloud computing system or data center, identifies a criteria associated with the computing device, responsive to identifying the criteria, determines whether the data is authorized for transmission to a storage in the cloud computing system or data center, and responsive to determining that the data is authorized for transmission to the storage, forwards the data to the storage. | 07-03-2014 |
20140189110 | AUTONOMIC OPTIMIZATION OF PRESENCE SERVER PERFORMANCE - A presence system comprises a presence server and a plurality of users in a distributed community of users that are associated with the presence server. The presence server selects a set of mediators, e.g., based upon a predetermined event, or other suitable factors, wherein each mediator is associated with a subset of the plurality of users. The presence server communicates presence information to the mediators where each mediator receives presence information regarding subscribed-to presence information for the users in their associated subset of users. Each mediator communicates the subscribed-to presence information to associated ones of the users in their associated subset of users. | 07-03-2014 |
20140189803 | SELECTING IMAGE OR VIDEO FILES FOR CLOUD STORAGE - A method, apparatus, and computer program product, responsive to receiving a data from a computing device connected to the computer in a cloud computing system or data center, identifies a criteria associated with the computing device, responsive to identifying the criteria, determines whether the data is authorized for transmission to a storage in the cloud computing system or data center, and responsive to determining that the data is authorized for transmission to the storage, forwards the data to the storage. | 07-03-2014 |
20140195618 | SYSTEM AND METHOD FOR UNFILTERING FILTERED STATUS MESSAGES - An approach for unfiltering a filtered electronic communication is provided. In one aspect, a computer system receives filtered electronic communication, wherein the filtered electronic communication is a status message. Moreover, the computer system determines a requestor of the filtered electronic communication. The computer system also detects an attempt made to communicate with the requestor. Furthermore, the computer system unfilters, in response to the attempt, the filtered electronic communication. | 07-10-2014 |
20140237042 | ENHANCED NOTIFICATION FOR RELEVANT COMMUNICATIONS - Embodiments of the present invention disclose a method, computer program product, and system for providing a severity of a notification for a communication. A computing device determines a topic and associated information of a current activity, operating on the computing device. The computing device receives a communication and determines the topic and associated information of the communication. The computing device determines a level of relevance between the topic and associated information of the received communication and the topic and associated information of the current activity. The computing device determines whether the level of relevance exceeds a predefined threshold, and in response to determining that the level of relevance exceeds the predefined threshold, the computing device provides a notification, wherein the severity of the notification for the communication is proportional to the level of relevance. | 08-21-2014 |
20140280006 | MANAGING TEXT IN DOCUMENTS BASED ON A LOG OF RESEARCH CORRESPONDING TO THE TEXT - A method and apparatus for managing text is disclosed. A data processing system identifies a log of research and text in a document that matches the log of research. The data processing system determines whether a mismatch exists between a search result for the text in the document and the log of research. Responsive to determining the mismatch exists between the search result for the text and the log of research, the data processing system then modifies the text in the document based on the log of research. | 09-18-2014 |
20140288988 | Acclimatizing a User to a Scheduling Pattern Change - A method of acclimatizing a user to a scheduling pattern change includes, in a calendar system implemented by at least one processor, determining an anticipated scheduling pattern change from a current scheduling pattern to a new scheduling pattern for the user; and establishing with the calendar system an acclimatization period to transition the user to the scheduling pattern change. | 09-25-2014 |
20140304023 | EXTENDING CALENDAR SYSTEM TO EXECUTE DISCOVERABLE TASKS PRIOR TO THE MEETING - There are provided a method, a system and a computer program product for managing an on-line meeting. The system determines one or more tasks to prepare for the on-line meeting. The system calculates a time period that takes in order to complete the one or more tasks before the on-line meeting starts. The system runs the one or more tasks the calculated time period ahead before the on-line meeting starts. | 10-09-2014 |
20140310395 | User-Influenced Page Loading of Web Content - Methods and systems may provide for identifying a usage pattern for web content having a plurality of components and receiving a web response from a server, wherein the web response includes the web content. Additionally, a client-side override of the load order of the plurality of components may be conducted based on the usage pattern. In one example, a cookie is generated based on the usage pattern, wherein the cookie is used to conduct the client-side override. | 10-16-2014 |
20140319206 | ACCESSING TRANSACTION DOCUMENTS - According to one embodiment of the present invention, a system accesses transaction documents. A unique code is generated for each transaction for one or more products, wherein the unique code is associated with a transaction document including transaction information and each product is associated with a product code. The system stores the unique code and corresponding one or more product codes associated with each transaction, and accesses one or more transaction documents based on an identifier of at least one product associated with a corresponding transaction of the one or more transaction documents. Embodiments of the present invention further include a method and computer program product for accessing transaction documents in substantially the same manners described above. | 10-30-2014 |
20140337380 | EXPERT LOCATOR BASED ON USER POLLING - According to one embodiment of the present invention, a method for locating experts is provided. The method includes receiving a first query from a first user requesting the identity of persons having desired skills. The names of persons in a database having the desired skills are then identified. A second query is sent to a plurality of additional users requesting the verification of the information relating to the skills of the identified persons. Responses from the plurality of users are used to amend the information relating to skills of the identified persons. | 11-13-2014 |
20140337440 | HISTORICAL CONTEXT FOR COMMUNICATION - A method, computer program product, and system is described. A communication session transcript is identified. A chat session input is received. The chat session input is associated with an inactive portion of the communication session transcript. The chat session input is provided to a recipient, in context with the inactive portion of the communication session transcript. | 11-13-2014 |
20140337695 | PRESENTING A LINK LABEL FOR MULTIPLE HYPERLINKS - Presenting a link label for multiple hyperlinks includes presenting a layered data element in an electronic message with a link label that represents multiple hyperlinks in a display, designating an active hyperlink from the multiple hyperlinks based on specific criteria associated with a recipient of the electronic message, and directing the recipient of the electronic message to an online location of the active hyperlink in response to user input selecting the link label. | 11-13-2014 |
20140337702 | PRESENTING A LINK LABEL FOR MULTIPLE HYPERLINKS - Presenting a link label for multiple hyperlinks includes presenting a layered data element in an electronic message with a link label that represents multiple hyperlinks in a display, designating an active hyperlink from the multiple hyperlinks based on specific criteria associated with a recipient of the electronic message, and directing the recipient of the electronic message to an online location of the active hyperlink in response to user input selecting the link label. | 11-13-2014 |
20140344328 | DATA COLLECTION AND DISTRIBUTION MANAGEMENT - According to embodiments of the invention, a method, a computer readable storage medium, and a computer system for data collection and distribution are provided. The method may include receiving an electronic request for data from a data provider, wherein the request includes one or more characteristics of the client device. The method may also include identifying, as a function of the characteristics of the client device, a data set to be returned to the client in fulfillment of the request. The method may also include determining whether a cache of the data collector contains data sufficient to create the data set. The method may also include collecting, in response to determining that the cache does not contain data sufficient to create the data set, data from the data provider that is sufficient to create the data set. The method may also include providing the data set to the client device. | 11-20-2014 |
20140359474 | MAXIMIZING INFORMATION CONSUMPTION IN EMBEDDED EXPERIENCE APPS/POP-UPS AND NEWSFEED/ACTIVITY STREAMS - A system, method and computer program product for controlling information to be displayed on a display device may be provided. The system may display on a first display view, electronic data which includes interactable data. The system may detect that the interactable data is selected by a user. The system may identify redundant data between the electronic data and content to be rendered responsive to selecting the interactable data. The system may hide the identified redundant data from the content to be rendered or the original content of the electronic data. The system may display, on a second display view, the content without the identified redundant data. | 12-04-2014 |
20150026267 | TARGETED MESSAGE RESPONSE - A tool for targeting a message response. The tool monitors reactions of a user to message subject lines, message content, and social networks. The tool analyzes user interest data and calculates a user interest rating per keyword. Rated keywords are stored in association with the user. When a user drafts a message addressed to a recipient, the tool compares rated keywords within the recipient's log with the subject line and message content. The tool suggests an alternative subject line likely to elicit a faster and more detailed response from the recipient. | 01-22-2015 |
20150051933 | ASYNCHRONOUS FEED OF TAGGED CONTENT BASED ON TIME CRITERIA - In one example, an asynchronous feed of tagged content based on time criteria includes tagging content into content segments and tagging the content with a duration. The method also includes scheduling consumption of the content segments using a schedule at least one user and providing the content segments through an asynchronous feed. Additionally, a computing device for an asynchronous feed of tagged content based on time criteria is provided. | 02-19-2015 |
20150051934 | ASYNCHRONOUS FEED OF TAGGED CONTENT BASED ON TIME CRITERIA - In one example, an asynchronous feed of tagged content based on time criteria includes tagging content into content segments and tagging the content with a duration. The method also includes scheduling consumption of the content segments using a schedule at least one user and providing the content segments through an asynchronous feed. Additionally, a computing device for an asynchronous feed of tagged content based on time criteria is provided. | 02-19-2015 |
20150058236 | MANAGING AN INITIAL POST ON A WEBSITE - Managing an initial post on a website includes identifying an initial post on website where the initial post is for an event, identifying a related post that describes the event after the event occurs, and updating the initial post to include content of the related post. | 02-26-2015 |
20150058750 | MANAGING AN INITIAL POST ON A WEBSITE - Managing an initial post on a website includes identifying an initial post on website where the initial post is for an event, identifying a related post that describes the event after the event occurs, and updating the initial post to include content of the related post. | 02-26-2015 |
20150066978 | SOCIAL NETWORKING INFORMATION CONSUMPTION GAP RESOLUTION - Social network content consumption activities of social network users related to content published by at least one social network are monitored. The monitored social network content consumption activities of each of at least two of the social network users are compared. A determination is made, based upon the comparison, that a difference in consumption of the published content exists between the at least two of the social network users. A notification is generated to any of the at least two of the social network users determined, based upon the difference in consumption, to have consumed less of the published content than at least one other social network user. | 03-05-2015 |
20150067046 | SOCIAL NETWORKING INFORMATION CONSUMPTION GAP RESOLUTION - Social network content consumption activities of social network users related to content published by at least one social network are monitored. The monitored social network content consumption activities of each of at least two of the social network users are compared. A determination is made, based upon the comparison, that a difference in consumption of the published content exists between the at least two of the social network users. A notification is generated to any of the at least two of the social network users determined, based upon the difference in consumption, to have consumed less of the published content than at least one other social network user. | 03-05-2015 |