Patent application number | Description | Published |
20110321143 | CONTENT PROTECTION USING AUTOMATICALLY SELECTABLE DISPLAY SURFACES - Embodiments of the invention are directed to systems and methods for protecting content by automatically identifying a display surface viewable only to authorized users and displaying protected content on the identified display surface. In one example embodiment, content is displayed on a first display surface in viewable range of a first user authorized to view the content. The entrance of a second user into viewable range of the first display surface is detected, and automatically determined to be unauthorized to view the content. A second display surface in viewable range of the first user but not viewable by the second user is automatically identified in response to detecting the entrance of the second, unauthorized user into viewable range of the first display surface. The display of the content is automatically moved from the first display surface to the second display surface to prevent the content from being viewed by the unauthorized user. | 12-29-2011 |
20120262569 | VISUAL OBSTRUCTION REMOVAL WITH IMAGE CAPTURE - An object located within an image foreground relative to image content within a field of view of at least one camera lens is identified, using image processing module, as an image obstruction. Responsive to identifying the image obstruction, points of view of at least one camera lens are determined that provide image content portions of the image content that, in combination, yield a complete image of the image content without the image obstruction located within the image foreground. The image content portions are combined to yield the complete image of the image content without the image obstruction located within the foreground. The combined complete image is stored to a memory. | 10-18-2012 |
20120262572 | VISUAL OBSTRUCTION REMOVAL WITH IMAGE CAPTURE - An object located within an image foreground relative to image content within a field of view of at least one camera lens is identified, using image processing module, as an image obstruction. Responsive to identifying the image obstruction, points of view of at least one camera lens are determined that provide image content portions of the image content that, in combination, yield a complete image of the image content without the image obstruction located within the image foreground. The image content portions are combined to yield the complete image of the image content without the image obstruction located within the foreground. The combined complete image is stored to a memory. | 10-18-2012 |
20130225260 | ADAPTIVE DIFFICULTY IN A MULTIPLAYER GAMING ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for adapting game difficulty through dynamic map generation in a multi-player gaming environment. In an embodiment of the invention, a method for adapting game difficulty through dynamic map generation in a multi-player gaming environment is provided. The method includes creating in memory of a computer a multi-player gaming environment. The method also includes identifying a player in the multi-player gaming environment, looking up performance data of the identified player and correlating the performance data of the identified player with a feature of the multi-player gaming environment. Finally, the method includes modifying the multi-player gaming environment to account for the correlated feature. | 08-29-2013 |
20130232376 | Managing A Storage Device Using A Hybrid Controller - Methods, apparatuses, and computer program products for managing a storage device using a hybrid controller are provided where the storage device comprises an internal peripheral component interconnect express (PCIe) interface to control solid state memory within the storage device. In particular embodiments, the storage device includes a first external interface configured to establish an external PCIe link and a second external interface configured to establish at least one of an external serial attached small computer system interface (SAS) link and an external serial advanced technology attachment (SATA) link. Embodiments include receiving from an external source, by the hybrid controller, a first command at the first external interface and a second command at the second external interface; and concurrently implementing, by the hybrid controller, the first command using a PCIe protocol and the second command using one of a SAS protocol and a SATA protocol. | 09-05-2013 |
20130238313 | DOMAIN SPECIFIC NATURAL LANGUAGE NORMALIZATION - Embodiments of the present invention provide a method, system and computer program product for the domain specific normalization of a corpus of text. In an embodiment of the invention, a method for domain specific normalization of a corpus of text is provided, including an industrial, organization, demographic or geographic domain. The method includes loading a corpus of text in memory of a computer and determining a domain for the corpus of text. The method also includes retrieving a lexicon of replacement words for the determined domain. Finally, the method includes text simplifying the corpus of text using the retrieved lexicon. In one aspect of the embodiment, the domain is determined through inference based upon words already presence in the corpus of text. In another aspect of the embodiment, the domain is determined based upon meta-data provided with the corpus of text. | 09-12-2013 |
20130244623 | Updating Contact Information In A Mobile Communications Device - Updating contact information in a mobile communications device, including: identifying, by the mobile communications device, call information associated with an inbound call; identifying, by the mobile communications device, contact information stored in the mobile communications device that is associated with the call information; determining, by the mobile communications device, whether the contact information stored in the mobile communications device includes information contained in the call information; and responsive to determining that the contact information stored in the mobile communications device does not include information contained in the call information, updating, by the mobile communications device, the contact information stored in the mobile communications device in dependence upon the call information. | 09-19-2013 |
20130275850 | AUTONOMIC VISUAL EMPHASIS OF PREVIEWED CONTENT - Embodiments of the present invention provide a method, system and computer program product for the visual emphasis of previously viewed content. In an embodiment of the invention, a method for visual emphasis of previously viewed content has been provided. The method can include identifying an end user viewing content loaded in a content reader executing in memory of a computer and tracking a gaze of the end user to determine a portion of the content viewed by the end user. The method also includes storing a reference to the portion of the content in a data store in connection with the identified end user. Finally, the method can include subsequently responding to a re-loading of the content in the content reader by the end user by visually emphasizing the portion of the content referenced in the data store. | 10-17-2013 |
20130346955 | CALENDAR AWARE ADAPTIVE PATCHING OF A COMPUTER PROGRAM - Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management. | 12-26-2013 |
20140012494 | COLLABORATIVE GPS TRACKING - A collaborative GPS navigation system and method enables nearby vehicles to share and compare planned route for improving navigation. While navigating along a planned route, a navigation device on a first vehicle may detect a specific, slower-moving second vehicle. The navigation device on the first vehicle may obtain the planned route of the second vehicle, compare the two planned routes to identify a shared route segment, and dynamically revise the planned route and route metrics according to the comparison. | 01-09-2014 |
20140013093 | PINOUT ADJUSTMENT RESPONSIVE TO SYSTEM ORIENTATION - A unit of information technology equipment (ITE), such as a compute node or a network switch, comprises a system board in communication with network connectors that selectively connect to a network interconnect, a gravity sensor for detecting a first orientation and a second orientation of the system board, and a basic input/output system (BIOS) in communication with the gravity sensor to receive a signal identifying whether the system board is in the first or second orientation. The ITE further comprises a network ASIC (application specific integrated circuit) that inverts the pinout of transmit and receive signals in the network connectors in response to a command from the BIOS indicating that the system board is in the second orientation. A system may comprise a first ITE in a first orientation that interlocks with a second ITE in a second orientation that is inverted 180 degrees from the first orientation. | 01-09-2014 |
20140020003 | DYNAMIC BANDWIDTH REDUCTION OF TRANSMISSION STREAMS - A processor implemented method conserves bandwidth capacity by reducing the amount of bandwidth that is used in a communication channel between a content transmitting server and a content receiving client computer while streaming multimedia content. A content receiving client computer receives a multimedia streaming content from a content transmitting server. The multimedia streaming content has a video component and an audio component. In response to determining that a user of the content receiving client computer is no longer watching the video component of the multimedia streaming content, a processor generates and transmits an inattention alert to the content transmitting server. The inattention alert directs the content transmitting server to stream only the audio component of a remaining portion of the multimedia streaming content to the content receiving client computer. | 01-16-2014 |
20140029193 | COMPUTER SYSTEM COOLING USING AN EXTERNALLY-APPLIED FLUID CONDUIT - A computer system includes a rack-mountable server unit with a closed server housing. The server housing has a channel with a recessed channel wall in conductive thermal communication with a processor or other heat-generating component. An elongate conduit is received into the channel of the server housing in conductive thermal communication with an external surface of the server housing. The server is cooled by conductive fluid flow through the conduit, with no appreciable airflow through the server housing. The system may be operated in an optional burst cooling mode, wherein a volume of cooling fluid is trapped in the conduit for a period of time before being quickly released. | 01-30-2014 |
20140032628 | DYNAMIC OPTIMIZATION OF COMMAND ISSUANCE IN A COMPUTING CLUSTER - Embodiments of the present invention provide a method, system and computer program product for dynamic optimization of command sequencing in a computing cluster. In an embodiment of the invention, a method for dynamic optimization of command sequencing in a computing cluster can include selecting a set of nodes in the computing cluster to receive a single command and probing the nodes of the set to compute a computer communications latency for each of the nodes. Thereafter, the single command can be transmitted to the nodes in the set according to a sequence determined by the computed computer communications latency for each of the nodes. | 01-30-2014 |
20140032833 | Dynamic Disk Space Management In A File System - Dynamic disk space management in a file system, including: assigning, by a disk utilization manager upon creation of each file in the file system, a unique identifier to the file; tracking, by the disk utilization manager for each file in the file system, file characteristics in dependence upon the unique identifier of the file; prioritizing, by the disk utilization manager in dependence upon the tracked file characteristics and a predefined set of prioritization criteria, files in the file system; tracking, by the disk utilization manager, utilization of disk drive space; and, upon utilization of disk drive space exceeding a predetermined maximum threshold, reducing, by the disk utilization manager in dependence upon the priorities of files, disk drive space utilization to no greater than a predetermined capacity. | 01-30-2014 |
20140032834 | Managing A Solid State Drive ('SSD') In A Redundant Array Of Inexpensive Drives ('RAID') - Managing a solid state drive (‘SSD’) in a Redundant Array of Inexpensive Drives (‘RAID’), including: detecting, by a RAID engine, a number of cell failures of the SSD exceeding a predetermined threshold; responsive to detecting the number of cell failures of the SSD exceeding the predetermined threshold: redirecting, by the RAID engine, a write of data not originally stored in the RAID to a drive in the RAID other than the SSD; and redirecting, by the RAID engine, writes originally directed to data stored on the SSD to another drive in the RAID, including unmapping the data stored on the SSD. | 01-30-2014 |
20140057723 | DYNAMIC QUALITY OF SERVICE MANAGEMENT IN MULTIPLAYER GAMING - Embodiments of the present invention provide a method, system and computer program product for dynamic quality of service (QoS) management for multi-player gaming. In an embodiment of the invention, a method for dynamic QoS management for multi-player gaming is provided. The method includes monitoring a multi-player game and detecting a game moment for a game player in the multi-player game. The method also includes determining a degree of sensitivity for the game moment and enhancing access to a computing resource of the game player in response to determining the game moment to be highly sensitive. In one aspect of the embodiment, the method additionally includes detecting a subsequent game moment for the game player in the multi-player game, determining a degree of sensitivity for the subsequent game moment, and reducing access to the computing resource of the game player in response to determining the game moment to be less sensitive. | 02-27-2014 |
20140068323 | REMAPPING DISK DRIVE I/O IN RESPONSE TO MEDIA ERRORS - A method for handling media errors during a read operation on a data storage device. The method comprises detecting that a first file and a second file are duplicates, wherein the first file is stored on a first storage device. Metadata is written to the first storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the method reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 03-06-2014 |
20140068324 | ASYNCHRONOUS RAID STRIPE WRITESTO ENABLE RESPONSE TO MEDIA ERRORS - A method includes detecting that a first file and a second file are duplicates, and storing the first file and the second file to a target storage device. Metadata is written to the target storage device in association with the first file, wherein the metadata identifies the location of the second file that is a duplicate of the first file. Later, an application program requests a first read operation to read the first file. In response to a media error that results from the first read operation, the target storage device reads the metadata associated with the first file to identify the location of the second file, performs a second read operation to read the second file instead of the first file, and provides the second file to the application program in satisfaction of the requested first read operation. | 03-06-2014 |
20140068586 | CALENDAR AWARE ADAPTIVE PATCHING OF A COMPUTER PROGRAM - Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management. | 03-06-2014 |
20140069680 | EXTENDABLE COMPONENT POWER CABLE - A component power cable having a pair of elongate conductive members each connected at a first end to a power distribution unit connector and at a second end to a component power supply connector, wherein the cable has sufficient resilience to impart a generally collapsed configuration to the component power cable, with the first end generally proximal to the second end. The component power cable is extendable from the collapsed configuration to an extended configuration by displacement of the first end to a position distal to the second end, wherein energy stored in the resilient cable by such displacement restores the component power cable to the collapsed configuration upon return of the first end to a position proximal the second end. The resilience may be provided by a spring element or by an elastomeric sheath. | 03-13-2014 |
20140071058 | Positioning Clickable Hotspots On A Touchscreen Display - Positioning clickable hotspots on a touchscreen display, including: identifying, by a hotspot generation module, a clickable object displayed on the touchscreen display, wherein the clickable object has an associated original clickable zone for invoking the clickable object; generating, by the hotspot generation module, a clickable hotspot associated with the clickable object, wherein the clickable hotspot has an associated updated clickable zone for invoking the clickable object; determining, by the hotspot generation module, a position on the touchscreen display for placing the clickable hotspot; and placing, by the hotspot generation module, the clickable hotspot at the position on the touchscreen display, wherein the original clickable zone and the updated clickable zone cover different areas of the touchscreen display. | 03-13-2014 |
20140071602 | POWER CABLE MANAGEMENT IN AN ELECTRONIC COMPONENT STORAGE RACK - A computer storage rack has vertically arranged bays for receiving electrical power-consuming components, an elongate electrical power distribution unit (PDU) having power distribution sockets vertically spaced along the length of the PDU, and a hinge pivotally coupling the PDU to the rack along a vertical axis. The PDU pivots about the hinge between a position proximal to the bays and a position distal to the bays. The apparatus further comprises a component power supply cables that are resiliently extendable from a collapsed configuration to an extended configuration. Each of the component power supply cables is connected between one of the power distribution sockets and an adjacent one of the electrical power-consuming components, and each is resiliently extendable in response to pivoting the PDU to the distal position and resiliently collapsed in response to pivoting the PDU to the proximal position. | 03-13-2014 |
20140074989 | FREQUENT CONTENT CONTINUITY VISUAL ASSISTANCE IN CONTENT BROWSING - Embodiments of the present invention provide a method, system and computer program product for frequent content retrieval in a content browser. In an embodiment of the invention, a method for frequent content retrieval in a content browser is provided. The method includes retrieving requested content from a content server from over a computer communications network and comparing the retrieved requested content to a cached version of the requested content. The retrieved requested content thereafter can be annotated to visually emphasize a frequently accessed portion of the retrieved requested content in response to a threshold difference between the retrieved requested content and the cached version. Finally, the annotated retrieved requested content can be returned to a content browser for display therein. | 03-13-2014 |
20140092435 | APPLYING INDIVIDUAL PREFERENCES TO PRINTED DOCUMENTS - Applying individual preferences to printed documents, including: receiving, by a preference application module, a print request; identifying, by the preference application module, one or more identifiers of users associated with the print request; retrieving, by the preference application module, print preferences for the one or more identifiers of users associated with the print request; and generating, by the preference application module, one or more individualized print jobs for each of the users in dependence upon the print preferences. | 04-03-2014 |
20140094115 | EVALUATING WIRELESS NETWORK ACCESS CONNECTIONS VIA NEAR FIELD COMMUNICATIONS - Evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices. | 04-03-2014 |
20140094118 | EVALUATING WIRELESS NETWORK ACCESS CONNECTIONS VIA NEAR FIELD COMMUNICATIONS - Evaluating wireless network access connections via near field communications, including: identifying, by a requesting device, one or more network connections available to the requesting device; requesting, by the requesting device to one or more responding devices using a near field communications connection, information describing the performance of the network connections experienced by the one or more responding devices; receiving, by the requesting device, the information describing the performance of the network connections experienced by the one or more responding devices; and connecting, by the requesting device, to a preferred network connection in dependence upon the information describing the performance of the network connections experienced by the one or more responding devices. | 04-03-2014 |
20140096139 | WORKLOAD MANAGEMENT CONSIDERING HARDWARE RELIABILITY - A method identifies uptime for each of a plurality of components within a cluster of nodes, and determines a reliability level for each of the plurality of components, where the reliability level of each component is determined by comparing the identified uptime for the component with mean-time-between-failure data for components of the same component type. The method also determines a priority level and a job type for a job to be scheduled. Then, at least one target component type is selected in consideration of the job type, and a target reliability level for the at least one target component type is selected in consideration of the priority level. The job is then scheduled on one of the nodes that includes a component of the at least one target component type having the target reliability level. | 04-03-2014 |
20140099080 | Creating An Abridged Presentation Of A Media Work - Creating an abridged presentation of a media work, including: identifying, by a media abridging module, a plurality of segments of the media work; determining, by the media abridging module, a viewing frequency value for each of the segments of the media work; and creating, by the media abridging module, an abridged version of the media work in dependence upon the viewing frequency value for each of the segments of the media work, wherein the abridged version of the media work includes only a subset of the segments of the media work. | 04-10-2014 |
20140099081 | Creating An Abridged Presentation Of A Media Work - Creating an abridged presentation of a media work, including: identifying, by a media abridging module, a plurality of segments of the media work; determining, by the media abridging module, a viewing frequency value for each of the segments of the media work; and creating, by the media abridging module, an abridged version of the media work in dependence upon the viewing frequency value for each of the segments of the media work, wherein the abridged version of the media work includes only a subset of the segments of the media work. | 04-10-2014 |
20140123019 | Multi-Device Visual Correlation Interaction - Multi-device visual correlation interaction includes displaying, by a first device, a user interface representation of a user interface displayed by a second device, the user interface representation containing one or more element representations, each element representation corresponding to an element contained within the user interface displayed by the second device; receiving from a user of the first device, a selection of a particular element representation of the user interface representation, the particular element representation corresponding to a particular element contained within the user interface; transmitting to the second device, by the first device, a contextual information request corresponding to the selection; in response to transmitting the contextual information request, receiving from the second device, by the first device, contextual information corresponding to the selection; and generating based on the contextual information, by the first device, a contextual list of actions associated with the particular element. | 05-01-2014 |
20140123026 | MULTI-DEVICE VISUAL CORRELATION INTERACTION - Multi-device visual correlation interaction includes displaying, by a first device, a user interface representation of a user interface displayed by a second device, the user interface representation containing one or more element representations, each element representation corresponding to an element contained within the user interface displayed by the second device; receiving from a user of the first device, a selection of a particular element representation of the user interface representation, the particular element representation corresponding to a particular element contained within the user interface; transmitting to the second device, by the first device, a contextual information request corresponding to the selection; in response to transmitting the contextual information request, receiving from the second device, by the first device, contextual information corresponding to the selection; and generating based on the contextual information, by the first device, a contextual list of actions associated with the particular element. | 05-01-2014 |
20140157159 | COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE - Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. | 06-05-2014 |
20140157160 | COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE - Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. | 06-05-2014 |
20140162608 | COLLABORATIVE SHARING OF CONTEXTUALLY SIMILAR CACHE DATA TO REDUCE NETWORK USAGE - A computer program product for controlling a wireless user device comprises computer usable program code for caching data downloaded from websites over a cellular communications network in response to user-entered requests for data; establishing near field communication directly between the wireless user device and other user devices within range of the near field communication; searching metadata stored by the other user devices, wherein the metadata is stored in association with cached data and describes one or more characteristic of the cached data; receiving a user request for data; for determining if the user request can be satisfied with cached data stored by a selected one of the other user devices; receiving cached data directly from the selected user device when the cached data satisfies the user request; and receiving data over the communications network when the cached data stored on the other user devices does not satisfy the user request. | 06-12-2014 |
20140164349 | DETERMINING CHARACTERISTIC PARAMETERS FOR WEB PAGES - A computer receives a search request, wherein the search request contains one or more parameters that allow a search to be performed. Responsive to the search request, the computer identifies a plurality of web pages connected by a plurality of links. The computer determines the number of links in the longest path that connects at least a portion of the plurality of web pages, wherein the longest path includes a sequence of at least two web pages of the plurality of web pages connected by a link of the plurality of links. The computer determines the number of links included in a web page of the plurality of web pages. | 06-12-2014 |
20140164414 | GUIDING A USER TO IDENTIFIED CONTENT IN A DOCUMENT - A method for identifying content in a document. The method includes determining that a user of a computing device has accessed one or more documents and determining a subject matter of the one or more documents. The method includes determining that the user has accessed at least one additional document. The method further includes searching the at least one additional document for the determined subject matter and responsive to finding the determined subject matter, identifying the found subject matter in the at least one additional document. | 06-12-2014 |
20140164472 | COLLABORATIVE SHARING OF CONTEXTUALLY SIMILAR CACHE DATA TO REDUCE NETWORK USAGE - Wireless user devices can independently download and cache data from websites over a wireless communications network. In response to a request for data, a first user device may receive data directly from a second user device instead of receiving data over the communications network, if the data satisfies the request. Near field communications may be used for direct communication between user devices within range of the near field communication. Metadata describing the cached data may be stored in association with the cached data. Each user device may advertise its metadata and allow it to be searched by another user device that is requesting data. If the request can be satisfied with cached data stored by a selected user device, then the cached data is received directly from the selected user device, but the data is otherwise received over the communications network. | 06-12-2014 |
20140164548 | MANAGING DIRECT ATTACHED CACHE AND REMOTE SHARED CACHE - Managing direct attached cache and remote shared cache, including: receiving from an enclosure attached server, by an enclosure that includes enclosure cache, a request for data; determining, by the enclosure, whether the data has been requested by a predetermined number of enclosure attached servers; and responsive to determining that the data has been requested by a predetermined number of enclosure attached servers, marking, by the enclosure, the data as enclosure level cacheable. | 06-12-2014 |
20140164549 | MANAGING DIRECT ATTACHED CACHE AND REMOTE SHARED CACHE - Managing direct attached cache and remote shared cache, including: receiving from an enclosure attached server, by an enclosure that includes enclosure cache, a request for data; determining, by the enclosure, whether the data has been requested by a predetermined number of enclosure attached servers; and responsive to determining that the data has been requested by a predetermined number of enclosure attached servers, marking, by the enclosure, the data as enclosure level cacheable. | 06-12-2014 |
20140164794 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON RELATIVE COMMONALITY - A computer program product includes computer usable program code for: identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source and includes a circuit breaker; identifying a plurality of devices disposed in the rack, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices; obtaining vital product data from a service processor in each device, wherein the vital product data identifies the device by a model identification code; and powering on, for each of the PDUs, the plurality of devices that are connected to the PDU in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on devices in order of ascending commonality of the model identification code. | 06-12-2014 |
20140164811 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON DEVICE FUNCTION - A computer program product includes computer usable program code embodied on a tangible computer usable storage medium for: identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source, and wherein each PDU includes a circuit breaker; identifying a plurality of devices disposed in the rack, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices; and powering on, for each of the PDU, the plurality of devices that are connected to the PDU in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on the devices identified as network switches and external data storage devices prior to powering on the devices identified as server nodes. | 06-12-2014 |
20140164812 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON DEVICE FUNCTION - A method of powering on a plurality of devices includes identifying a plurality of power distribution units disposed in a rack, wherein each power distribution units is connected to receive power from a main power source, and wherein each power distribution unit includes a circuit breaker. The method further includes identifying a plurality of devices disposed in the rack, wherein each device is connected to receive power from one of the power distribution units, and wherein the plurality of devices are selected from server nodes, network switches and external data storage devices. For each of the power distribution units, the plurality of devices that are connected to the power distribution unit are powered on in a sequence to prevent an inrush current from tripping the circuit breaker within the power distribution unit. The sequence powers on the devices identified as network switches and external data storage devices prior to powering on the devices identified as server nodes. | 06-12-2014 |
20140164813 | SEQUENTIAL POWER UP OF DEVICES IN A COMPUTING CLUSTER BASED ON RELATIVE COMMONALITY - A method of powering on a plurality of devices includes identifying a plurality of power distribution units (PDUs) disposed in a rack, wherein each PDU receives power from a main power source and includes a circuit breaker. A plurality of devices disposed in the rack are identified, wherein each device receives power from one of the PDUs, and wherein the plurality of devices are server nodes, network switches or external data storage devices. Vital product data (VPD) is obtained from a service processor in each device, wherein the VPD identifies the device by a model identification code. For each PDU, the plurality of devices connected to the PDU are powered on in a sequence to prevent an inrush current from tripping the circuit breaker within the PDU, wherein the sequence powers on devices in order of ascending commonality of the model identification code. | 06-12-2014 |
20140170614 | PROVIDING A USER-SPECIFIC EFFORT VALUE ASSOCIATED WITH DIGITAL TEXTUAL CONTENT - Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. | 06-19-2014 |
20140170615 | Providing A User-Specific Effort Value Associated With Digital Textual Content - Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. | 06-19-2014 |
20140173114 | PRESENTING ENCLOSURE CACHE AS LOCAL CACHE IN AN ENCLOSURE ATTACHED SERVER - Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. | 06-19-2014 |
20140173156 | CABLE ADAPTER CORRELATION IN A CLUSTER - A verified cluster configuration is collected and stored by a central management entity. Servers within the cluster are connected to network cables, where each of the servers has at least one network port and memory storing a port identification code for each network port, and where each network cable has memory storing a cable identification code. For each verified connection between a network cable and a network port, the port identification code is stored in the memory of the network cable and the cable identification code is stored in the memory of the corresponding server. The data identifying each connection is stored by the central management entity and includes the port identification code for a particular network port in association with the network cable identification code for the corresponding network cable. Any miswiring of the configuration is identified by the central management entity and easily corrected by the administrator. | 06-19-2014 |
20140173209 | Presenting Enclosure Cache As Local Cache In An Enclosure Attached Server - Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. | 06-19-2014 |
20140173617 | DYNAMIC TASK COMPLETION SCALING OF SYSTEM RESOURCES FOR A BATTERY OPERATED DEVICE - Methods, apparatuses, and computer program products for dynamic task completion scaling of system resources for a battery operated device are provided. Embodiments include determining, by task completion controller, availability of system resources; retrieving, by the task completion controller, historical user-specific task performance data corresponding to a user; and performing, by the task completion controller, a system action based on the determined availability of system resources and the retrieved historical user-specific task performance data. | 06-19-2014 |
20140177736 | POWER DISTRIBUTION SYSTEM UTILIZING DIGITAL COMMUNICATIONS TO DETERMINE THE CONFIGURATION THEREOF - Three-phase electrical power is used to distribute electrical power to electronic devices in a cluster. A power distribution system includes circuit breaker panels and power distribution units for providing electrical power to the electronic devices. The electrical connections within the power distribution system form a digital communication network that communicates identification codes for the purpose of identifying each electrical connection in the power distribution system. A cluster management entity may then collect the identification codes associated with each electrical connection in order to detect the actual configuration of the power distribution system. By further knowing the load of each electronic device and their association with entities of the power distribution system, the cluster management entity may determine the load on each phase and take steps to balance the load. | 06-26-2014 |
20140177738 | DETERMINING THE CONFIGURATION OF A POWER DISTRIBUTION SYTEM - A method provides digital communication over an electrical power supply cable between a management processor in a circuit breaker panel (CBP) and a management processor in a power distribution unit (PDU), wherein the CBP has a CBP identification code (ID) and the PDU has a PDU ID. The digital communication provides the CBP management processor with the PDU ID for the PDU that is connected through the electrical power supply cable to the CBP, or the digital communication provides the PDU management processor with the CBP ID for the CBP that is connected through the electrical power supply cable to the PDU. The method further comprises identifying the electrical power supply cable connection by communicating first and second endpoints of the electrical power cable connection to a cluster management entity, wherein the first endpoint is identified by the CBP ID and the second endpoint is identified by the PDU ID. | 06-26-2014 |
20140180991 | RECOMMENDING ELECTRONIC CONTENT BASED UPON USER AVAILABILITY - Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval. | 06-26-2014 |
20140181001 | RECOMMENDING ELECTRONIC CONTENT BASED UPON USER AVAILABLITY - Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval. | 06-26-2014 |
20140181385 | FLEXIBLE UTILIZATION OF BLOCK STORAGE IN A COMPUTING SYSTEM - Embodiments of the present invention disclose a method, computer program product, and system for utilizing a block storage device as Dynamic Random-Access Memory (DRAM) space, wherein a computer includes at least one DRAM module and at least one block storage device interfaced to the computer using a double data rate (DDR) interface. During boot up, the computer configures DRAM and block storage devices of the computer for utilization as DRAM or block storage. Then the computer determines that more DRAM space is required. Responsive to determining that more DRAM space is required, the computer transforms a block storage device into DRAM space. Once the computer determines that the transformed block storage device that is being used for DRAM space is no longer needed to be used as DRAM space, the computer transforms the block storage device back to block storage space. | 06-26-2014 |
20140181564 | DETERMINING REDUNDANCY IN A POWER DISTRIBUTION SYSTEM - A computer-implemented method identifies the path of a first power circuit to a first power supply that is connected to supply power to an electronic device, and identifies the path of a second power circuit to a second power supply that is connected to supply power to the electronic device. The method then compares the path of the first power distribution circuit with the path of the second power distribution circuit to determine a measure of redundancy in the first and second distribution paths. A measure of redundancy may then be output to a user. | 06-26-2014 |
20140185078 | PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM - Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. | 07-03-2014 |
20140185083 | NETWORK PRINTER SELECTION BASED ON PRINTER STATUS AND PROFILES - A computer program product maintains a printer profile associated with each of a plurality of printers. For each printer, the printer profile includes the current power status, a cost to power up, and a rate of cost to print. A print job is received and, for each printer, a total cost to print the print job, including the cost to power on the printer, is determined. The print job is redirected from a default printer to a destination printer selected from printers having a lower total cost to print. Each printer profile may further include a time period to power up and a print speed, and, for each printer, a total time period to print the print job is determined. The total time period includes an amount of time to complete other print jobs, and further includes, where the printer is off, the time period to power on the printer. | 07-03-2014 |
20140185084 | PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM - Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. | 07-03-2014 |
20140186009 | STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS - A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. | 07-03-2014 |
20140189735 | STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS - A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. | 07-03-2014 |
20140189848 | INFERRING SECURITY DECISIONS FROM TRUSTED USERS - Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. | 07-03-2014 |
20140189849 | Inferring Security Decisions From Trusted Users - Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. | 07-03-2014 |
20140215148 | LIMITING THE EXECUTION OF BACKGROUND MANAGEMENT OPERATIONS IN A DRIVE ARRAY - Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. | 07-31-2014 |
20140215150 | Limiting The Execution Of Background Management Operations In A Drive Array - Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. | 07-31-2014 |
20140240919 | TARGETED COOLING TO SPECIFIC OVERHEATING RACK-MOUNTED SERVERS - A system selectively cools a set of at least one rack-mounted server in a chassis. The system comprises: a chassis; a chassis manager; a set of at least one thermal sensor coupled to each rack-mounted server in the chassis; a cold air source; a cold air conduit coupled to the cold air source; a plurality of cold air valves coupled to the cold air conduit; and an expandable tube of flexible memory material coupled to each of the plurality of cold air valves, where the expandable tube inflates with cold air from the cold air source to expose directional holes, and thus cold air, across a specific predetermined sub-area of a particular overheating rack-mounted server in response to the chassis manager detecting that the particular overheating rack-mounted server is exceeding a predetermined temperature. | 08-28-2014 |
20140254278 | Writing Data To A Thermally Sensitive Memory Device - Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device. | 09-11-2014 |
20140254279 | Writing Data To A Thermally Sensitive Memory Device - Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device. | 09-11-2014 |
20140258631 | Allocating Enclosure Cache In A Computing System - Allocating enclosure cache in a computing system that includes an enclosure and a plurality of enclosure attached servers, including: receiving, by the enclosure, memory access information from each of the plurality of enclosure attached servers; determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate as shared cache that can be accessed by two or more of the enclosure attached servers; and determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate to each enclosure attached server for exclusive use by the enclosure attached server. | 09-11-2014 |
20140258632 | Sharing Cache In A Computing System - Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server. | 09-11-2014 |
20140258633 | Sharing Cache In A Computing System - Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server. | 09-11-2014 |
20140258634 | Allocating Enclosure Cache In A Computing System - Allocating enclosure cache in a computing system that includes an enclosure and a plurality of enclosure attached servers, including: receiving, by the enclosure, memory access information from each of the plurality of enclosure attached servers; determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate as shared cache that can be accessed by two or more of the enclosure attached servers; and determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate to each enclosure attached server for exclusive use by the enclosure attached server. | 09-11-2014 |
20140285917 | WRITE AVOIDANCE AREAS AROUND BAD BLOCKS ON A HARD DISK DRIVE PLATTER - A method and computer program product identify the location of a bad block on a disk platter of a hard disk drive, determine an avoidance area extending from the bad block, and prevent data from being written to the avoidance area. | 09-25-2014 |
20140327538 | CABLE TRACING IN A DATACENTER - A cable detection system may be implemented in a datacenter to locate the path of a cable. The cable detection system includes a signal generator and driver circuit having its output in communication with a transformer, wherein the transformer has a first output coupled to a cable shield of an elongated cable and a second output coupled to a dedicated transmission wire extending lengthwise with the cable and exterior to the cable shield. The cable detection system further includes a plurality of detection circuits, wherein each detection circuit includes an electromagnetically-powered receiver coupled to a light emitting diode, and wherein radio frequency signals emitted from the transmission wire activate the light emitting diodes of the detection circuits within a detection distance of the cable. | 11-06-2014 |
20140327539 | CABLE TRACING IN A DATACENTER - Embodiments of the invention provide a method of tracing cable through a datacenter. The method causes a cable to emit a radio frequency signal along the length of the cable. One or more structural members have a detection circuit that will illuminate in response to detecting the radio frequency signal with greater than a threshold signal strength, such that the one or more structural members are easy to identify when the detection circuit is illuminated. The one or more structural members may be removed to gain physical access to the cable. | 11-06-2014 |
20140355068 | EMBEDDED DOCUMENT DESTINATION ROUTING RESTRICTIONS - Embodiments of the present invention provide a method, system and computer program product for restricting transmission of a document. In an embodiment of the invention, a method for restricting transmission of a document is provided. The method includes loading an image of a document into memory of a computer, receiving a request to transmit the image to a specified destination, and in response to receiving the request, locating an embedded code within the document, extracting a restriction as to the transmission of the image of the document, applying the restriction, and transmitting the image of the document to the specified destination only if permitted by the restriction. | 12-04-2014 |
20140355071 | FACSIMILE REQUIREMENTS MONITORING - Embodiments of the present invention provide a method, system and computer program product for facsimile requirements monitoring during facsimile transmission of a form. In an embodiment of the invention, a method of facsimile requirements monitoring during facsimile transmission of a form is provided. The method includes loading a document directed for facsimile transmission by a facsimile data processing system, identifying within the document a facsimile requirement that a particular location within the document include end user supplied data, determining whether or not the particular location specified by the facsimile requirement includes end user supplied data, and generating an error message in the facsimile device responsive to a determination that the particular location lacks any end user supplied data. | 12-04-2014 |
20140355201 | PROTECTING DEVICES AGAINST HOT AIR BACKFLOW IN A COMPUTER SYSTEM RACK HAVING A REAR DOOR HEAT EXCHANGER - A rear door heat exchanger is used to cool exhaust air as it exits a rack containing a plurality of computing devices. An air flow rate is determined for each of the plurality of computing devices within the rack, wherein each of the plurality of computing devices includes a fan drawing air through the computing device. The position of a baffle or louver is controlled to allow exhaust air to bypass the rear door heat exchanger in response to determining that the total air flow rate through the plurality of computing devices exceeds a predetermined air flow capacity threshold of the rear door heat exchanger. | 12-04-2014 |
20140359021 | CONTEXT DRIVEN MODIFICATION OF ATTACHMENTS IN A MESSAGING SESSION - Embodiments of the present invention provide a method, system and computer program product for message attachment modification based upon determined context. In an embodiment of the invention, a method for message attachment modification based upon determined context is provided. The method includes loading into memory a message referencing a file to be transmitted to a recipient, determining a context for the transmission of the message, modifying the file according to the determined context, and transmitting the message with the modified file to the recipient. | 12-04-2014 |
20140359028 | CONTEXT DRIVEN MODIFICATION OF ATTACHMENTS IN A MESSAGING SESSION - Embodiments of the present invention provide a method, system and computer program product for message attachment modification based upon determined context. In an embodiment of the invention, a method for message attachment modification based upon determined context is provided. The method includes loading into memory a message referencing a file to be transmitted to a recipient, determining a context for the transmission of the message, modifying the file according to the determined context, and transmitting the message with the modified file to the recipient. | 12-04-2014 |
20140360696 | DYNAMIC SURFACE AREA EXPANSION IN A REAR DOOR HEAT EXCHANGER - A rear door heat exchanger includes a door frame have opposing first and second edges, a fluid supply manifold secured along the first edge of the door frame, a fluid return manifold secured along the second edge of the door frame, a fin tube assembly including a plurality of fin tubes extending across a central region of the rear door heat exchanger and forming an air flow pathway through the fin tube assembly, and an actuator for controllably moving the fin tube assembly between retracted and extended positions. The rear door heat exchanger further comprises a plurality of supply pipe coupling assemblies and a plurality of return pipe coupling assemblies, each pipe coupling assembly providing fluid communication between one of the manifolds and one of the fin tubes. | 12-11-2014 |
20140362520 | DYNAMIC SURFACE AREA EXPANSION IN A REAR DOOR HEAT EXCHANGER - A method comprising flowing a liquid through supply pipe couplings to a fin tube assembly of an air-to-liquid heat exchanger and through the fin tube assembly to return pipe couplings, wherein the fin tube assembly forms a central air flow pathway. The method further comprises passing air through components within a rack secured to the rear door heat exchanger and through the fin tube assembly and detecting an operating condition within the rack. The method then automatically moves the fin tube assembly from a retracted position to an extended position in response to the operating condition, wherein the retracted position directs substantially all of the air to exit the rack through the central air flow pathway, and wherein the extended position allows the air to exit through the central air flow pathway and also through first and second side air flow pathways. | 12-11-2014 |
20140370981 | REDUCING THE BANDWIDTH REQUIREMENTS OF MULTIPLAYER GAMING SESSIONS - A computer identifies a group of players that are participating in a gaming session that is hosted by the computer. The computer identifies the location of an avatar of a first player included in the group of players. The computer identifies the location of a second avatar of a second player included in the group of players and determining the proximity between the first avatar and the second avatar. The computer determines if the proximity exceeds a threshold. Responsive to the determination that the proximity does not exceed the threshold, the computer sends data for the gaming session to the first player and the first player passes that data to the second player. | 12-18-2014 |
20140370992 | PLAYER SUBSTITUTION TO PRESERVE TEAM BALANCE - Exemplary embodiments determine a type, and a status of a first character included in a group of characters participating in a gaming session. Exemplary embodiments determine a goal of the group of characters. Exemplary embodiments determine an environment of the group of characters. Exemplary embodiments determine a balance of a type of characters required to achieve the goal. Exemplary embodiments determine if the first character is available for continued participation in the gaming session. Exemplary embodiments respond to the determination that the first character is not available for continued participation in the gaming session, by identifying a first computer controlled character to replace the first character. Exemplary embodiments determine replace the first character with the identified first computer controlled character. | 12-18-2014 |
20140379815 | AGGREGATING MESSAGE RESPONSES INTO TOPIC-ORGANIZED CONTENT - A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. The computer processor reorganizes the response to the electronic message, such that the content elements are aligned with similar-topic content elements and associated with one of the one or more topics of the response to generate a topic organized aggregate message, and in response to receiving an additional response to the electronic message, the computer processor updates the topic organized aggregate message to include one or more additional content elements from the additional response, wherein the one or more additional content elements are aligned with the one or more topics of the topic organized aggregate message. | 12-25-2014 |
20140379818 | AGGREGATING MESSAGE RESPONSES INTO TOPIC-ORGANIZED CONTENT - A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. The computer processor reorganizes the response to the electronic message, such that the content elements are aligned with similar-topic content elements and associated with one of the one or more topics of the response to generate a topic organized aggregate message, and in response to receiving an additional response to the electronic message, the computer processor updates the topic organized aggregate message to include one or more additional content elements from the additional response, wherein the one or more additional content elements are aligned with the one or more topics of the topic organized aggregate message. | 12-25-2014 |
20150019851 | STATE DEPENDENT OPTIMIZATION FOR SEQUENTIAL BOOTING OF HETEROGENEOUS SYSTEMS - A method and computer program product for implementing the method, where the method comprises obtaining boot dependencies among a plurality of systems, wherein a boot dependency identifies a dependent system, a service system that provides a service to the dependent system, a provide state of the service system, and a need state of the dependent system that requires the service system to have reached the provide state. The method further comprises obtaining historical measurements of the time periods between states for each of the systems. Then, during a process of booting the plurality of systems, the method initiates boot of each dependant system at a time that is determined, based on the historical measurements, to allow the dependent system to reach the need state no earlier than the time at which the service system is determined, based on the historical measurements, to reach the provide state. | 01-15-2015 |
20150029076 | SHARING AN OVERLAPPING REGION IN A DISPLAY - A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. | 01-29-2015 |
20150029077 | SHARING AN OVERLAPPING REGION IN A DISPLAY - A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. | 01-29-2015 |
20150039718 | SHARING LOCAL CACHE FROM A FAILOVER NODE - Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. | 02-05-2015 |
20150039834 | SHARING LOCAL CACHE FROM A FAILOVER NODE - Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. | 02-05-2015 |
20150046816 | DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE - Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. | 02-12-2015 |
20150046817 | DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE - Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. | 02-12-2015 |
20150065087 | SECURITY RECOMMENDATIONS FOR PROVIDING INFORMATION IN A COMMUNICATION SYSTEM - A method of and system for receiving a communication is disclosed. A receiving device receives the communication. The method and system classify user information into a set of security levels. A caller from a source of potential callers is associated with a security rating within the set of security levels. Using at least one caller-identification resource, the communication can be identified as being related to the caller with the security rating. The method and system determine a recommendation for providing user information. The recommendation may be based on the security rating within the set of security levels. The determined recommendation for providing user information in response to the communication is issued. | 03-05-2015 |
20150065251 | PLAYER GENERATED CONTENT MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded. | 03-05-2015 |
20150065256 | PLAYER GENERATED CONTENT MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded. | 03-05-2015 |
20150077271 | CONTROLLING VEHICULAR TRAFFIC ON A ONE-WAY ROADWAY - A method controls vehicular traffic on a one-way roadway. A hardware sensor detects vehicular traffic on a roadway. A hardware traffic control device determines whether the vehicular traffic on the roadway has been moving exclusively in a first direction during a preceding period of time, such that the roadway is a one-way roadway on which current vehicular traffic is authorized to travel only in the first direction. The hardware sensor detects an errant vehicle that is traveling on the one-way roadway in a second direction that is opposite the first direction. In response to determining that the errant vehicle is traveling in the second direction on the one-way roadway, a warning signal is transmitted to vehicles, other than the errant vehicle, on the one-way roadway. | 03-19-2015 |
20150077273 | CONTROLLING VEHICULAR TRAFFIC ON A ONE-WAY ROADWAY - A hardware traffic control device controls vehicular traffic on a one-way roadway. A hardware sensor detects vehicular traffic on a roadway in order to enable a hardware traffic control device to determine that the vehicular traffic on the roadway has been moving exclusively in a first direction during a preceding period of time, thus identifying the roadway as a one-way roadway in which current vehicular traffic is authorized to travel only in the first direction. The hardware sensor then detects an errant vehicle that is traveling in the opposite direction on the one-way roadway. A disabling electronic signal is then transmitted from the hardware traffic control device to disable a distracting electronic device within the errant vehicle. | 03-19-2015 |
20150085882 | REDUCTION OF ON-HOLD CALL BANDWIDTH CONSUMPTION - A computer processor determines that a call has been placed on hold. The computer processor sends a first packet to a local exchange carrier (LEC) of the calling device, wherein the first packet includes instructions to release the bandwidth of the call placed on-hold, between the LEC and a recipient of the call. The computer processor sends a second packet intermittently to the LEC, wherein the second packet maintains a connection between the calling device of the call and the LEC. The computer processor determines that a representative is available, wherein the representative is the recipient of the call, and in response to determining the representative that is available responds to the call, the computer processor sending a third packet to connect the calling device of the call to the representative that is available. | 03-26-2015 |
20150089308 | KEYBOARD, VIDEO AND MOUSE SWITCH IDENTIFYING AND DISPLAYING NODES EXPERIENCING A PROBLEM - A method includes a keyboard, video and mouse (KVM) switch communicating over a network with service processors of a plurality of compute nodes, the KVM switch identifying a compute node from among the plurality of compute nodes that is experiencing one or more predetermined problems, and the KVM switch automatically generating a graphical user interface including the identity of the identified compute node for display on a display device that is connected to the KVM switch. | 03-26-2015 |
20150098186 | AUTOMATIC SEALING OF A GAP ALONG A CHASSIS POSITIONED IN A RACK - An apparatus includes a chassis having longitudinal rails for guiding the chassis to move longitudinally into and out of a rack. A flexible sealing member is secured to at least one longitudinal surface of the chassis along a lateral pathway, wherein the flexible sealing member has a first side secured to the chassis, a second side secured to a rigid frame, and a central portion extending between the first and second ends. An actuator is positioned within the rack and is longitudinally aligned with the rigid frame. Accordingly, moving the chassis longitudinally into the rack causes the rigid frame to engage the actuator and then elastically flex the central portion of the flexible sealing member to extend outwardly from the longitudinal surface of the chassis. | 04-09-2015 |
20150100816 | ANTICIPATORY PROTECTION OF CRITICAL JOBS IN A COMPUTING SYSTEM - Anticipatory protection of critical jobs in a computing system, including: identifying, by a system management module, a problem computing component in the computing system; identifying, by the system management modules, all proximate computing components in the computing system, wherein each proximate computing component is within a predetermined physical proximity of the problem computing component; determining, by the system management module, whether the proximate computing components are executing one or more critical jobs; and responsive to determining that the proximate computing components are executing one or more critical jobs migrating, by the system management module, the one or more critical jobs to distant computing components in the computing system, wherein each distant computing component is not within the predetermined physical proximity of the problem computing component. | 04-09-2015 |
20150100817 | Anticipatory Protection Of Critical Jobs In A Computing System - Anticipatory protection of critical jobs in a computing system, including: identifying, by a system management module, a problem computing component in the computing system; identifying, by the system management modules, all proximate computing components in the computing system, wherein each proximate computing component is within a predetermined physical proximity of the problem computing component; determining, by the system management module, whether the proximate computing components are executing one or more critical jobs; and responsive to determining that the proximate computing components are executing one or more critical jobs migrating, by the system management module, the one or more critical jobs to distant computing components in the computing system, wherein each distant computing component is not within the predetermined physical proximity of the problem computing component. | 04-09-2015 |
20150102673 | POWER BALANCING IN POWER DISTRIBUTION NETWORKS - Systems and methods for power balancing in power distribution networks are disclosed herein. According to an aspect, a method may be implemented at a power manager in a power distribution network including multiple computing devices. The method may include receiving vital product data associated with the computing devices. The method may also include predicting, based on the vital product data, occurrences of unbalanced power in the power distribution system upon distribution of power to the computing devices. Further, the method may include controlling application of power to the computing devices, prior to distributing power in the power distribution system, based on the predicted occurrences such that power distribution to the power distribution system is substantially balanced. | 04-16-2015 |
20150105009 | REVERSIBLE FAN DIRECTION CONTROL RESPONSIVE TO DEVICE ENCLOSURE ORIENTATION - A method and computer program product are provided for controlling the airflow direction through a device enclosure. A first device enclosure is positioned adjacent a second device enclosure, wherein both enclosures have an airflow pathway extending from the front to the back, and a fan for moving air through the airflow pathway, wherein the fan of the first device enclosure is a reversible rotary fan. The method automatically determines whether the first device enclosure is in a first orientation with its front facing in the same direction as the front of the adjacent second device enclosure or in a second orientation with the front facing in the same direction as the back of the adjacent second device enclosure. The airflow direction imparted by a reversible rotary fan is then controlled according to the determined orientation of the first device enclosure relative to the second device enclosure. | 04-16-2015 |
20150106351 | AUTOMATED COMPOSITION OF TOPICAL MEDIA - Embodiments of the present invention provide a method, system and computer program product for the automated composition of topical media. In an embodiment of the invention, a method for the automated composition of topical media is provided. The method includes specifying a topic of interest in a search engine interface of a search engine. The method also includes searching one or more media stores over a computer communications network for media files pertaining to the specified topic and retrieving one or more media files including portions corresponding to the specified topic. Finally, the method includes compositing the portions into a single media file and storing into fixed storage the single media file. | 04-16-2015 |
20150106354 | AUTOMATED COMPOSITION OF TOPICAL MEDIA - Embodiments of the present invention provide a method, system and computer program product for the automated composition of topical media. In an embodiment of the invention, a method for the automated composition of topical media is provided. The method includes specifying a topic of interest in a search engine interface of a search engine. The method also includes searching one or more media stores over a computer communications network for media files pertaining to the specified topic and retrieving one or more media files including portions corresponding to the specified topic. Finally, the method includes compositing the portions into a single media file and storing into fixed storage the single media file. | 04-16-2015 |
20150112315 | CONTROLLING ACCESS TO AN INTRAVENOUS CATHETER - A system includes an intravenous catheter having a catheter chamber, a catheter line for insertion into a blood vessel of the identified patient, and an electronically actuatable blocking member providing selective fluid communication between the catheter chamber and the catheter line. A reader is secured to the catheter chamber for reading an identification code that identifies a liquid in a syringe received within the catheter chamber. A control system accesses an electronic patient record that includes medical information specific to an identified patient and runs an application program logically associating the intravenous catheter and the medical information specific to the identified patient, determining whether the administration of the identified liquid to the identified patient is compatible within the medical information specific to the identified patient, and controlling electronic actuation of the blocking member. | 04-23-2015 |
20150112316 | CONTROLLING ACCESS TO AN INTRAVENOUS CATHETER - A method includes logically associating an intravenous catheter and an electronic patient record stored on a computer readable storage medium, wherein the electronic patient record includes medical information specific to an identified patient. An identification code of a syringe to be administered to the identified patient is read in order to identify a liquid contained in the syringe. The blocking member may be electronically actuated to provide fluid communication between a catheter chamber and a catheter line inserted into the identified patient, wherein the fluid communication is provided only while the syringe is received within the catheter chamber and only in response to determining that administration of the identified liquid to the identified patient is compatible within the medical information. | 04-23-2015 |
20150121094 | COOPERATIVE REDUCED POWER MODE SUSPENSION FOR HIGH INPUT/OUTPUT ('I/O') WORKLOADS - Method of cooperative reduced power mode suspension for high input/output (‘I/O’) workloads, including: determining, by a transfer monitoring module, a size of a file to be transferred to a recipient, wherein the recipient includes a central processing unit (‘CPU’) operating in a reduced power mode; determining, by the transfer monitoring module, a desired transfer rate for transferring the file to the recipient; calculating, by the transfer monitoring module, an expected transfer completion time in dependence upon the size of the file and the desired transfer rate; and sending, by the transfer monitoring module, a message to the recipient requesting that the CPU suspend the reduced power mode in dependence upon the expected transfer completion time. | 04-30-2015 |
20150121107 | Cooperative Reduced Power Mode Suspension For High Input/Output ('I/O') Workloads - Method of cooperative reduced power mode suspension for high input/output (‘I/O’) workloads, including: determining, by a transfer monitoring module, a size of a file to be transferred to a recipient, wherein the recipient includes a central processing unit (CPU) operating in a reduced power mode; determining, by the transfer monitoring module, a desired transfer rate for transferring the file to the recipient; calculating, by the transfer monitoring module, an expected transfer completion time in dependence upon the size of the file and the desired transfer rate; and sending, by the transfer monitoring module, a message to the recipient requesting that the CPU suspend the reduced power mode in dependence upon the expected transfer completion time. | 04-30-2015 |
20150128286 | PREVENTING CHANGES TO COMPUTING DEVICES IN A COMPUTING SYSTEM SERVICING A CRITICAL JOB - Preventing changes to computing devices in a computing system servicing a critical job, including: identifying, by a job protection module, a critical job executing in the computing system; identifying, by the job protection module, one or more computing devices in the computing system utilized during execution of the critical job; and locking, by the job protection module, each of the one or more computing devices in the computing system utilized during execution of the critical job from undergoing a configuration change during execution of the critical job. | 05-07-2015 |
20150134825 | MANAGING WORKLOAD DISTRIBUTION TO REDUCE ACOUSTIC LEVELS - A computer-implemented method obtains a correlation between percent utilization and noise level for a plurality of compute node types, and obtains an inventory of a plurality of compute nodes in a cluster, wherein the inventory identifies each compute node by a compute node type, and wherein the plurality of compute nodes includes two or more compute node types. The method further includes determining a percent utilization of each compute node, and, for each compute node of an identified compute node type, determining a noise level using the determined percent utilization for the compute node as input into the correlation between percent utilization and noise level for the identified compute node type. An overall noise level in the cluster is calculated using the noise level determined for each compute node, and workload is distributed among the plurality of compute nodes to reduce the calculated overall noise level in the cluster. | 05-14-2015 |
20150134899 | REACTIONARY BACKUP SCHEDULING AROUND MEANTIME BETWEEN FAILURES OF DATA ORIGINATION - A processor-implemented method for providing a reactionary backup scheduling of a hard disk drive is provided. The method may include monitoring a disk usage of the hard disk drive and comparing the disk usage to an MTBF of the hard disk drive. The method may also include monitoring usage of at least one file of a plurality of files stored on the hard disk drive. The method may further include initiating the reactionary backup scheduling based on the comparing of the disk usage to the MTBF and the monitoring of the usage of the at least one file in the plurality of files. | 05-14-2015 |
20150135089 | ADJUSTMENT OF USER INTERFACE ELEMENTS BASED ON USER ACCURACY AND CONTENT CONSUMPTION - Systems and methods for adjusting user interface elements based on user accuracy and content consumption are disclosed. According to an aspect, a method includes receiving user input for interacting with one or more elements presented by a user interface. The method also includes determining an estimate of user accuracy for correctly selecting the one or more elements. Further, the method includes determining a rate of consumption of content presented by the user interface. The method also includes adjusting one of a position and size of at least one of the elements based on the estimate of user accuracy and the rate of consumption of content. | 05-14-2015 |
20150138677 | METHOD TO PROVIDE A MORE ROBUST GFCI CIRCUIT BREAKER - A system and method include a ground fault circuit interrupter (GFCI) supplying electricity to an appliance. The GFCI supplies direct current (DC) to an appliance upon connection to the GFCI, and the appliance automatically communicates data to the GFCI prior to startup of the appliance in response to receiving the DC, wherein the data describes maximum out of phase conditions expected during appliance startup, and the GFCI acknowledges receipt of the data. The appliance sends a status message to the GFCI indicating the appliance is ready for alternating current (AC) in response to the startup of the appliance, and the GFCI switches from supplying the low voltage direct current to supplying AC to the appliance in response to the GFCI receiving the status message. The method further comprises preventing the GFCI from tripping in response to out of phase conditions less than the maximum out of phase conditions. | 05-21-2015 |
20150153195 | FUEL PURCHASE PLANNING ALONG A ROUTE - A computer program product including computer readable program code embodied on a computer readable storage medium. The computer program product includes computer readable program code for obtaining a fuel tank size, amount of fuel in the tank, and a fuel efficiency for an automobile; accepting user entry of a destination for traveling in the automobile; and automatically identifying a current location and determining a route to the destination. Additional computer readable program code acquires, for each of a plurality of refueling stations along the route, a location and a current fuel price being offered at the refueling station. Computer readable program code also provides output recommending one or more refueling stations at which to stop and a quantity of fuel to purchase at each of the one or more refueling stations in order to reach the destination without running out of fuel and minimizing the price of fuel purchased. | 06-04-2015 |
20150154048 | MANAGING WORKLOAD TO PROVIDE MORE UNIFORM WEAR AMONG COMPONENTS WITHIN A COMPUTER CLUSTER - A method and a computer program product for implementing the method are provided for wear leveling the physical servers or other components within a cluster. The method includes identifying uptime for each of a plurality of physical servers within a cluster and scheduling jobs on the physical servers within the cluster giving priority to the use of physical servers in order of increasing uptime. The physical servers within the cluster that have no assigned jobs are then powered off. As a result, physical servers having low uptime relative to other physical servers within the cluster will operate more so that their uptime increases, and physical servers having high uptime relative to other physical servers within the cluster will operate less so that their uptime does not increase. Over time, the method will narrow the range of uptime, which may be referred to as “wear leveling.” | 06-04-2015 |
20150154638 | FUEL PURCHASE PLANNING ALONG A ROUTE - A method is provided for recommending a fuel purchase plan along a route to a selected destination. The method includes obtaining a fuel tank size, amount of fuel in the tank, and a fuel efficiency for an automobile. The method further includes accepting user entry of a destination for traveling in the automobile, automatically identifying a current location and determining a route to the destination. For each of a plurality of refueling stations along the route, the method acquires a location of the refueling station and a current fuel price being offered at the refueling station. The method then provides output recommending one or more refueling stations at which to stop and a quantity of fuel to purchase at each of the one or more refueling stations in order to reach the destination without running out of fuel and minimizing the price of fuel purchased. | 06-04-2015 |
20150156264 | FILE ACCESS OPTIMIZATION USING STRATEGICALLY PARTITIONED AND POSITIONED DATA IN CONJUNCTION WITH A COLLABORATIVE PEER TRANSFER SYSTEM - A processor-implemented method for optimizing a file transfer is provided. The method may include receiving at least one file transfer request associated with a file. The method may further include acquiring, for the at least one file transfer request, a plurality of service level objectives associated with the file. The method may also include distributing a plurality of file segments associated with the file to at least one storage component associated with a shared storage infrastructure, wherein the distributing is based on a determining of at least one resource capability associated with the at least one storage component. Additionally, the method may include directing a complete transfer of the plurality of file segments associated with the file from the at least one storage component based on a file request for the file. | 06-04-2015 |
20150161063 | CHANGING APPLICATION PRIORITY IN RESPONSE TO DETECTING MULTIPLE USERS - A computer program product is provided including computer readable program code for running an application on a computer having a display, wherein the application requires external network access. The computer program product further includes computer readable program code for determining a number of people gathered around the computer, and computer readable program code for automatically changing the network priority of the application as a function of the number of people determined to be gathered around the computer. The number of people gathered around the computer is preferably determined using a facial recognition module to analyze an image captured by a camera of the computer or using a speech recognition module to analyze sound captured by a microphone of the computer. | 06-11-2015 |
20150163067 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 06-11-2015 |
20150163068 | CONTROL OF COMPUTING DEVICE USE DURING CONFERENCES - Systems and methods for control of computing device use during conferences are disclosed. According to an aspect, a method includes receiving a communication that defines a rule for controlling use of a computing device during a conference associated with the computing device. The method also includes determining occurrence of the conference. Further, the method includes applying the rule to control use of the computing device during occurrence of the conference in response to determining occurrence of the conference. | 06-11-2015 |
20150163128 | DATA RE-ROUTING FOR SPECIFIC END USER AVOIDANCE - Embodiments of the present invention provide a method, system and computer program product for data routing alteration to avoid a specified end user. In an embodiment of the invention, a method for data re-routing for specific end user avoidance includes receiving a request to route a file to a primary location and identifying an end user excluded from accessing the document. The method also includes computing a likelihood that the excluded end user may contemporaneously access the primary location. Finally, the method includes responding to a determination that the excluded end user is likely to contemporaneously access the primary location by taking corrective measures to re-route the file to an alternate location. | 06-11-2015 |
20150163308 | CHANGING APPLICATION PRIORITY IN RESPONSE TO DETECTING MULTIPLE USERS - A method is provided including running an application on a computer having a display, wherein the application requires external network access. The method further includes determining a number of people gathered around the computer, and automatically changing the network priority of the application as a function of the number of people determined to be gathered around the computer. The number of people gathered around the computer is preferably determined using a facial recognition module to analyze an image captured by a camera of the computer or using a speech recognition module to analyze sound captured by a microphone of the computer. | 06-11-2015 |
20150163351 | PROJECTED CALL DURATION VALUES BASED ON AMBIENT CONDITIONS - A computer program product includes computer readable program code for detecting one or more ambient conditions using one or more components of a first communication device, computer readable program code for determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions, and computer readable program code for providing the projected call duration value to a second communication device prior to the second communication device connecting a call between the first and second communication devices. The second communication will preferably display the projected call duration value to the user to assist the user in deciding whether to initiate a call with the first communication device. | 06-11-2015 |
20150163357 | PROJECTED CALL DURATION VALUES BASED ON AMBIENT CONDITIONS - A method includes detecting one or more ambient conditions using one or more components of a first communication device, determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions, and providing the projected call duration value to a second communication device prior to the second communication device connecting a call between the first and second communication devices. The second communication will preferably display the projected call duration value to the user to assist the user in deciding whether to initiate a call with the first communication device. | 06-11-2015 |
20150179184 | Compensating For Identifiable Background Content In A Speech Recognition Device - Compensating for identifiable background content in a speech recognition device, including: receiving, by a noise filtering module, an identification of environmental audio data received by the speech recognition device; and filtering, by the noise filtering module in dependence upon which portion of the identified environmental audio data was being rendered when the audio data generated from the plurality of sources was received, the audio data generated from the plurality of sources. | 06-25-2015 |
20150193074 | SYSTEM AND METHOD FOR ALTERING INTERACTIVE ELEMENT PLACEMENT BASED AROUND DAMAGED REGIONS ON A TOUCHSCREEN DEVICE - An apparatus for avoiding a damaged region on a touchscreen is disclosed. A method and a computer program product also perform the functions of the apparatus. The apparatus includes a damage location module that determines a location of an area of damage on a touchscreen of a computing device. The area of damage includes damage to the touchscreen. The apparatus, in one embodiment, includes a display location module that determines a location of one or more display items commanded to be displayed on the touchscreen. Each display item includes a location to be displayed on the touchscreen. The apparatus includes, in one embodiment, a rearrangement module that alters a location of a display item to be displayed in the area of damage where the display item is moved to a location on the touchscreen outside the area of damage on the touchscreen. | 07-09-2015 |
20150193422 | VALIDATION OF FORMULAS WITH EXTERNAL SOURCES - A method, system, and/or computer program product validates a formula within a spreadsheet. A formula type, of an identified formula from a spreadsheet, is identified. A database of known accurate formulas, whose type matches a formula type of the identified formula within the spreadsheet, is identified and located. A determination is made as to whether the identified formula from the spreadsheet matches a known accurate formula from the database. In response to the identified formula from the spreadsheet failing to match the known accurate formula from the database, a predefined action is initiated. | 07-09-2015 |
20150195215 | COLLABORATIVE ROUTE RESERVATION AND RANKING IN HIGH PERFORMANCE COMPUTING FABRICS - Embodiments of the present invention provide a method, system and computer program product for collaborative route reservation in an HPC fabric. A method for collaborative route reservation in an HPC fabric includes selecting a target node in a cluster of nodes to receive a payload from a source node of the cluster over an HPC fabric and computing a route over the HPC fabric for transferring the payload from the source node to the target node, and also a duration of time requisite to transferring the payload. The method also includes notifying other nodes in the cluster of a reservation of the computed route for the duration of time and utilizing the computed route during the duration of time to transfer the payload. Finally, the method includes responding to completing transfer of the payload by notifying the other nodes that the computed path is no longer reserved. | 07-09-2015 |
20150212658 | INDICATING ALTERED USER INTERFACE ELEMENTS - In an approach for altering interaction with user interface elements, a computer determines a location of one or more elements in a first user interface layout. The computer compares the location of the one or more elements in a second user interface layout. The computer determines the location of at least one of the one or more elements changed in the second user interface layout. The computer determines whether an objective of the change of location is to cause a user to select an alternate element of the one or more elements in the second user interface layout. Responsive to determining the objective of the change of location is to cause a user to select an alternate element of the one or more elements in the second user interface layout, the computer indicates at least one of the one or more elements is altered. | 07-30-2015 |
20150232064 | LIMITATIONS ON THE USE OF AN AUTONOMOUS VEHICLE - A computer program product is provided for controlling an autonomous vehicle, where the computer program product comprises a computer readable storage medium having program instructions embodied therewith and executable by a processor to cause the processor to perform a method. The method includes determining whether a primary user is present in an autonomous vehicle, allowing use of a plurality of functions of the autonomous vehicle in response to determining that the primary user is present in the autonomous vehicle, and receiving and storing preferences input by the primary user, wherein the preferences limit a function of the autonomous vehicle if the primary user is not present. The method further includes limiting use of the one or more of the plurality of functions of the autonomous vehicle as specified by the preferences in response to determining that the primary user is not present in the autonomous vehicle. | 08-20-2015 |
20150233719 | LIMITATIONS ON THE USE OF AN AUTONOMOUS VEHICLE - A method for controlling an autonomous vehicle includes determining whether a primary user is present in an autonomous vehicle, allowing use of a plurality of functions of the autonomous vehicle in response to determining that the primary user is present in the autonomous vehicle, and receiving and storing preferences input by the primary user, wherein the preferences identify a limitation on one or more of the plurality of functions of the autonomous vehicle that should be enforced during use of the autonomous vehicle if the primary user is not present in the autonomous vehicle. The method further includes limiting use of the one or more of the plurality of functions of the autonomous vehicle as specified by the preferences in response to determining that the primary user is not present in the autonomous vehicle. | 08-20-2015 |
20150235480 | Administering A Recall By An Autonomous Vehicle - Administering a recall by an autonomous vehicle, including: receiving, by a vehicle management module, a recall message identifying a component of the autonomous vehicle that is subject to the recall; adjusting, by the vehicle management module, a vehicle capability in dependence upon the component of the autonomous vehicle that is subject to the recall; determining, by the vehicle management module, a recall response plan in dependence upon the adjusted vehicle capability; and executing, by the vehicle management module, the recall response plan. | 08-20-2015 |
20150235672 | Techniques to Bias Video Thumbnail Selection Using Frequently Viewed Segments - Techniques for intelligently biasing video thumbnail selection to popular segments of the video file are provided. In one aspect, a method of selecting video thumbnails used to represent a video file is provided. The method includes the steps of: (a) acquiring trending data from viewers related to the video file; (b) using the trending data to identify one or more segments of the video file that are popular among the viewers; and (c) adapting a selection of the video thumbnails used to represent the video file to the segments identified in step (b). | 08-20-2015 |
20150241241 | IDENTIFYING COST-EFFECTIVE PARKING FOR AN AUTONOMOUS VEHICLE - Identifying cost-effective parking for an autonomous vehicle, including: identifying, by a vehicle parking module, a plurality of available parking spots for parking the autonomous vehicle; determining, by the vehicle parking module, a total cost associated with each of the plurality of available parking spots for parking the autonomous vehicle; and selecting, by the vehicle parking module, a target parking spot in dependence upon the total cost associated with each of the plurality of available parking spots for parking the autonomous vehicle. | 08-27-2015 |
20150242801 | COLLABORATIVE INFRASTRUCTURE UPDATE SCHEDULING - A method, system, and/or computer program product manages update operations for a hardware resource. A time, date, and location of the future meeting for which a predetermined feature from a hardware resource has been designated as being required for the future meeting is retrieved from a calendar. A determination is made as to whether or not the predetermined feature of the hardware resource is scheduled for updating during the time and date of the future meeting at said location. A level of detriment that will occur to the future meeting if the future meeting proceeds without the updating of the predetermined feature from the hardware resource is determined. A schedule for updating the hardware resource is then adjusted according to the level of detriment that will occur to the future meeting if the future meeting proceeds without the updating of the predetermined feature from the hardware resource. | 08-27-2015 |
20150244581 | ROLE ASSIGNMENT FOR SERVERS IN A HIGH PERFORMANCE COMPUTING SYSTEM BASED ON MEASURED PERFORMANCE CHARACTERISTICS - Embodiments of the present invention disclose a method, computer program product, and for determining a recommendation relating to a configuration of a plurality of server nodes of a computing system. In one embodiment, in accordance with the present invention, the computer implemented method includes the steps of, for each server node, storing a first performance parameter value, wherein each first performance parameter value is a benchmarked value that corresponds to a measured actual performance parameter of its associated server node, and applying a first configuration rule based, at least in part, on the first performance parameter values of the plurality of server nodes to obtain a first configuration recommendation. In another embodiment, the method further includes the step of presenting the first recommendation to a human user. | 08-27-2015 |
20150248548 | INCREASING ACCESS SECURITY WITH TIME SINCE LAST ACCESS - A computer program product for controlling access to a resource of an electronic device includes program instructions for executing a method. The method stores a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the last access. | 09-03-2015 |
20150248550 | INCREASING ACCESS SECURITY WITH TIME SINCE LAST ACCESS - A method includes storing a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the user last accessed the resource. | 09-03-2015 |
20150264145 | COMMUNICATIONS RESPONSIVE TO RECIPIENT SENTIMENT - A computer program product includes a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method including receiving input from a first communication device of a first user identifying a target sentiment associated with a second user, monitoring current online activity of the second user to determine a current sentiment for the second user, and initiating communication between the first communication device of the first user and a second communication device of the second user in response to the current sentiment of the second user meeting the target sentiment input by the first user. | 09-17-2015 |
20150264146 | COMMUNICATIONS RESPONSIVE TO RECIPIENT SENTIMENT - A method includes receiving input from a first communication device of a first user identifying a target sentiment associated with a second user, monitoring current online activity of the second user to determine a current sentiment for the second user, and initiating communication between the first communication device of the first user and a second communication device of the second user in response to the current sentiment of the second user meeting the target sentiment input by the first user. | 09-17-2015 |
20150265919 | GAME INCENTIVIZED OPTIMIZATION OF RESOURCE UTILIZATION - Embodiments of the present invention provide a method, system and computer program product for game incentivized resource utilization optimization in a multiplayer gaming environment. In an embodiment of the invention, a method for game incentivized resource utilization optimization in a multiplayer gaming environment is provided. The method includes hosting a multiplayer gaming environment providing a game amongst a selection of servers in a cluster and detecting overutilization of a resource in one of the servers. A remedial action likely to reduce the overutilization can be identified as can an incentive of the game likely to provoke the identified remedial action. Thereafter, the identified game incentive can be provided to a player in the multiplayer gaming environment. | 09-24-2015 |
20150269148 | COLLABORATIVE CAPTURE OF PHOTOGRAPHIC IMAGES - A computer program product includes program instructions executable by a processor to perform a method including identifying a stored photographic image and metadata associated with the stored image, wherein the metadata includes a location and an orientation of a camera when the stored image was captured. The method identifies a target photographic image to be requested, wherein a description of the target image is derived from the metadata of the stored image and includes a target location and a target orientation. The method monitors the location of a plurality of mobile communication devices and, in response to determining that a first mobile communication device is proximate to the target location, notifies the first mobile communication device of a request to capture the target photographic image, wherein the request includes the target location and the target direction. | 09-24-2015 |
20150271393 | COLLABORATIVE CAPTURE OF PHOTOGRAPHIC IMAGES - A method includes identifying a stored photographic image and metadata associated with the stored image, wherein the metadata includes a location and an orientation of a camera when the stored image was captured. The method further identifies a target photographic image to be requested, wherein a description of the target image is derived from the metadata of the stored image and includes a target location and a target orientation. The method monitors the location of a plurality of mobile communication devices and, in response to determining that a first mobile communication device is proximate to the target location, notifies the first mobile communication device of a request to capture the target photographic image, wherein the request includes the target location and the target direction. | 09-24-2015 |
20150290880 | PRINTING A THREE DIMENSIONAL OBJECT ABOUT A VOXEL STRUCTURE ASSEMBLED FROM PREFORMED BLOCKS - A computer program product includes a computer readable storage medium having program instructions embodied therewith, where the program instructions are executable by a processor to cause the processor to perform a method. The method comprises obtaining data describing external surfaces of a three dimensional object to be made using a three dimensional printer; determining, for a given voxel size, a voxel structure having a size and a shape to be subsumed within the external surfaces of the object; outputting user instructions for manually assembling the voxel structure and positioning the voxel structure into the three dimensional printer; and printing material onto the assembled voxel structure to form an object that subsumes the voxel structure. The use of a voxel structure can reduce print time and the amount of print resources required to form an object. | 10-15-2015 |
20150293722 | PRINTING A THREE DIMENSIONAL OBJECT ABOUT A VOXEL STRUCTURE ASSEMBLED FROM PREFORMED BLOCKS - A method includes obtaining data describing external surfaces of a three dimensional object to be made using a three dimensional printer; determining, for a given voxel size, a voxel structure having a size and a shape to be subsumed within the external surfaces of the object; outputting user instructions for manually assembling the voxel structure and positioning the voxel structure into the three dimensional printer; and printing material onto the assembled voxel structure to form an object that subsumes the voxel structure. The use of a voxel structure can reduce print time and the amount of print resources required to form an object. | 10-15-2015 |
20150294030 | PRINTING A THREE DIMENSIONAL OBJECT ABOUT A PREFORMED STRUCTURE - A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes obtaining a data file that includes print instructions for causing a three dimensional printer to print a three dimensional object, wherein the data file describes external surfaces of the object, and providing user instructions for positioning a preformed structure so that the three dimensional printer can print the object around the preformed structure, wherein the preformed structure has a size and a shape to be subsumed within the external surfaces of the object. The method further includes modifying the print instructions so that the printer will print the object around the preformed structure, and printing material around the preformed structure using the modified print instructions to form the object. | 10-15-2015 |
20150294033 | PRINTING A THREE DIMENSIONAL OBJECT ABOUT A PREFORMED STRUCTURE - A method includes obtaining a data file that includes print instructions for causing a three dimensional printer to print a three dimensional object, wherein the data file describes external surfaces of the object, and providing user instructions for positioning a preformed structure so that the three dimensional printer can print the object around the preformed structure, wherein the preformed structure has a size and a shape to be subsumed within the external surfaces of the object. The method further comprises modifying the print instructions so that the printer will print the object around the preformed structure, and printing material around the preformed structure using the modified print instructions to form the object. | 10-15-2015 |
20150309510 | POSITIONING AUTONOMOUS VEHICLES BASED ON FIELD OF VIEW - Positioning autonomous vehicles based on field of view, including: identifying, by a vehicle management module, one or more critical sight lines for a subject vehicle, each critical sight line representing a boundary of an area of space surrounding the subject vehicle; determining, by the vehicle management module, physical location information for one or more surrounding vehicles; determining, by the vehicle management module in dependence upon the physical location information for one or more surrounding vehicles, whether one or more surrounding vehicles are located within the area of space surrounding the subject vehicle; and responsive to determining that one or more surrounding vehicles are located within the area of space surrounding the subject vehicle, altering a location of the subject vehicle relative to at least one of the surrounding vehicles. | 10-29-2015 |
20150327381 | RACK MOUNTABLE NETWORK SWITCH - A rack mountable network switch, the rack mountable network switch comprising: a faceplate; a switch chassis coupled to the faceplate, the switch chassis including a plurality of connector openings on a surface of the switch chassis that is perpendicular to the faceplate; a plurality of moveable plug receptacles coupled to a printed circuit board (‘PCB’) mounted inside the switch chassis; and a mechanical positioning component coupled to the moveable plug receptacles, the mechanical positioning component configured to position the moveable plug receptacles to extrude from the switch chassis via the connector openings when the mechanical positioning component is in a first position, the mechanical positioning component further configured to position the moveable plug receptacles inside the switch chassis when the mechanical positioning component is in a second position. | 11-12-2015 |
20150331854 | DOMAIN SPECIFIC NATURAL LANGUAGE NORMALIZATION - Embodiments of the present invention provide a method, system and computer program product for the domain specific normalization of a corpus of text. In an embodiment of the invention, a method for domain specific normalization of a corpus of text is provided, including an industrial, organization, demographic or geographic domain. The method includes loading a corpus of text in memory of a computer and determining a domain for the corpus of text. The method also includes retrieving a lexicon of replacement words for the determined domain. Finally, the method includes text simplifying the corpus of text using the retrieved lexicon. In one aspect of the embodiment, the domain is determined through inference based upon words already presence in the corpus of text. In another aspect of the embodiment, the domain is determined based upon meta-data provided with the corpus of text. | 11-19-2015 |
20150339067 | RAID 1 MIRROR MESHED INTO A CO-EXISTING RAID 5 PARITY STREAM - A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes storing an operating system in minor stripes on a first data storage device forming a first logical storage unit, and storing data in major stripes across a plurality of data storage devices forming a second logical data storage unit. Each major stripe includes a plurality of minor stripes storing data and a parity stripe. The method further includes calculating the parity stripe from the plurality of minor stripes within the major stripe and a corresponding one of the minor stripes on the first data storage device, wherein the minor stripes on the first data storage device match the size of the minor stripes on the array of data storage devices. | 11-26-2015 |
20150339068 | RAID 1 MIRROR MESHED INTO A CO-EXISTING RAID 5 PARITY STREAM - A method includes storing an operating system in minor stripes on a first data storage device forming a first logical storage unit, and storing data in major stripes across a plurality of data storage devices forming a second logical data storage unit. Each major stripe includes a plurality of minor stripes storing data and a parity stripe. The method further includes calculating the parity stripe from the plurality of minor stripes within the major stripe and a corresponding one of the minor stripes on the first data storage device, wherein the minor stripes on the first data storage device match the size of the minor stripes on the array of data storage devices. | 11-26-2015 |
20150358206 | CONFIGURING A COMPUTING SYSTEM TO DELAY A SYSTEM UPDATE - Configuring a computing system to delay a system update, including: receiving, by an update management module, an update descriptor associated with an available system update, the update descriptor including information identifying a targeted system configuration to be updated by the available system update; determining, by the update management module, whether the available system update should be blocked; responsive to determining that the available system update should be blocked, determining, by the update management module, whether the computing system can be reconfigured such that the computing system does not operate using the targeted system configuration; and responsive to determining that the computing system can be reconfigured such that the computing system does not operate using the targeted system configuration, reconfiguring, by the update management module, the computing system to operate without using the targeted system configuration. | 12-10-2015 |
20150358765 | SECURING A MOBILE DEVICE BY BINDING TO AN ITINERARY - A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes storing an itinerary in memory of an electronic device, wherein the itinerary includes a plurality of destinations and a time period associated with each destination. The method further includes monitoring the location of the electronic device, comparing the location of the electronic device to the itinerary, and restricting use of the electronic device in response to determining that the location of the electronic device at the current time does not match the destination specified in the itinerary for the time period that includes the current time. | 12-10-2015 |
20150358769 | SECURING A MOBILE DEVICE BY BINDING TO AN ITINERARY - A method includes storing an itinerary in memory of an electronic device, wherein the itinerary includes a plurality of destinations and a time period associated with each destination. The method further includes monitoring the location of the electronic device, comparing the location of the electronic device to the itinerary, and restricting use of the electronic device in response to determining that the location of the electronic device at the current time does not match the destination specified in the itinerary for the time period that includes the current time. | 12-10-2015 |
20150360129 | MANAGING A POPULATION OF PLAYERS OF ONLINE GAMES - A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players. | 12-17-2015 |
20150360130 | MANAGING A POPULATION OF PLAYERS OF ONLINE GAMES - A method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players. A target population of players may be determined, for example, by correlating a parameter of player satisfaction, such as player duration in-game, with the population of players in the game. | 12-17-2015 |
20150363156 | MEDIA SPLITTING AND REDUCTION IN STORAGE REQUIREMENTS BASED ON COMMON CONTENT - A method and computer program product for executing the method, where the method includes analyzing a multimedia file including audio content and video content, identifying a portion of the audio content that matches a portion of a separate audio file, removing the identified portion of the audio content from the multimedia file, and inserting a link into the multimedia file. The link points to the known audio file, specifies the portion of the separate audio file that matches the removed portion of the audio content, and identifies a point in the multimedia file where the portion of audio content was removed. During playback of the multimedia file, the specified portion of the known audio file is played at the identified point in the multimedia file. | 12-17-2015 |
20160004684 | VALIDATION OF FORMULAS WITH EXTERNAL SOURCES - A method validates a formula within a spreadsheet. A formula type, of an identified formula from a spreadsheet, is identified. A database of known accurate formulas, whose type matches a formula type of the identified formula within the spreadsheet, is identified and located. A determination is made as to whether the identified formula from the spreadsheet matches a known accurate formula from the database. In response to the identified formula from the spreadsheet failing to match the known accurate formula from the database, a predefined action is initiated. | 01-07-2016 |