Patent application number | Description | Published |
20080294738 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR CORRECTING E-MAIL MESSAGES WITH MISSING RECEIVERS - A solution is proposed for exchanging messages (such as e-mails) among a plurality of data processing entities, such as client computers ( | 11-27-2008 |
20090013084 | METHOD AND APPARATUS FOR CONTROLLING MULTIPLE SYSTEMS IN A LOW BANDWIDTH ENVIRONMENT - A method of controlling one or more client systems by means of one or more server systems, comprising the steps of identifying a set of system control actions that occur as a result of carrying out a particular function on the server system, which function is required to be replicated on the one or more client systems; and sending the set of system control actions to any client system which is connected to the server system to configure the client system to carry out the system control actions and thereby causing the client system to carry out the particular function on the client system. | 01-08-2009 |
20090024708 | INSTANT MESSAGING IN A DATA PROCESSING SYSTEM - Methods, systems, and computer program products for exchanging instant messages among a plurality of users of data processing client entities (such as personal computers) are disclosed. For each user, a corresponding method starts with associating a profile with the user. The profile defines a set of (one or more) events, and for each event a set of (one or more) corresponding actions. The method continues by detecting the occurrence of one of the events. A selected action corresponding to the occurred event is then executed. | 01-22-2009 |
20090094297 | ARCHIVING TOOL FOR MANAGING ELECTRONIC DATA - A method for storing electronic data in a network including a server and at least two client machines. Electronic data may be archived in a predetermined location of a client machine. A local archiving list may be generated on the client machine and may include descriptive properties of the electronic data, as well as the predetermined location. The local archiving list may be transmitted from the client machine to the server to generate a global archiving list, which may then be transmitted to any other client machines in communication with the server. In this manner, each client machine in the network may store the location and descriptive properties of the archived electronic data to facilitate electronic data recovery. | 04-09-2009 |
20090106266 | Method and System for Adjusting Software Settings - An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices. | 04-23-2009 |
20090150762 | ENTERING DATA INTO A WEBPAGE - Methods, systems, and computer program products for entering data into a web page by means of a data processing system. The method includes detecting a wireless device and forming a communication link between the data processing system and the wireless device. The method also includes retrieving data from the wireless device. The method also includes populating fields in the web-page with the retrieved data. | 06-11-2009 |
20090160621 | MULTIMEDIA ARTICLE MANAGEMENT FACILITY - A method is presented for managing user preferences upon reading a multimedia article. The method may include receiving a request to read the multimedia article, and reading a RFID tag coupled to the multimedia article. The RFID tag may store user preference information for reading the multimedia article. The user preference information may then be applied, and the multimedia article may be read in accordance with the user preference information. | 06-25-2009 |
20090160675 | Method and System for Monitoring Road Surface Conditions - Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage. | 06-25-2009 |
20090191849 | ENHANCED MESSAGING COLLABORATION - The capabilities of a collaboration messaging system are extended through so that a user can be contacted, or at least notified of incoming messages, when the user is away from his own messaging client computer but is near another messaging client computer. The proximity of a user to a messaging client computer other than his own is inferred from the detection of a wireless communications device (e.g., a Bluetooth-enabled cellular phone) associated to the user. The association is recorded in a user profile set up by the user and stored in the collaboration messaging system. If a wireless communications device is detected proximate to a messaging client computer, a search is made of stored user profiles, each of which associates a particular wireless communication with a particular user. If a profile exists for the detected wireless communication device, it is retrieved and a set of actions defined in the user profile is implemented. The defined actions include sending messages addressed to the users own messaging client computer to the proximate messaging client computer, sending notices of the messages to the proximate client computer and sending a notice to the sender of the message that the user is near a particular client messaging computer. | 07-30-2009 |
20090243898 | ELECTRONIC DEVICE WITH INTELLIGENT KEYBOARD ILLUMINATION - An electronic device includes a computer keyboard having keys that are each capable of individual illumination. An electronic dictionary is provided for determining a set of most likely keys to be needed for an application, wherein the electronic dictionary is updated to include new words typed on the keyboard. The keyboard is operated with a user enabled/disabled function of selective illumination of respective keyboard keys so that a set of most likely alphabet keys according to the electronic dictionary along with an enter key and space bar are illuminated if a word processor application is running. Numeric keys are illuminated if a calculator application is running. The selective illumination is automatically disabled if user identification and password fields are being filled. All of the keys are automatically illuminated after a configured timeframe in which none of the suggested keys have been pressed. All of the keys are unlit after an additional configured timeframe in which none of the keys have been pressed. | 10-01-2009 |
20090319428 | Authorizing An Electronic Payment Request - An electronic payment request is authorized using a plurality of electronic codes. A first code is requested from a user on receipt of a payment request made with a payment card configured with one or more details of one or more devices in the possession of one or more owners of the card. The payment is refused in the event the first code does not substantially match a predefined second code. A third code is requested from the one or more devices with whose details the payment card is configured if the first code substantially matches the second code. The third code is compared with a predefined fourth code. The payment is refused in the event the third code does not substantially match the fourth code, while the payment is authorized in the event the third code substantially matches the fourth code. | 12-24-2009 |
20090326971 | METHOD FOR MANAGING PACKAGE DELIVERY - A method for managing package delivery may include receiving a plurality of packages. Each package may include a bar code or RFID tag associating the package with personal profile information. A delivery route plan may be generated based on the personal profile information. The estimated delivery time may be transmitted to the recipient in advance of the delivery. An electronic reply communication including a location of the recipient may be received from a notified recipient either confirming the delivery or proposing an alternate delivery time or location. The delivery route plan may be recalculated based on the retrieved personal profile information, the alternate delivery time or location if proposed by the recipient, and/or the current location of the recipient to identify alternate delivery time and location options. A confirmation selecting one of the alternate delivery time and location options or reconfirming the delivery may be received from the recipient. | 12-31-2009 |
20100017479 | METHOD AND SYSTEM FOR PROVIDING PROXY FUNCTIONALITY IN A MESSAGE CLIENT - A method and system for communicating electronic messages among clients in a network is provided. One implementation involves marking an electronic message to indicate that the message is to be routed to recipient clients identified by a user group definitions, sending the marked message from a sender client to a proxy client, parsing an incoming message at the proxy client to detect an indication that the message is to be routed to recipient clients in a user group, and routing the message from the proxy client to one or more recipients in the user group based on the user group definition. | 01-21-2010 |
20100017482 | METHOD AND SYSTEM FOR LOCATION AWARE ELECTRONIC COMMUNICATION - A method and system for location aware electronic communication. One implementation involves receiving an electronic communication at a receiving client, upon detecting that the communication includes location-based information, retrieving criteria for processing the communication from a location profile, and automatically processing the communication utilizing the retrieved criteria and the location-based information from the communication. | 01-21-2010 |
20100017874 | METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION - A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. | 01-21-2010 |
20100020092 | METHOD AND SYSTEM FOR DISPLAY MONITOR ELECTRIC POWER CONSUMPTION OPTIMIZATION - A method and system for controlling electrical power consumption of a display monitor screen, is provided. One implementation involves grouping screen pixels into different resolution cells, detecting display of one or more windows on the screen, and selectively controlling the cells by providing power only to the pixels in cells corresponding to one or more windows of interest to the user, and reducing power to pixels in remaining cells. | 01-28-2010 |
20100043011 | METHOD FOR TRACKING LOCAL STORAGE OF WEB PAGES - The present disclosure is directed to a method for tracking client side storage of a web page. The method may comprise providing a script in the web page for responding to a save operation; responding to the save operation initiated in a browser; sending a set of tracking information to a HTTP server providing the web page and/or a particular resource to be stored; forwarding the set of tracking information to an application server; and storing the set of tracking information. | 02-18-2010 |
20100076926 | METHOD AND SYSTEM FOR DYNAMIC CONTACT INFORMATION MANAGEMENT IN ELECTRONIC COMMUNICATION DEVICES - A method and system for user contact information in electronic devices is provided. One implementation involves detecting a change in a user contact information at a first electronic device, determining effective date of the change in the contact information, storing the contact information change and effective date in a memory store, automatically communicating the contact information change and effective date to a second electronic device, and applying the received contact information change to a contact information list in a memory store of the second device, on or after the effective date. | 03-25-2010 |
20100114626 | METHOD AND SYSTEM FOR CAR SHARING - The present disclosure is directed to a method for facilitating ride sharing among a plurality of commuters having a common starting location. The method may comprise receiving a leaving status set by a first commuter; retrieving a set of predefined attributes of the first commuter from a repository; sending a travel request to a central manager, the travel request comprising the set of predefined attributes of the first commuter; analyzing the set of predefined attributes to determine a list of potentially matching commuters; broadcasting the travel request to the list of potentially matching commuters; determining a list of confirmed matching commuters based on responses from the list of potentially matching commuters; forming an agreement between the commuters; and setting a new status for the first commuter and each of the list of confirmed matching commuters, the new status indicating completion of ride sharing matching. | 05-06-2010 |
20100172266 | DYNAMIC NETWORK CONFIGURATION FOR A NETWORK DEVICE - A network services profile can be associated with a unique device identifier, such as a MAC address, rather than an IP address. When a network device is connected to a network, a network management server can recognize the unique device identifier and retrieve the network services profile. The network management server can automatically enables network services indicated in the network services profile. | 07-08-2010 |
20100172481 | User Status Management in a Voice Calling Architecture - A mechanism for indicating a specific response message to be played to a caller is provided. A call that comprises an identification of a caller is received in a recipient device. If the recipient device is operating in the phone management mode, a recipient notification of the call is blocked on the recipient device. If the caller is identified as a known caller based on the identification of the caller, a caller specific response message is sent to the known caller. The caller specific response message is at least one of an interactive or a non-interactive caller specific response message. The interactive response message includes a code with which to respond. If the response message is the interactive response message and the caller enters the code associated with the interactive response message, then the recipient notification of the call is activated on the recipient device. | 07-08-2010 |
20100174759 | Personal Resources Organizer with Calendar Interface and Object Detection - A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects. | 07-08-2010 |
20100174816 | On-Demand Network Connection - An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection. | 07-08-2010 |
20100174999 | INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION - A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee. | 07-08-2010 |
20120150986 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120151067 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120151488 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 06-14-2012 |
20120163569 | User Status Management in a Voice Calling Architecture - A mechanism for indicating a specific response message to be played to a caller is provided. A call that comprises an identification of a caller is received in a recipient device. If the recipient device is operating in the phone management mode, a recipient notification of the call is blocked on the recipient device. If the caller is identified as a known caller based on the identification of the caller, a caller specific response message is sent to the known caller. The caller specific response message is at least one of an interactive or a non-interactive caller specific response message. The interactive response message includes a code with which to respond. If the response message is the interactive response message and the caller enters the code associated with the interactive response message, then the recipient notification of the call is activated on the recipient device. | 06-28-2012 |
20120173669 | Adjusting Software Settings - An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices. | 07-05-2012 |
20120174192 | Displaying A Known Sender's Identifier To A Recipient Of A Joint Senders' Message - An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG. | 07-05-2012 |
20120191812 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120191821 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120197803 | DUAL LAYER AUTHENTICATION FOR ELECTRONIC PAYMENT REQUEST IN ONLINE TRANSACTIONS - Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established. | 08-02-2012 |
20120209868 | Personal Resources Organizer with Calendar Interface and Object Detection - A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects. | 08-16-2012 |
20120311225 | DEVICE DRIVER-LEVEL APPROACH FOR UTILIZING A SINGLE SET OF INTERFACE INPUT DEVICES FOR MULTIPLE COMPUTING DEVICES - A method for switching interface device input between computing devices can begin with connecting a primary computing device to a secondary computing device using a physical connector cable using the appropriate communications port of each computing device. An interface input control program can be configured to establish a unique interface trigger that defines a user-selected series of inputs that switches the primary computing device between a first input state and a second input state. Input from the interface input devices of the primary computing device can be interpreted by a device driver. In the first input state, the input can be directed to the operating system of the primary computing device. In the second input state, the input can be redirected to the secondary computing device via the physical connector cable, which can be recognized as having originated from local interface input devices. | 12-06-2012 |
20130018951 | SCHEDULING A MEETING IN REAL TIMEAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A method, data processing system, and computer program product for sending a notification of a meeting. An identification is made when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance. Whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting is determined in response to the identification that the number of users in the plurality of users is within the threshold distance. The notification of the meeting is sent to the number of the users in response to determining that the number of users is greater than or equal to the threshold number. | 01-17-2013 |
20130019313 | GRANULAR VIRUS DETECTIONAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A group of files for an application installed on a computer system is identified in response to a request to scan the application for malware. The group of files for the application is scanned for the malware. A result is obtained. An action is performed based on the result. | 01-17-2013 |
20130040602 | Managing Cellular Phone Calls - A mechanism is disclosed for managing phone calls on phone devices used by the employee of a company. When the user wants to give a call, a new plugin in the phone device interprets an attribute value added by the phone device user to each phone number in order to categorize the call. The cell phone user enters a profile describing his call accounting information. A call management plugin computes a prefix for user personal calls which will be adapted to the user location. The call management plugin at the end of the call tags the call information as a personal call or business call. The phone device sends the tagged call information to a remote server of the company, which consolidates billing information received from the phone operators with the tagged call information. | 02-14-2013 |
20130124658 | INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION - A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee. | 05-16-2013 |
20130138754 | Displaying A Known Sender's Identifier To A Recipient Of A Joint Senders' Message - An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG. | 05-30-2013 |
20130159793 | Preventing Distribution of a Failure - Mechanisms for preventing a distribution of a failure caused by a sequence of instructions in a distributed client server environment are provided. These mechanisms comprise executing the sequence of instructions on a first client, the instructions being provided by a management control server and being indicative of maintenance actions. These mechanisms may further comprise determining by the first client a failure caused by the sequence of instructions, and generating a warning message by the first client based on the determined failure. The warning message may comprise an indicator for the sequence of instructions. In addition, these mechanisms may comprise sending the warning message for informing a second client about the sequence of instructions causing the failure in order to prevent a distribution of the failure. | 06-20-2013 |
20130174156 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 07-04-2013 |
20140086397 | Phone Call Management - An approach is provided to manage phone calls. The approach is implemented by an information handling system, such as a smart phone. A requestor sends a contact request to another device over a network. If the request is accepted, the requestor receives a token with the token including usage parameters controlling the requestor's ability to contact the recipient by telephone. When the requestor requests to make a call to the recipient, the call is only placed upon successful determination made by comparing the usage parameters included in the token to a set of current call data. If a successful determination is made, the call is placed to the recipient without revealing the recipient's telephone number. However, if the request is denied, the system prevents the requestor for placing a call to the recipient. | 03-27-2014 |
20140157184 | CONTROL OF USER NOTIFICATION WINDOW DISPLAY - A method for controlling a user notification window (UNW). Under this method: (i) an initial-form UNW is generated in response to detection of existence of a first precondition; (ii) the first initial-form UNW is displayed on a display device; and (iii) subsequent to the initial display of the initial-form UNW and in response to the detection of a second precondition, control is applied that overwrites the display of the first initial-form UNW on the display device. The second precondition is a precondition other than a response made by a user of the display. | 06-05-2014 |
20140188394 | DETERMINING SEISMIC RESPONSE CHARACTERISTICS OF STRUCTURES - A system, method and/or software for determining at least one characteristic of at least one structure. A server sub-system includes a processor set and seismic software that runs on the processor set. The sever sub-system being in data communication with a communication network. The server sub-system receives, through the communication network, first detected movement information, relating to seismically-induced physical movement of a first client device. The server sub-system performs structure-characteristic determination, by its seismic software, to determine at least one structure characteristic of a first structure based, at least in part, upon the first detected movement information. Preferably, detected movement data from a great many client devices is utilized in performing the structure-characteristic determination. | 07-03-2014 |
20140200943 | ELECTRONIC CALENDAR SCHEDULING - A computer sends a binary representation of a request for a meeting to end-users. The computer generates one or more lists, wherein each of the lists includes electronic calendar time slots during which at least one of the plurality of end-users is able to attend the meeting. The computer identifies at least one electronic calendar time slot having a highest frequency of occurrence on the lists generated, which comprises iterating through each of the lists and computing a frequency of occurrence of the at least one electronic calendar time slot on the lists. The computer records the frequency of occurrence. The computer queues the meeting in response to the frequency of occurrence being less than a configurable threshold value. The computer schedules the meeting in response to the frequency of occurrence being equal to or greater than the configurable threshold value. | 07-17-2014 |
20140214969 | MANAGING ELECTRONIC MAIL FOR AN END-USER THAT IS UNAVAILABLE - A first computer sends an electronic message transparently to a second computer of intended recipients of an electronic mail (e-mail), in response to the e-mail addresses of the intended recipients being entered, by a first end-user on the first computer, into a ‘To’ message header field of the e-mail. The second computer sends a Boolean value to the first computer, wherein one of the intended recipients is not available to respond to the e-mail. The first computer queries a repository to return to the first end-user contact information of backup contact entities to respond the e-mail for the intended recipients that are not available to respond to the e-mail. The first computer sends the e-mail to the backup contact entities that are available to respond to the e-mail. The first computer deletes the e-mail from each inbox of the backup contact entities that received but did not read the e-mail before the intended recipients read the e-mail. | 07-31-2014 |