Patent application number | Description | Published |
20090013128 | Runtime Machine Supported Method Level Caching - A computer system includes a disk space comprising at least one type of memory and an operating system for controlling allocations and access to the disk space. A runtime machine runs applications through at least one of the operating system or directly on at least one processor of the computer system. In addition, the runtime machine manages a selected runtime disk space allocated to the runtime machine by the operating system and manages a separate method cache within the selected virtual disk space. The virtual machine controls caching within the method cache of a separate result of at least one method of the application marked as cache capable. For a next instance of the method detected by the runtime machine, the runtime machine accesses the cached separate result of the method in lieu of executing the method again. | 01-08-2009 |
20090013320 | Runtime Machine Analysis of Applications to Select Methods Suitable for Method Level Caching - A runtime machine manages a selected disk space allocated to the runtime machine by the operating system and manages a separate method cache within the selected virtual disk space. The runtime machine controls caching within the method cache of a separate result of at least one method of the application marked as cache capable. For a next instance of the method detected by the runtime machine, the runtime machine accesses the cached separate result of the method in lieu of executing the method again. The runtime machine marks a method as cache capable by analyzing the types of objects within the argument object graph and result object graph of a method. If the runtime machine detects only primitive type objects, then the runtime machine marks the method so that the result of the method will be stored in the method cache. | 01-08-2009 |
20090019421 | ASPECT ORIENTED APPLICATION OF A MEDIATOR IN AN ENTERPRISE SERVICE BUS (ESB) OF A SERVICE ORIENTED ARCHITECTED DATA PROCESSING SYSTEM - Embodiments of the present invention address deficiencies of the art in respect to mediation application in an ESB and provide a novel and non-obvious method, system and computer program product for aspect oriented application of a mediation in an ESB. In one embodiment, a method for aspect oriented application of a mediation in an ESB can be provided. The method can include installing an aspect in an ESB, the aspect referencing at least one mediation and associating the at least one mediation with at least one target in the ESB. The method further can include applying the at least one mediation in the aspect to each associated target in the ESB. | 01-15-2009 |
20090061830 | SYSTEM AND METHOD FOR REQUESTING ASYNCHRONOUS FILE DOWNLOADS TO A CELLULAR PERVASIVE DEVICE FROM A WEBSITE - The present invention is a system and method for requesting asynchronous file downloads to a cellular pervasive device from a website. Because cell phones have enough bandwidth and storage space to download the file and store the file, the present invention provides the ability to schedule asynchronous downloads to a cellular device that are automatically resumed after network disconnects and network changes from a website. The method allows a user, having a cellular pervasive device having connectivity to a website server, to request and receive asynchronous file downloads to his cellular pervasive device from a website server comprising the steps of the user logging into the website, the user entering a URL for a file download to his cellular pervasive device from the website; and the website server downloading a file to the user's cellular pervasive device. | 03-05-2009 |
20090063838 | MULTI-OPERATING SYSTEM DOCUMENT EDITING MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power document editing mode for mobile computing devices. In an embodiment of the invention, a battery powered computing device can be configured for power optimized document editing, the computing device. The device can include a central processing unit (CPU), both coupled to a battery, memory, fixed storage and a display within a single computing case. The device also can include a primary personal computing operating system and also an auxiliary low-power consumption operating system each stored in fixed storage, each including a configuration to access an editable document in the fixed storage. Finally, the device can include a boot read only memory (ROM) programmed to selectively bootstrap into either the primary personal computing operating system or the auxiliary low-power consumption operating system. | 03-05-2009 |
20090063839 | LOW POWER DATA TRANSFER MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power data transfer mode for mobile computing devices. In an embodiment of the invention, a method for low power data transfer in a battery powered computing device can be provided. The method can include powering up a battery powered computing device, booting into a primary personal computing operating system in the device and storing a document into fixed storage for the device, and subsequently re-booting into an auxiliary low-power consumption operating system in the device, establishing a short range radio frequency communications link between the battery powered computing device and an external pervasive device, and transmitting the stored document to the pervasive device over the short range radio frequency communications link. | 03-05-2009 |
20090063873 | DOCUMENT VIEWING MODE FOR BATTERY POWERED COMPUTING DEVICES - Embodiments of the present invention address deficiencies of the art in respect to document viewing within a battery powered computing device and provide a method, system and computer program product for the power optimized use of a battery powered computing device for selective document viewing. In one embodiment, a battery powered computing device configured for power optimized selective document viewing can be provided. The device can include a central processing unit (CPU) and a microcontroller, both coupled to a battery, static memory, and a display within a single computing case. The device further can include a boot read only memory (ROM) programmed to selectively bootstrap into either a personal computing mode powering the CPU and display, or a document viewing mode powering the microcontroller and display. | 03-05-2009 |
20090119681 | System and Method for Virus Notification Based on Social Groups - Virus notifications based on social groups are provided. When an anti-virus program is updated, the anti-virus program informs its peers within the social group of the update. When a particular peer computing device is infected, it notifies the other anti-virus programs in the social group. The notification to the other anti-virus programs may identify which particular patches/updates are required for that particular peer computing device's anti-virus program based on the data structure that maintains the update status of the anti-virus software on each of the peer computing devices. The anti-virus programs in the social group, based on the notification of the infection from the infected computing device, may automatically perform operations for downloading any required patches and performing a scan of the peer computing device in order to isolate and remove the virus if the peer computing device has become infected. | 05-07-2009 |
20090125838 | BANDWIDTH USAGE AND LATENCY REDUCTION OF REMOTE DESKTOP SOFTWARE BASED ON PREFERRED RENDERING OF A USER SELECTED AREA - The present invention discloses a solution for bandwidth usage reduction of remote desktop software based on preferred rendering of a user selected area. The solution can allow a user to select a specified region of a remote desktop to gain precedence over non-selected regions. An area preference engine can be configured to convey user preference, settings, and selection areas. Selected regions can be user configured to render with different settings than non-selected regions such as resolution, color depth, frame rate, update frequency, and the like. Non-selected regions can be configured to receive lower priority updates than selected regions. | 05-14-2009 |
20090138299 | METHOD FOR PROVIDING DYNAMIC PHONE ADVERTISEMENTS - A method of operating a communications service, including detecting that a user dials a phone number to initiate a current phone call, querying a dynamic advertising service which analyzes available data regarding the dialed phone number, receiving an advertisement from the dynamic advertising service that is selected based on the dialed phone number, the available data regarding the phone number and, optionally, other information, and playing the advertisement to the user. | 05-28-2009 |
20090177984 | CALENDAR ENTRY DISPLAY METHOD - A method of displaying a calendar entry of an electronic calendar application is disclosed. The method includes determining if a user of the electronic calendar application is within a specified distance of a location of an appointment corresponding to the calendar entry at a specified time prior to the appointment. In response to determining that the user is within the specified distance at the specified time, displaying an indication with the calendar entry that the appointment is face-to-faceable. In response to determining that the user is not within the specified distance at the specified time, displaying an indication with the calendar entry that the appointment is not face-to-faceable. | 07-09-2009 |
20090210796 | System and Method for Dynamically Modifying a Sequence of Slides in a Slideshow Set During a Presentation of the Slideshow - A system and method for dynamically modifying a sequence of slides in a slideshow set during a presentation of the slideshow are provided. Tag metadata may be provided for each slide of a slideshow set such that this tag metadata may be used to establish logical subsets of slides within the slideshow set. Options may be provided for a user to select an interface item to obtain slides, from the current slideshow set or another slideshow set, that are associated with a currently displayed slide in the slideshow set. User interface items may be provided through which the user may temporarily redirect the sequence of the original slideshow set to incorporate one or more of these related slides and, upon termination of this “detour”, may return to the point at which the sequence diverted. | 08-20-2009 |
20100011053 | APPARATUS AND SYSTEM FOR IDENTIFYING AND FILTERING EMAILS BASED ON CONTENT - An apparatus and system are disclosed for regulating emails in an enterprise email system by marking, demarcating and referencing a content-context field in the header of the email. The content-context field designates the email as business or non-business in nature. Non-business emails are rejected, relayed elsewhere, or destroyed in response to positively identifying the email as non-business. The claimed invention prevents intermingling of non-business emails with business emails in business environments, and helps avoid potential liabilities that may result from associating business matters with personnel non-business matters. | 01-14-2010 |
20110010258 | File Fragment Pricing in a Segmented File Sharing Network - A mechanism is provided for file fragment pricing in a segmented file sharing system. The mechanism allows peers to set a price for distributing a file through the file sharing system. A peer then becomes a file distributor on behalf of an original file provider. The original file provider may compensate the file distributor based on a compensation agreement. The peer's client may be configured to download file fragments from file distributors, or the original file provider, based on preferences, such as price, peer rating, upload speed, or similarity. As a result, a peer may download a file for a price that is less than the original price from the original file provider. Thus, the mechanism provides an incentive for peers to participate in file sharing, which results in larger swarms. | 01-13-2011 |
20110010421 | List Passing in a Background File Sharing Network - A mechanism is provided for distributing file fragments in the background of a segmented peer-to-peer network using list passing between peers. Rather than trading actual content, peers may trade file names or file fragment identifiers. Upon receiving a new file name or identifier, a peer may request that file from the network, either in the background or the foreground. For example, once a client begins background file sharing in a swarm, the client may propagate file information for files it possesses to all or a portion of the peers in a swarm. Those clients then have the file information for a file without the user having to locate and specifically request that file. The file list may piggyback on a file fragment that is transferred as a result of a file sharing request. | 01-13-2011 |
20110023019 | Monitoring File Access of Java Processes - A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitoring process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface. | 01-27-2011 |
20110113104 | FLAGGING RESOURCE POINTERS DEPENDING ON USER ENVIRONMENT - Systems, methods and articles of manufacture are disclosed for indicating a hyperlink in a message as being inappropriate for a specified user environment, such as an office or an educational setting. In one embodiment, a message may be received from a sending user and to a receiving user (e.g., by a sending mail client or by a mail server). The message may include a hyperlink. If a message includes a hyperlink determined to be inappropriate for the specified user environment, a property of the message may be set to indicate as such. Optionally, the sending user may be notified that the hyperlink is indicated as being inappropriate for the specified user environment. The receiving user may also be warned not to activate the hyperlink that is determined to be inappropriate. | 05-12-2011 |
20110119659 | RUNTIME MACHINE SUPPORTED METHOD LEVEL CACHING - A computer system includes a disk space comprising at least one type of memory and an operating system for controlling allocations and access to the disk space. A runtime machine runs applications through at least one of the operating system or directly on at least one processor of the computer system. In addition, the runtime machine manages a selected runtime disk space allocated to the runtime machine by the operating system and manages a separate method cache within the selected virtual disk space. The virtual machine controls caching within the method cache of a separate result of at least one method of the application marked as cache capable. For a next instance of the method detected by the runtime machine, the runtime machine accesses the cached separate result of the method in lieu of executing the method again. | 05-19-2011 |
20110128568 | MANAGING DIGITAL IMAGES TO BE PRINTED - Systems, methods and articles of manufacture are disclosed for managing digital images to be shared with and/or printed for a user. In one embodiment, the digital images may be received for the user. That a count of the digital images exceeds a threshold count may be determined. The digital images may be transmitted to a location where they may be printed for the user. The user may be notified when the printed images are ready to be picked up by the user. | 06-02-2011 |
20110154490 | Malicious Software Prevention Using Shared Information - A method and apparatus for managing executable files. Responsive to detecting a request to run an executable file on a computer, a processor unit determines whether the executable file was downloaded to the computer within a period of time associated with a recent download. Responsive to a determination that the executable file was downloaded to the computer within the period of time, the processor unit determines whether feedback for the executable file from a number of users of the executable file is present in a repository. The feedback identified for the executable file in the repository is presented using a presentation system. User input as to whether the executable file should be run is prompted for by the processor unit after presenting the feedback. | 06-23-2011 |
20110161438 | METHOD AND SYSTEM FOR A MULTI-APPLICATION FOLLOW-UP MECHANISM - A system that responds to a user setting a follow-up flag on a message within a first communication application by associating the flagged message with another user, such that the flagged message is available to a second communication application. When a user sets a flag on an electronic mail message contained in an electronic mail mailbox provided by an electronic mail application, the system responds by associating the flagged message with another user in a list of other users with whom flagged messages are associated. When a communication session occurs with the other user through another communication application, the system checks the list and determines that a flagged message is associated with the other user. The flagged message is then brought to the attention of the local user, for example within a list of flagged messages associated with the other user displayed simultaneously with the instant messaging session. | 06-30-2011 |
20110225245 | SENDING MESSAGES WITH LIMITED AWARENESS OF RECIPIENTS - Methods, apparatus and articles for sending emails to a plurality of recipients comprising a group of blind carbon copied recipients. A graphical user interface (GUI) screen comprising a TO field, a carbon copy field, and at least one blind carbon copy group (BCC-G) field may be provided for entering a list of recipients for the email. The email may be transferred to the recipients such that the identities of a plurality of recipients in the at least one BCC-G field are disclosed only to the recipients within the BCC-G field. | 09-15-2011 |
20110225649 | Protecting Computer Systems From Malicious Software - A method, computer program product, and apparatus for determining whether newly installed software is malicious software are presented. In one illustrative embodiment, software is installed on a computer system to produce newly installed software running in a secured part of the computer system. The newly installed software is only permitted to access a subset of resources in the computer system when running in the secured part. The newly installed software is run on the computer system until a selected event occurs. The newly installed software running on the computer system is monitored until the selected event occurs. The monitoring creates information used to evaluate the software for malicious behavior. The information is presented on a display to a user after the selected event has occurred, wherein the presented information comprises a recommendation of whether to provide the software access to the resources in the computer system outside the subset of resources. | 09-15-2011 |
20120143596 | Voice Communication Management - A method, a computer program product, and an apparatus for managing a voice communication are provided. In one illustrative embodiment, an audio phrase produced by a first user is identified in the voice communication between the first user and a second user. A determination is made whether the audio phrase is present in a policy which prohibits the transmission of the set of undesired audio phrases. Responsive to a determination that the audio phrase is present in the policy which prohibits the transmission of the set of undesired audio phrases, a communication of the audio phrase is modified. | 06-07-2012 |
20120143728 | Managing Transmission of Information - A method, a computer program product, and an apparatus for managing transmission of information are provided. A determination is made as to whether a pattern in a set of patterns is present in the information to be transmitted by a first user. Responsive to a determination that the pattern in the set of patterns is present in the information to be transmitted, the information is inhibited from being transmitted by the first user. A request is sent to a mobile device of a second user for an approval of the information to be transmitted. Responsive to receiving the approval of the information to be transmitted from the second user, the information is transmitted. | 06-07-2012 |
20120222022 | Instantiating an Interface or Abstract Class in Application Code - Mechanisms for instantiating an interface or abstract class in application code are provided. An object-oriented programming language is extended such that interfaces and abstract classes can be instantiated in application code without a concrete class specified. Metadata is defined which maps each interface or abstract class instantiation in the application code to a concrete class to be used either by the compiler at build time, or the virtual machine at runtime. Once the appropriate concrete class is determined from the metadata, the class is instantiated with a conventional class loader. The metadata may be provided, for example, as a separate file, such as a markup language file, defined with a virtual machine switch, as annotations in the application code, or the like. | 08-30-2012 |
20130054295 | PROVIDING INDICATIONS BY A CALENDARING SYSTEM THAT A MEETING HAS BEEN PREVIOUSLY RESCHEDULED TO AID IN SCHEDULING - A method, system and computer program product for informing users regarding the rescheduling of a meeting. A counter, associated with a meeting, is set to the value of 1 when the meeting has been rescheduled for the first time. Upon a user (e.g., meeting initiator, meeting recipient) proposing to reschedule the meeting a further time, an indicator is presented to the user informing the user that the meeting has been previously rescheduled. Such information may be used by the user to decide whether to proceed with rescheduling the meeting. If the user decides to proceed, the counter is incremented and a meeting invitation is generated, where the meeting invitation includes an indication (e.g., number of times the meeting has been rescheduled obtained from the counter) regarding the meeting having been previously rescheduled. In this manner, the meeting recipients would have knowledge that the meeting has been previously rescheduled. | 02-28-2013 |
20130073641 | MULTI-APPLICATION FOLLOW-UP - A system that responds to a user setting a follow-up flag on a message within a first communication application by associating the flagged message with another user, such that the flagged message is available to a second communication application. When a user sets a flag on an electronic mail message contained in an electronic mail mailbox provided by an electronic mail application, the system responds by associating the flagged message with another user in a list of other users with whom flagged messages are associated. When a communication session occurs with the other user through another communication application, the system checks the list and determines that a flagged message is associated with the other user. The flagged message is then brought to the attention of the local user, for example within a list of flagged messages associated with the other user displayed simultaneously with the instant messaging session. | 03-21-2013 |
20130086001 | AUTOMATIC FILE VERSION VERIFICATION WITHIN ELECTRONIC MAIL - A method can include determining metadata for a file responsive to initiating an operation on the file stored within a client system and determining a storage location within a file repository of a master version of the file from the metadata. The method also can include determining, from the storage location, whether the master version of the file is more recent than the file stored within the client system using a processor of the client system. | 04-04-2013 |
20130104098 | AUTOMATIC SCHEDULING OF REVIEW MEETINGS - A tool for scheduling a project review meeting based on monitoring of one or more documents required for the project review meeting. The documents/files are identified along with criteria that the documents must meet prior to scheduling the review meeting. The criteria can be default criteria or specifically defined and entered by a user. The tool monitors the documents and in response to finding that the criteria has been met, determines meeting participants, generally collaborators working on the documents, determines the meeting participants' individual schedules, and determines a meeting time based on the meeting participants' individual schedules. | 04-25-2013 |
20130290237 | DISCOVERY AND GROUPING OF RELATED COMPUTING RESOURCES USING MACHINE LEARNING - According to one aspect of the present disclosure a system and technique discovering and grouping related computing resources using machine learning is disclosed. The system includes a processor unit and logic executable by the processor unit to: receive a grouped unit of at least two configuration items of a computing environment; analyze the grouped unit to determine a correlation between the configuration items of the grouped unit; create a rule based on the determined correlation; apply the rule to the computing environment to identify another configuration item of the computing environment related to the configuration items of the grouped unit; and responsive to identifying another configuration item of the computing environment based on application of the rule, include the identified configuration item in the grouped unit. | 10-31-2013 |
20130290238 | DISCOVERY AND GROUPING OF RELATED COMPUTING RESOURCES USING MACHINE LEARNING - According to one aspect of the present disclosure, a method and technique for discovering a grouping related computing resources using machine learning is disclosed. The method includes: receiving, by a discovery engine executing on a processor unit, a grouped unit of at least two configuration items of a computing environment; analyzing, by the discovery engine, the grouped unit to determine a correlation between the configuration items of the grouped unit; automatically creating a rule, by the discovery engine, based on the determined correlation; applying the rule, by the discovery engine, to automatically identify another configuration item of the computing environment related to the configuration items of the grouped unit; and responsive to identifying another configuration item of the computing environment based on application of the rule, including the identified configuration item in the grouped unit. | 10-31-2013 |
20140047509 | AUTHORIZING COMPUTING RESOURCE ACCESS BASED ON CALENDAR EVENTS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing environment) is provided. A portion/segment (e.g., private cloud) of the networked computing environment may be designated for storing at least one electronic file to be shared (e.g., as stored in a computer storage device associated with the portion). The portion of the networked computing environment may then be associated (e.g., graphically) with an electronic calendar entry (e.g., a meeting having a set of attendees). Based on the calendar entry, a set of users (e.g., the meeting attendees) authorized to access the at least one electronic file may be determined based on the electronic calendar entry. Thereafter, access (e.g., a related permissions) to the at least one electronic file may be authorized for the set of users. | 02-13-2014 |
20140050311 | TELEPHONE CALL SET CORRELATION AND INFORMATION RANKING - A set of call-specific metadata entries specified by a user that each represent a user-specified item of information to capture in association with a set of telephone numbers is obtained. The user-specified items of information represented by the set of call-specific metadata entries are captured from the user in association with a telephone number that is related to the set of call-specific metadata entries. The user-specified items of information are sorted based upon at least one user-specified item of information in response to detecting a user request to sort the captured user-specified items of information. | 02-20-2014 |
20140051390 | AUTOMATICALLY CONNECTING TO A BEST AVAILABLE CALLING DEVICE BASED ON RESOURCE STRENGTH - A method, computer program product, and computer system for automatically connecting a calling device to a best available calling device based on resource strength. A computer system receives from a first calling device a request for a call to a second calling device and evaluates resource strength of the second calling device. The computer system determines one or more third calling devices, in response to determining that the resource strength of the second calling device is low. The computer system compares resource strength of the one or more third calling devices with that of the second calling device and determines a best available one of the one or more third calling devices. The computer system connects the call by connecting the first calling device and the best available one of the one or more third calling devices. | 02-20-2014 |
20140074942 | IDENTIFYING A WEBPAGE FROM WHICH AN E-MAIL ADDRESS IS OBTAINED - Detecting an e-mail client generating a first e-mail identifying as a recipient e-mail address an e-mail address identified in the webpage. A screen shot of the webpage can be captured. An association can be automatically created between the screen shot of the webpage and the first e-mail, and the screen shot of the webpage is stored. The first e-mail is sent to the recipient e-mail address. Responsive to receiving or opening the first e-mail or a second e-mail related to the first e-mail, the screen shot of the webpage can be automatically retrieved and presented. | 03-13-2014 |
20140172841 | SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword. | 06-19-2014 |
20140173506 | SEARCH ENGINE OPTIMIZATION UTILIZING SCROLLING FIXATION - Provided are techniques for utilizing scrolling fixation. An amount of time a user spends on a portion of a page based on scroll bar usage by the user is monitored. The amount of time the user spends on the portion of the page is aggregated with an amount of time at least one other user spent on that portion of the page based on scroll bar usage by the at least one other user. A scroll bar is displayed with at least one indicator, wherein the at least one indicator represents an aggregated amount of time spent on an associated portion of the page. | 06-19-2014 |
20140207768 | SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword. | 07-24-2014 |
20140208261 | SEARCH ENGINE OPTIMIZATION UTILIZING SCROLLING FIXATION - Provided are techniques for utilizing scrolling fixation. An amount of time a user spends on a portion of a page based on scroll bar usage by the user is monitored. The amount of time the user spends on the portion of the page is aggregated with an amount of time at least one other user spent on that portion of the page based on scroll bar usage by the at least one other user. A scroll bar is displayed with at least one indicator, wherein the at least one indicator represents an aggregated amount of time spent on an associated portion of the page. | 07-24-2014 |
20140310588 | MANAGING A DISPLAY OF RESULTS OF A KEYWORD SEARCH ON A WEB PAGE - An approach is provided for managing a display of a keyword search result. The search for the keyword on a web page includes identifying first Document Object Model (DOM) element(s) including a subset of DOM element(s) that include the keyword. Based on preference(s), second DOM element(s) are identified, which are unrelated to the subset of DOM element(s). Based on the preference(s), styles of the first and second DOM element(s) are modified to generate a display of the search result that includes content of the web page specified by the first DOM element(s), and that (1) does not include other content of the web page specified by the second DOM element(s) or (2) emphasizes the content specified by the first DOM element(s) over the other content specified by the second DOM element(s), in accordance with the modified styles. | 10-16-2014 |