Patent application number | Description | Published |
20080208981 | Providing Information Regarding Mailing List Aliases - A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias. | 08-28-2008 |
20080208983 | Providing Information Regarding Mailing List Aliases - Systems and methods for providing information regarding mailing list aliases to recipients of email messages that are sent using mailing list aliases are provided in the present invention. A method for providing information regarding mailing list aliases in an email message is provided. The method includes displaying an email message including at least one mailing list alias, and displaying a scope indicator in association with the mailing list alias, wherein the scope indicator provides a visual indication that a plurality of email addresses are mapped to the mailing list alias. | 08-28-2008 |
20080235024 | METHOD AND SYSTEM FOR TEXT-TO-SPEECH SYNTHESIS WITH PERSONALIZED VOICE - A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input ( | 09-25-2008 |
20080250114 | MITIGATING ADDRESS BOOK WEAKNESSES THAT PERMIT THE SENDING OF E-MAIL TO WRONG ADDRESSES - A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender. | 10-09-2008 |
20090055481 | AUTOMATICALLY GENERATED SUBJECT RECOMMENDATIONS FOR EMAIL MESSAGES BASED ON EMAIL MESSAGE CONTENT - The present invention discloses an email application that includes a subject evaluation engine, which is able to automatically generate a subject heading suggestion for an email message based upon content contained in the email message. The subject evaluation engine can also compare a pre-existing subject heading of the email message against content contained in the email message. User selectable interface elements can be included in the email application for invoking the suggestion and comparison functions of the subject evaluation engine. Further, the subject evaluation can automatically be initiated before an email message is sent, can be used to notify a user when the message's subject is inconsistent with the message's content, and can suggest one or more replacement subject headings for the current heading. | 02-26-2009 |
20090100497 | METHOD AND APPARATUS FOR PREVENTING A SET OF USERS FROM ACCESSING A MESSAGE IN AN INSTANT MESSAGING SYSTEM - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for preventing a set of users from accessing a message in an instant messaging system. The process determines whether a message received by a receiving computing device from a sending computing device is undetected by a set of users associated with the receiving computing device. The process notifies the sending computing device that the message is undetected by the set of users in response to determining that the message is undetected by the set of users associated with the receiving computing device. The process prevents the set of users from accessing the message in response to receiving a request to prevent the set of users from accessing the message. | 04-16-2009 |
20090113014 | Device, Method and Computer Program Product for Providing an Alert Indication - A method for providing an alert indication, the method includes: allowing a first user to define an alert to be generated in response to an availability of a second user to participate in an instant messaging session; and sending to the second user an alert indication indicative of the alert. | 04-30-2009 |
20090113435 | INTEGRATED BACKUP WITH CALENDAR - A computer implemented method, apparatus, and computer program product for automatically scheduling execution of a process using information in a calendar. Entries in a set of electronic calendars associated with a set of users are analyzed to generate expected computer usage patterns for the set of users. A low usage time interval for a computer is identified using the expected computer usage patterns. The low usage time interval for the computer is a time interval when expected usage of the computer by the set of users does not exceed a threshold amount of usage. The process is automatically executed during the low usage time interval. | 04-30-2009 |
20090164259 | METHOD AND SYSTEM FOR BIASING SUGGESTED ROOMS AND/OR RESOURCE SEARCH RESULTS BASED ON USER BEHAVIOR RELATED TO RESCHEDULING AND/OR CANCELLING EXISTING RESERVATIONS - A system for biasing suggested room and/or resource search results based on user behavior related to rescheduling and/or canceling existing resource reservations. The system uses historical data, statistical analysis, and heuristics to generate suggestions as to which users may be willing and/or able to give up their existing resource reservations for a particular time slot. By monitoring which users reschedule and/or cancel existing reservations, and how often they do so, the system is able to provide a user in need of a previously reserved room/resource with a prioritized list indicating which other users with existing resource reservations during the desired time slot are relatively more likely to cancel their reservations, and/or to transfer their reservations to the scheduling user. | 06-25-2009 |
20090174534 | Vehicle Antitheft System and Method - A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset. | 07-09-2009 |
20090198652 | METHOD AND SYSTEM FOR SELECTING A COMMUNICATION MEANS - A method and system for selecting communication means are provided. The method includes receiving a request for communication ( | 08-06-2009 |
20100031146 | Parallel Visual Radio Station Selection - A computer implemented method in a data processing system and a computer program product enable visual selection of a media signal. A set of media signals is received from a set of media providers. A subject matter and a performer of the subject matter are then identified for at least one of the set of media signals. A set of icons is then identified. Each of the set of icons corresponds to at least one of media signals. The set of icons and the set of media providers are then forwarded to a client media player. | 02-04-2010 |
20100036916 | Facilitating an Extended IM Session in a Secure Way - A method includes steps of: receiving a prompt from a user to activate a message interface in order to begin a session; activating the message interface such that said message interface is presented to the user and is able to receipt input from the user; receiving user input from the message interface, including: a user selection of at least one target correspondent; and a first message to be sent to the at least one target correspondent; identifying the session with a unique identifier; and sending the first message to a messaging system for delivery to the target correspondent when the target correspondent is available. | 02-11-2010 |
20100048182 | Reaching a Communications Service Subscriber Who is Not Answering an Incoming Communications Request - A method for reaching a communications service subscriber who does not answer an incoming communications request to the subscriber's communications device, the method including detecting that an incoming communications request received at a first communications device is not answered, locating a second communications device within a predefined distance from the first communications device, and sending a message to the second communications device indicating the receipt of the incoming communications request at the first communications device. | 02-25-2010 |
20100175068 | LIMITING THE AVAILABILITY OF COMPUTATIONAL RESOURCES TO A DEVICE TO STIMULATE A USER OF THE DEVICE TO APPLY NECESSARY UPDATES - Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied. | 07-08-2010 |
20100223350 | Method for Providing an alert indication - A method for providing an alert indication, the method includes: allowing a first user to define an alert to be generated in response to an availability of a second user to participate in an instant messaging session; and sending to the second user an alert indication indicative of the alert. | 09-02-2010 |
20100250682 | UTILIZING E-MAIL RESPONSE TIME STATISTICS FOR MORE EFFICIENT AND EFFECTIVE USER COMMUNICATION - A method of increasing email correspondence responsiveness may include detecting a first set of email messages transmitted by a first correspondent to a second correspondent, creating a tracking record based on the responsiveness of the second correspondent to each email message of the first set of email messages, performing a first statistical analysis of the tracking record, generating a set of responsiveness metrics based on the first statistical analysis, detecting new outgoing email messages addressed to the second correspondent, and providing a user-configurable email message format for each detected outgoing message, the user-configurable email message format. According to the example embodiment, the user-configurable email message format is configured to increase effective email response time from the second correspondent and the user-configurable email message format is based on the set of responsiveness metrics. | 09-30-2010 |
20110078587 | METHOD AND SYSTEM FOR EMAIL MESSAGING - A method and system for preventing sending of messages to incorrect email recipients are provided. The method includes determining ( | 03-31-2011 |
20130055370 | SECURITY FOR FUTURE LOG-ON LOCATION - A system includes a location look-up module that determines a current location for a user log-on to the network, and determines a next location of the user log-on to the network. An analyzer module analyzes at least one portion of the network for potential future location information for authenticating with the determined next location by an authorization module. The authorization module authenticates the next log-on to the network based on a comparison with the potential future location information. | 02-28-2013 |
20130238716 | PROVIDING A COLLABORATIVE STATUS MESSAGE IN AN INSTANT MESSAGING SYSTEM - A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question. | 09-12-2013 |
20130238737 | PROVIDING A COLLABORATIVE STATUS MESSAGE IN AN INSTANT MESSAGING SYSTEM - A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question. | 09-12-2013 |
20130339605 | UNIFORM STORAGE COLLABORATION AND ACCESS - A computerized method of collaborating storage space across multiple devices according to file usage patterns of the devices. The method comprises receiving access to a plurality of storage media each having a storage space and managed by at least one of a plurality of devices, identifying for each of the plurality of devices at least one usage pattern of at least one of a plurality of file types, creating a virtually contiguous storage pool mapping physical memory addresses of the plurality of storage media, setting a file distribution policy of storing each of a plurality of data files stored in the plurality of storage media in the virtually contiguous storage pool according to a match between a file type and at least one usage pattern, and collaborating storage space across the plurality of storage media managed by the plurality of devices according to the file distribution policy. | 12-19-2013 |
20140032087 | REDUCING FUEL CONSUMPTION BY ACCOMMODATING TO ANTICIPATED ROAD AND DRIVING CONDITIONS - Utilizing a database of route segments, calculating optimal velocity and acceleration profiles, and suggesting these profiles to a user or the cruise control system of the vehicle, based on a route analysis and incorporating external and local data sources relating to environmental (e.g. topographic, meteorological) conditions, traffic conditions and user preferences and characteristics. | 01-30-2014 |
20140114942 | Dynamic Pruning of a Search Index Based on Search Results - A search index for a collection of documents includes a plurality of keywords associated with the documents. Access to individual documents is detected based on searches employing the search index and keywords are recorded that are utilized in the searches and resulted in document access. The search index is modified to maintain the recorded keywords and remove keywords absent from the searches resulting in the document access. | 04-24-2014 |
20140342661 | Social Network Based Wi-Fi Connectivity - An embodiment of the invention provides a method for social network based Wi-Fi, wherein an antenna of a mobile electronic device identifies at least one wireless network within range of the mobile electronic device, and wherein owner(s) of the wireless network(s) are identified with a processor. Relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are determined with an analysis engine. The wireless network(s) and the relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are displayed on the mobile electronic device. A request to access a wireless network is received from the owner of the mobile electronic device. Access to the wireless network is automatically granting when the relationship status between the owner of the mobile electronic device and the owner of the wireless network is above a predetermined threshold. | 11-20-2014 |
20140344369 | ELECTRONIC MAIL READ RECEIPT PROCESSING - Processing electronic mail includes receiving an electronic mail having a read receipt request and determining, using a processor, that the electronic mail includes a read receipt distribution list. The read receipt distribution list specifies at least one sender-defined user including a subset of at least one recipient of the electronic mail. Using the processor, a read receipt is sent to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. | 11-20-2014 |
20140378097 | TRANSFERRING INFORMATION ON A FIRST MOBILE COMPUTING DEVICE TO A PEER MOBILE COMPUTING DEVICE - The program code identifies a problem with a first mobile computing device, wherein the problem is capable of preventing completion of an action attempted by a first end-user via the first mobile computing device. In response to identifying the problem, the program code determines the first end-user wants to complete the action on a first peer mobile computing device of a second end-user. The program code scans a computer network to identify the first peer mobile computing device and other peer mobile computing devices on which to complete the action. The program code grants access to a copy of information to complete the action on the first peer mobile computing device. The program code revokes access to the copy of information. | 12-25-2014 |
20150025891 | METHOD AND SYSTEM FOR TEXT-TO-SPEECH SYNTHESIS WITH PERSONALIZED VOICE - A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input ( | 01-22-2015 |