Patent application number | Description | Published |
20080212848 | Using Biometrics on Pervasive Devices for Mobile Identification - A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost. | 09-04-2008 |
20080215897 | Security Containers for Document Components - Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters. | 09-04-2008 |
20080235173 | AUTONOMIC MANAGEMENT OF AUTONOMIC SYSTEMS - A method for the autonomic management of autonomic systems can include monitoring a managed system and recommending a course of action to be performed in the managed system. It can be determined whether the recommended course of action has been performed by an administrator. Responsive to the determination, it further can be determined whether an outcome from the course of action comports with a predicted outcome. If so, a point count can be changed responsive to a further determination that the outcome from the course of action comports with the predicted outcome. Conversely, the point count can be oppositely changed responsive to a further determination that the outcome from the course of action does not comports with the predicted outcome. In any case, when the point count crosses a threshold value, the management of the managed system can be transitioned to an adaptive component. | 09-25-2008 |
20090060187 | DEVICE CERTIFICATE BASED APPLIANCE CONFIGURATION - Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance. | 03-05-2009 |
20090063849 | DEVICE CERTIFICATE BASED APPLIANCE CONFIGURATION - Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance. | 03-05-2009 |
20090099880 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context. | 04-16-2009 |
20090100192 | AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system. | 04-16-2009 |
20090100423 | Creating a Virtual Machine Containing Third Party Code - A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk. | 04-16-2009 |
20090100431 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance. | 04-16-2009 |
20090100503 | AUTHENTICATION FOR SHARED WIRELESS PERIPHERALS HAVING AN INTERNAL MEMORY STORE FOR SHARING DIGITAL CONTENT ACROSS MULTIPLE HOSTS - The present solution can authenticate a first host to access a memory space of a shared wireless peripheral communicatively linked to the first host via a bus and a device controller. Digital content displayed within a graphical user interface of the first host can be selected. Either a CUT or COPY clipboard operation can be detected that is conducted from the first host. The selected content can be copied to the memory space of the peripheral. The second host can be authenticated to access a memory space of the peripheral communicatively linked to the second host via a bus and a device controller. A PASTE clipboard operation conducted from the second host can be detected. The selected content obtained from the first host can be conveyed from the memory space of the shared wireless peripheral to a cursor specified location within a graphical user interface of the second host. | 04-16-2009 |
20090113383 | SYSTEM AND METHOD OF USING CUSTOMIZABLE TEMPLATES TO RETRIEVE AND DISPLAY A SYSTEM CONFIGURATION TOPOLOGY GRAPH - A method, system, and computer program product for implementing a customizable visual configuration (VC) template to retrieve and display a working set of system configuration objects. The computer-implementable method includes selecting a current system configuration object. Once a system configuration object is selected, a VC utility examines all available VC templates. The VC utility displays available VC templates whose starting configuration object matches the selected current system configuration object. In response to a selected VC template, the VC utility retrieves and displays system configuration objects defined by the selected VC template. | 04-30-2009 |
20100037225 | WORKLOAD ROUTING BASED ON GREENNESS CONDITIONS - Workload requests are routed in response to server greenness conditions. A workload request is received for a remotely invocable computing service executing separately in different remotely and geographically dispersed host computing servers. Greenness conditions pertaining to production or conservation of energy based upon external factors for each of the different remotely and geographically dispersed host computing servers are determined. The workload request is routed to one of the different remotely and geographically dispersed host computing servers based upon the determined greenness conditions. | 02-11-2010 |
20100050156 | USING BUILD HISTORY INFORMATION TO OPTIMIZE A SOFTWARE BUILD PROCESS - Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules. | 02-25-2010 |
20100057505 | BUSINESS PROCESS COMMUNITY INPUT - A community input method can be provided. The method can include receiving from an end user a request to access a portion of a workflow in a business process instance, prompting the end user to provide community input to community documentation for the portion of the workflow, and rendering the community documentation accessible by other end users accessing the portion of the workflow. Optionally, an interval (whether fixed or random) of a number of end users requesting access to the portion of the workflow in the business process instance can be determined, and the end user can be programmatically prompted to provide community input only if the request from the end user is received on the determined interval. | 03-04-2010 |
20110154350 | AUTOMATED CLOUD WORKLOAD MANAGEMENT IN A MAP-REDUCE ENVIRONMENT - A computing device associated with a cloud computing environment identifies a first worker cloud computing device from a group of worker cloud computing devices with available resources sufficient to meet required resources for a highest-priority task associated with a computing job including a group of prioritized tasks. A determination is made as to whether an ownership conflict would result from an assignment of the highest-priority task to the first worker cloud computing device based upon ownership information associated with the computing job and ownership information associated with at least one other task assigned to the first worker cloud computing device. The highest-priority task is assigned to the first worker cloud computing device in response to determining that the ownership conflict would not result from the assignment of the highest-priority task to the first worker cloud computing device. | 06-23-2011 |
20110191466 | AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system. | 08-04-2011 |
20110225294 | RESOURCE-AWARE SYSTEM, METHOD AND PROGRAM PRODUCT FOR MANAGING REQUEST TRAFFIC BASED ON A MANAGEMENT POLICY - Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised. | 09-15-2011 |
20110282993 | HIERARCHICAL LOAD BALANCING - An improved load balancing method, system, and computer program product handles popular object requests using a front-end cache, and hashing is applied only to the requests in the stream that were not handled by the front-end cache. A cache (e.g., a web proxy cache) is placed in front of a Level | 11-17-2011 |
20120173678 | NETWORK AWARE PROVISIONING IN A MOBILITY SUPPORTING CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for network aware provisioning in a mobility supporting cloud computing environment. In an embodiment of the invention, a method for network aware provisioning in a mobility supporting cloud computing environment is provided. In the method, a request is received from a mobile computing device for access to a service in a cloud computing environment and both an expected path of travel for the mobile computing device and also a network access speed along the expected path of travel is determined. Thereafter, a particular instance of the service executing in a host in the cloud computing environment able to accommodate a degree of interaction between the mobile computing device resulting from the network access speed determined for the expected path of travel is selected. Finally, the particular instance of the service is provisioned for access by the mobile computing device. | 07-05-2012 |
20120192197 | AUTOMATED CLOUD WORKLOAD MANAGEMENT IN A MAP-REDUCE ENVIRONMENT - A computing device associated with a cloud computing environment identifies a first worker cloud computing device from a group of worker cloud computing devices with available resources sufficient to meet required resources for a highest-priority task associated with a computing job including a group of prioritized tasks. A determination is made as to whether an ownership conflict would result from an assignment of the highest-priority task to the first worker cloud computing device based upon ownership information associated with the computing job and ownership information associated with at least one other task assigned to the first worker cloud computing device. The highest-priority task is assigned to the first worker cloud computing device in response to determining that the ownership conflict would not result from the assignment of the highest-priority task to the first worker cloud computing device. | 07-26-2012 |
20120215839 | NETWORK-AWARE STRUCTURED CONTENT DOWNLOADS - A request for content is received at a content server via a first network connection from a client device. The content includes a set of portions represented within a root document. Based upon a download constraint of at least one portion of the content and a network characteristic of the first network connection, at least one portion of the content is deferred for download over a network connection other than the first network connection. The content is sent with each deferred portion of the content replaced with a content stub within the root document. Each content stub identifies the respective portion of the content as a deferred portion of the content and includes a content identifier of the respective deferred portion of the content. | 08-23-2012 |
20120215890 | NETWORK-AWARE STRUCTURED CONTENT DOWNLOADS - A request for content is received at a content server via a first network connection from a client device. The content includes a set of portions represented within a root document. Based upon a download constraint of at least one portion of the content and a network characteristic of the first network connection, at least one portion of the content is deferred for download over a network connection other than the first network connection. The content is sent with each deferred portion of the content replaced with a content stub within the root document. Each content stub identifies the respective portion of the content as a deferred portion of the content and includes a content identifier of the respective deferred portion of the content. | 08-23-2012 |
20130014110 | CREATING A VIRTUAL MACHINE CONTAINING THIRD PARTY CODE - A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk. | 01-10-2013 |
20130030823 | ELECTRONIC RECEIPT MANAGEMENT - A receipt management system, method and article of manufacture. The article of manufacture can include a storage medium configured to store receipt data from multiple disparate vendors, communications logic for establishing a communicative link between the system and receipt data processing logic disposed within individual ones of the multiple disparate vendors, and a receipt management processor programmed to moderate access to the storage medium. Importantly, the storage medium can be a portable mass storage device. Notably, each of the storage medium, communications logic and receipt management processor can be disposed in a pervasive device, or in a personal article. | 01-31-2013 |
20140003284 | Portable Virtual Systems for Composite Solutions | 01-02-2014 |
20140033186 | USING BUILD HISTORY INFORMATION TO OPTIMIZE A SOFTWARE BUILD PROCESS - Methods and systems for optimizing a build order of component source modules comprises creating a dependency graph based on dependency information. Historical build information associated with previous build failures is then used to calculate relative failure factors for paths of the dependency graph; and the relative failure factors are used to determine an order of traversal of the dependency graph during a build process in which component binary modules are built from the component source modules. | 01-30-2014 |
20140040427 | NETWORK-AWARE STRUCTURED CONTENT DOWNLOADS - A request for content is received at a content server via a first network connection from a client device. The content includes a set of portions represented within a root document that are each configurable with assigned download constraints that specify network characteristics under which the individual portions of the content are downloadable. A determination to defer at least one portion of the content for download is made based upon a network characteristic of the first network connection not satisfying a configured download constraint assigned to the at least one portion of the content. The root document is sent with each deferred portion of the content replaced with a content stub within the root document. Each content stub identifies the respective deferred portion of the content as a deferred content portion and includes a deferred content portion identifier of the respective deferred portion of the content. | 02-06-2014 |
20140173107 | QUALITY OF SERVICE (QoS) BASED PLANNING IN WEB SERVICES AGGREGATION - Embodiment of the present invention include a method, system and computer program product for a data processing system for QoS based planning in a Web services aggregation. The system can include Web service aggregation and coordination logic configured to identify accessible Web services in a registry and to arrange an aggregation of the Web services for invocation responsive to requests received from communicatively coupled clients over a computer communications network. The system further can include QoS planning logic coupled to the Web service aggregation and coordination logic. The QoS planning logic can be enabled to measure both the individual performance of the Web services in an aggregation of Web services and also the cumulative performance of the aggregation of Web services. Finally, the QoS planning logic can be enabled to modify the aggregation of Web services responsive to measuring both of the individual performance of Web services in the aggregation of Web services and also of the cumulative performance of the aggregation of Web services. | 06-19-2014 |
20140365618 | NETWORK-AWARE STRUCTURED CONTENT DOWNLOADS - A request for content is sent, using a client device, to a content server through a first network connection. A root document is received from the content server. The root document includes at least one content stub, where each content stub identifies a respective portion of the content as a deferred portion of the content and includes a content identifier of the respective deferred portion of the content. A network connection change to the content server from the first network connection to a second network connection is detected. A determination is made to download at least one deferred portion of the content through the second network connection based upon a configured download constraint assigned to the deferred portion of the content and a network characteristic of the second network connection. The deferred portion of the content identified by the respective content stub is obtained. | 12-11-2014 |
20150026350 | RESOURCE-AWARE SYSTEM, METHOD AND PROGRAM PRODUCT FOR MANAGING REQUEST TRAFFIC BASED ON A MANAGEMENT POLICY - Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised. | 01-22-2015 |