Patent application number | Description | Published |
20080215678 | Bookmarking URLs From An Instant Messaging Session - Bookmarking URLs from an instant messaging session, including identifying by an instant messaging client a URL in the instant messaging session, selecting by the instant messaging client at least one browser available for receiving bookmarks from an instant messaging client, and saving by the instant messaging client a bookmark for the identified URL in a bookmark repository of the selected browser. | 09-04-2008 |
20080216019 | SYSTEM FOR CONSOLIDATED ASSOCIATED BUTTONS INTO EASILY ACCESSIBLE GROUPS - A system for consolidating associated buttons on a screen into easily accessible groups includes: a control button and at least one other button that appears when the control button is selected, where the at least one other button is contiguous with the control button. A user can quickly and conveniently select buttons. Furthermore, a significant amount of on-screen real estate is saved because the buttons used are small and square rather than long and rectangular. Further, the configuration of nested menus is such that it takes up little space on the screen. In addition, the menu is ergonomic because the buttons are contiguous, and as such selections can be made without the mouse pointer needing to move very far across the screen. | 09-04-2008 |
20080229237 | SYSTEM AND COMPUTER-READABLE MEDIUM FOR ORDERING ON-SCREEN WINDOWS FOR DISPLAY FIELD OF THE INVENTION - A system for ordering on-screen windows for display is disclosed in which an active window partially overlaps an inactive window and hides a portion of the inactive window. The movement of a mouse pointer is monitored to determine its location on the screen. In response to the inactive window being selected with the mouse pointer, the inactive window is given focus to enable the inactive window to receive event signals even though a portion of the inactive window remains hidden, whereby original display depths of the windows is maintained. | 09-18-2008 |
20080256602 | Filtering Communications Between Users Of A Shared Network - Methods, systems, and products are provided for filtering communications between users of a shared network. Embodiments include receiving a communication from a sender for delivery to a recipient; retrieving a receipt policy for the recipient; retrieving a profile for the sender; determining whether the sender's profile complies with the receipt policy for the recipient; delivering the communication to the recipient if the sender's profile complies with the receipt policy for the recipient; and blocking the communication if the sender's profile does not comply with the receipt policy for the recipient. | 10-16-2008 |
20080276172 | DYNAMIC MOUSE OVER HANDLING FOR TIGHTLY PACKED USER INTERFACE COMPONENTS - Embodiments of the present invention address deficiencies of the art in respect to mouse over sensitive user interface components and provide a novel and non-obvious method, system and computer program product for dynamic mouse over handling for tightly packed user interface components. In one embodiment of the invention, a method for dynamic mouse over handling for tightly packed user interface components can be provided. The method can include determining whether a mouse over enabled user interface component is tightly packed, and adding a delay to mouse over handling for the mouse over enabled user interface component if the mouse over enabled user interface component is determined to be tightly packed. | 11-06-2008 |
20080288883 | CONFIRMING AN ACTION UTILIZING A SINGLE BUTTON OBJECT - A computer readable medium being capable of confirming an action through a confirmation button is presented. According to the present invention, an action and its confirmation are enforced within the integral functionality of the same button object. | 11-20-2008 |
20090006981 | APPLICATION BAR BROWSING OF TABBED-VIEW APPLICATIONS - Embodiments of the present invention address deficiencies of the art in respect to tabbed browsing and provide a method, system and computer program product for application bar browsing of tabbed-view applications. In one embodiment of the invention a method for application bar browsing of tabbed-view applications can be provided. The method can include populating a pop-up list for a consolidated application bar entry for multiple different instances of a single application with corresponding entries each for a different one of the multiple different instances of the single application. The method further can include associating at least one of the entries in the pop-up list with an instance of the single application configured for tabbed browsing. The method yet further can include configuring the associated at least one of the entries with a tabbed browser view. | 01-01-2009 |
20090049151 | TIMED MESSAGE REDIRECTION FOR HIGH PRIORITY INSTANT MESSAGES - Embodiments of the present invention address deficiencies of the art in respect to high priority instant message handling and provide a method, system and computer program product for time message redirection for high priority instant messages. In one embodiment of the invention, a method for the timed redirection of a high priority instant message can be provided. The method can include transmitting an instant message to a primary recipient, and redirecting the instant message to a set of secondary recipients in sequence, each of the secondary recipients receiving the redirected instant message one at a time at pre-programmed intervals of time. In response to receiving a response from the primary recipient or one of the secondary recipients, however, all redirects of the instant message can be cancelled. | 02-19-2009 |
20090099910 | SYSTEM AND METHOD FOR MANAGING ELECTRONIC ADVERTISING RESPONSIVE TO TRAFFIC CONGESTION - A system and method for counting vehicle traffic, for providing electronic advertising, for providing a billing system, and for providing an auction system having the following features: enabling the owner of an electronic advertising display device to charge advertisers per number of vehicles which pass the advertisement; enabling advertisers to bid to have their respective advertisement shown for a particular congestion level and dynamically changing the advertisement shown; cycling through a series of advertisements and based on calculated average vehicle speed; determining how many of the advertisements were likely viewed by the occupants of a vehicle; and calculating the average number of viewers of the advertisements. | 04-16-2009 |
20090119188 | MANAGEMENT OF EXCHANGE OF VIRTUAL GOODS FOR ONLINE GAMES - A method for validating and transferring a virtual good of an online game can be provided. The method can include reading a list of attributes of the virtual good provided by a seller of the virtual good and sending a message to a trusted server, wherein the message includes the list of attributes of the virtual good. The method can further include receiving a message from the trusted server confirming the existence of the virtual good, confirming the seller owns the virtual good and confirming the list of attributes. The method can further include receiving a payment confirmation from a payment authority, wherein payment was provided by a buyer of the virtual good. The method can further include sending a message to a trusted server instructing transfer of possession of the virtual good from the seller to the buyer. | 05-07-2009 |
20090125730 | Managing Power Consumption In A Computer - Methods, apparatus, and products are disclose for managing power consumption in a computer, the computer including random access memory (‘RAM’) implemented in two or more memory modules, the computer having installed upon it an operating system, the operating system including a power management module, that includes: freeing, by the operating system from one or more of the memory modules, at least the amount of allocated memory in one memory module; selecting, by the operating system, at least one memory module to power down; moving, by the operating system, content of the selected memory module to other memory modules; and powering, by the operating system, down the selected memory module. | 05-14-2009 |
20090129378 | SURREPTITIOUS WEB SERVER BIAS TOWARDS DESIRED BROWSERS - Embodiments of the present invention address deficiencies of the art in respect to processing requests from a client to a server and provide a novel and non-obvious method, system and computer program product for transmitting data in a surreptitious pattern. In this regard, in one embodiment of the invention, a method for processing requests from a client system to a server system through a communications network can be provided. The method can include establishing a covert packetization pattern for fragmenting data into packets before transmission, splitting a request into one or more packets according to the covert packetization pattern, transmitting each packet to a server system, responsive to reconstructing fragmented packets, recognizing the covert packetization pattern, and responsive to recognizing the covert packetization pattern, giving priority to a client system. | 05-21-2009 |
20090132668 | APPARATUS FOR POST DELIVERY INSTANT MESSAGE REDIRECTION - An instant messaging (IM) server provides post delivery instant message redirection when a first device having a first media access control (MAC) address is logged onto the IM server and subsequently a second device having a second media access control address logs onto the IM server. An instant message is transmitted to a recipient at the first MAC address. The second device is logged onto the IM server. The instant message is retransmitted to the second MAC address of the recipient before the notification that the recipient is typing in the chat window and before the notification that the chat window has been closed. The first device is automatically logged off in response to the second device being logged onto the IM server, and the instant message is not read on the first device before the first device is automatically logged off the IM server. | 05-21-2009 |
20090150551 | METHOD AND SYSTEM FOR COOKIE EXPIRATION BASED ON USER IDLE AND PRESENCE DETECTION - Detecting Internet web navigation and web browsing idle conditions using cookies during navigating and browsing sessions, is accomplished by receiving in a local computer, from a server, a cookie that has at least one policy that causes the cookie to have either an active or expired status, based on either the presence of web content provided by the server or detection that either the user is idle or the user is away from the local computer. The cookie containing the policy is stored on the local client computer. A signal from a user of the local client computer activates the policy in the cookie; thus, causing the cookie to have a status of either active or expired. When a signal is received from the server requesting the status of the cookie, the local computer determines whether the status of the cookie is active or expired. When the status is active, the server continues to provide content to the local computer and when the status is expired, then the server stops sending content to the local computer. | 06-11-2009 |
20090161667 | Remotely Booting Computing Nodes In A Switching Domain - Methods, apparatus, and products are disclosed for remotely booting computing nodes in a switching domain, the switching domain capable of connecting to other switching domains through a network switch, that include: receiving, in the switch, a wakeup request packet that requests activation of one or more computing nodes in the switching domain, the wakeup request packet having a process port value specifying physical ports on the switch to which the one or more computing nodes are physically connected; identifying, by the switch, a network address for each computing node in dependence upon the physical port on the switch to which each computing node to be activated is physically connected; generating, by the switch, a wakeup packet for each computing node in dependence upon the identified network address for that computing node; and transmitting, by the switch to each computing node to be activated, the wakeup packet for that computing node. | 06-25-2009 |
20090177749 | STATUS AND TIME-BASED DELIVERY SERVICES FOR INSTANT MESSENGERS - Embodiments of the present invention address deficiencies of the art in respect to unattended status and time-based messaging in an instant messaging (IM) environment and provide a method, system and computer program product for unattended status and time-based messaging in an instant messaging (IM) environment. In an embodiment of the invention, a method for unattended status and time-based messaging in an instant messaging (IM) environment can be provided. The method can include receiving a request from an IM user to queue an unattended status and time-based message, retrieving a recovery trigger for the unattended status and time-based message, and assigning the unattended status and time-based message to a message queue. | 07-09-2009 |
20090249238 | AUTOMATED DIRECTING OF DATA TO AN APPLICATION - Embodiments of the present invention address deficiencies of the art in respect to graphical user interfaces and provide a novel and non-obvious system for managing data gathered on a computer. In one embodiment of the invention, the method includes executing a first application in a foreground of the computer and a second application in a background of the computer. The method further includes displaying a user interface metaphor for the second application. The method further includes receiving a command to direct a selection of data from the first application to the second application, while maintaining the first application in the foreground of the computer. The method further includes directing the selection of data to the second application, while maintaining the first application in the foreground of the computer. | 10-01-2009 |
20090276208 | REDUCING SPAM EMAIL THROUGH IDENTIFICATION OF SOURCE - Embodiments of the present invention address deficiencies of the art in respect to email and provide a novel and non-obvious method and computer program product for detecting undesirable email. In one embodiment of the invention, the method includes receiving an email including text and identifying at least one natural language grammar mistake in the text. The method further includes calculating a country of origin of an author of the text based on the at least one natural language grammar mistake and calculating a first value based on the country of origin of the author of the text. The method further includes correcting the at least one natural language grammar mistake in the text and determining whether the email is undesirable based on the text that was corrected and the first value | 11-05-2009 |
20090284442 | Processing Computer Graphics Generated By A Remote Computer For Streaming To A Client Computer - Processing computer graphics generated by a remote computer for streaming to a client computer for display on a display device operatively coupled to the client computer, the graphics streamed to the client computer in a plurality of frames, including, for each frame: selecting, by a graphics module of the remote computer in dependence upon a compression profile, regions of the frame to compress at a lower compression rate than other regions of the frame; compressing the frame for streaming; streaming the compressed frame to the client computer; receiving the compressed frame in the stream; decompressing the compressed frame; and displaying the decompressed frame on the display device operatively coupled to the client computer. | 11-19-2009 |
20090288023 | Establishing A Graphical User Interface ('GUI') Theme - Methods, apparatus, and products for establishing a graphical user interface (‘GUI’) theme, including: receiving, by a GUI theme creator, a media file including one or more digital images, the one or more digital images including a plurality of pixels, the plurality of pixels representing a plurality of colors, the plurality of pixels organized for display at a resolution and an aspect ratio; identifying, by the GUI theme creator, one or more characteristics of the media file; and creating, by the GUI theme creator, a GUI theme in dependence upon the characteristics of the media file. | 11-19-2009 |
20090292579 | Technical Support Routing Among Members Of A Technical Support Group - Computer-implemented methods, apparatus and products for technical support routing among members of a technical support group, including maintaining, by a configuration manager, a system configuration history of a user's computer system, the system configuration history including historical records of changes in configuration of the user's computer system; receiving, by a technical support module, a support request identifying a current error that occurred during operation of the user's computer system including receiving information describing the error and the system configuration history of the user's computer system; and routing, by the technical support module automatically without human intervention, the support request to one or more particular members of the technical support group in dependence upon the information describing the error and the system configuration history. | 11-26-2009 |
20090307319 | Administering Instant Messaging ('IM') Chat Sessions - Computer-implemented methods, apparatus, and products for administering IM chat sessions including: identifying, by an IM module in dependence upon a merger policy, a plurality of IM participants to merge into a group IM chat session, the IM module providing IM services to one of the participants; and merging, by the IM module, the identified participants into the group IM chat session. | 12-10-2009 |
20100063885 | APPARATUS, SYSTEM, AND METHOD FOR ADVERTISEMENT COMPLEXITY SCALING VIA TRAFFIC ANALYSIS - An apparatus, system, and method are disclosed for advertisement complexity scaling via traffic analysis. A motion module receives movement information from one or more sensors. The movement information comprises information relating to a speed of one or more people relative to an advertisement display device. A complexity module maintains an advertisement complexity rating for each of a plurality of advertisements. The advertisement complexity rating is based on an estimated viewing time of each advertisement. An advertisement selection module selects an advertisement from the plurality of advertisements based on the movement information and the advertisement complexity rating of the advertisement. The advertisement selection module correlates the speed of the one or more people relative to the advertisement display device with the advertisement complexity rating such that a higher speed correlates to a lower advertisement complexity rating. A display module displays the advertisement on a display device. | 03-11-2010 |
20100083010 | Power Management For Clusters Of Computers - Power management for clusters of computers, a cluster including a configuration of computers operating in a power management domain, one or more of the computers of the cluster having a power requirement that differs from power requirements of other computers in the cluster, data processing operations on the cluster effecting a processing load on the computers in the cluster, including selecting, from a plurality of configurations of computers capable of supporting a plurality of processing loads at a plurality of power levels, a configuration of computers capable of supporting the processing load at a lowest power level, the lowest power level defined by comparison among configurations capable of supporting the processing load; and reconfiguring the cluster according to the selected configuration. | 04-01-2010 |
20100095067 | Caching Web Page Elements In Accordance With Display Locations Of The Elements - Methods, apparatus, and products for caching web page elements in accordance with display locations of the elements, including maintaining, by a web browser in accordance with a cache retention policy, a local cache of previously displayed web page elements in dependence upon previous display locations of the elements including maintaining a cache retention score for each locally cached element; and displaying, by the web browser, a previously displayed web page including displaying one or more of the locally cached elements. | 04-15-2010 |
20100100612 | PEER-TO-PEER MODULE CONFIGURATION REDUNDANCY AND RECOVERY MANAGEMENT - A method for peer-to-peer management module configuration redundancy and recovery can be provided. The method can include fragmenting configuration data for a specified management module configured to manage systems components in a blade environment. The method also can include identifying peer management modules communicatively connected to the specified management module. The method yet further can include transmitting different ones of the fragmented configuration data to different ones of the peer management modules. In response to a reset condition in the specified management module, the method can provide for the retrieval of the fragmented configuration data from the peer management modules. Thereafter, the method can provide for the re-assembly of the retrieved fragmented configuration data and the application of the re-assembled fragmented configuration data to the specified management module. | 04-22-2010 |
20100115252 | AUTOMATED FIRMWARE RECOVERY - According to one embodiment, a corrupted network hardware device may be automatically inspected and repaired. A default boot sequence may be suspended, and an external recovery device may inspect and repair the corrupted code by selectively repairing files and configuration settings in a minimally invasive manner, to preserve as many user settings as practicable. The network hardware device may then be re-booted from the repaired firmware. | 05-06-2010 |
20100115509 | POWER OPTIMIZATION VIA VIRTUALIZATION OPPORTUNITY - Embodiments of the present invention provide a method, system and computer program product for power optimization via virtualization opportunity determination. In an embodiment of the invention, a method for power optimization via virtualization opportunity determination can be provided. The method can include monitoring power utilization in individual server hosts in a cluster and determining a set of the server hosts in the cluster demonstrating low power utilization. The method also can include selecting a subset of server hosts in the set and migrating each VM in non-selected server hosts in the set to the subset of server hosts. Finally, the method can include powering down the non-selected server hosts. | 05-06-2010 |
20100118019 | Dynamically Managing Power Consumption Of A Computer With Graphics Adapter Configurations - Dynamically managing power consumption of a computer, the computer including two or more graphics adapters, the computer having a number of graphics adapter configurations including one or more of the graphics adapters, where managing power consumption includes: monitoring, by a graphics driver, operation of a current graphics adapter configuration, the operation characterized by a graphics processing load; determining, in dependence upon the graphics processing load, whether operation of the current graphics adapter configuration conforms to predefined graphics processing criteria; if operation conforms, processing graphics, by the graphics adapter, for display with the one or more graphics adapters of the current graphics adapter configuration; and if operation does not conform, processing graphics, by the graphics adapter, for display with the one or more graphics adapters of another graphics adapter configuration. | 05-13-2010 |
20100123435 | REDUCTION OF PEAK CURRENT REQUIREMENTS - Method and apparatus are provided for controlling electrical current supplied to an electronic device, such as a computer system. The method includes drawing up to a predetermined amount of an electrical input current from a first current source, and supplying a first portion of the drawn electrical input current to the electronic device, wherein the amount of the first portion may change over time to supply the amount of electrical current demanded by the electronic device without exceeding the predetermined amount. A second portion is supplied to charge an energy storage device during a period that the first portion is less than the predetermined amount. The stored energy device is discharged, as needed, to supply supplemental electrical current to the electronic device. A power supply including an energy storage device, such as a rechargeable battery, may be used to carry out the method. | 05-20-2010 |
20100138677 | OPTIMIZATION OF DATA DISTRIBUTION AND POWER CONSUMPTION IN A DATA CENTER - The distribution of data among a plurality of data storage devices may be optimized, in one embodiment, by redistributing the data to move less-active data to lesser performing data storage devices and to move more-active data to higher performing data storage devices. Power consumption in the datacenter may be optimized by selectively reducing power to data storage devices to which less-active data, such as persistent data, has been moved. | 06-03-2010 |
20100162410 | DIGITAL RIGHTS MANAGEMENT (DRM) CONTENT PROTECTION BY PROXY TRANSPARENCY CONTROL - Embodiments of the present invention provide a method, system and computer program product for protecting digital content through visual proxy transparency control. In an embodiment of the invention, a method for digital content access control for multi-party rights management can be provided. The method can include creating a transparent overlay window over a target window, identifying permissions associated with digital rights management (DRM) protected content rendered in the target window, intercepting in the transparent overlay window a user interface event for a portion of the target window displaying the DRM protected content, and quashing the user interface event if permissions associated with the DRM protected content do not allow access to the DRM protected content, but otherwise passing the event to an event handler for the target window. | 06-24-2010 |
20100211656 | Configuring A Blade Environment - Configuring a blade environment, the blade environment including a chassis, a plurality of blade servers, and a management module, including receiving prior to delivery of the blade environment, from an end-user of the blade environment by a configuration module accessible through a wide-area network, configuration information for the blade environment; wherein the configuration information is specific to the end-user; storing, by the configuration module, the configuration information in a configuration file; after delivery of the blade environment to the end-user; downloading, from the configuration module to the management module on the blade environment, the configuration file; and configuring, by the management module, the blade environment using the configuration information stored in the configuration file. | 08-19-2010 |
20100269060 | Navigating A Plurality Of Instantiated Virtual Desktops - Navigating a plurality of instantiated virtual desktops including maintaining a z-axis order of a plurality of currently instantiated virtual desktops; receiving a user's invocation of one or more mouse buttons; identifying the received invocation of the one or more mouse buttons as a user instruction to change the virtual desktop currently given focus; selecting, in dependence upon the user instruction, one of the plurality of virtual desktops to give focus; reordering the virtual desktops in the z-axis such that the selected virtual desktop is highest in the z-axis order; giving focus to the selected virtual desktop; and displaying the selected virtual desktop as highest in the z-axis order. | 10-21-2010 |
20100318536 | QUERY TREE NAVIGATION - System, computer implemented method and computer program product for preparing and navigating a query tree including a plurality of query nodes and informational nodes. Each query node is associated with a prompt, branching criteria and keywords. A current query node provides a prompt to a user and a user response is received and analyzed to identify branching criteria and keywords from the user response. The method navigates to another node in the query tree in consideration of the branching criteria received in the user response and a comparison between the keywords received in the user response and the keywords associated with the query nodes. The comparison may validate navigation to a destination node corresponding to the branching criteria or the comparison may indicate incorrect navigation of the query tree. Corrective navigation can be implemented in various ways based upon the keywords received in the user response. | 12-16-2010 |
20110010566 | POWER MANAGEMENT BY SELECTIVE AUTHORIZATION OF ELEVATED POWER STATES OF COMPUTER SYSTEM HARDWARE DEVICES - Power in a computer system is managed by selectively authorizing requests by devices to operate at an elevated power state. One embodiment provides a computer system having a plurality of hardware devices interchangeably operable at mutually exclusive elevated and lower power states. The lower power states may be selected by default, and the devices independently request to operate at the elevated power state for a specified duration. A power management device, such as a baseboard management controller (BMC) or a chassis management module is configured for receiving and selectively authorizing the requests from the devices to operate at the elevated power state. The power management device subsequently revokes the authorization of the devices to operate at the elevated power state to enforce a system power limit. | 01-13-2011 |
20110055370 | Dynamically Balancing Resources In A Server Farm - Methods, apparatus, and products are disclosed for dynamically balancing resources in a server farm, the server farm comprising a plurality of servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, the methods, apparatus, and products including: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 03-03-2011 |
20110058674 | Secure Communication Of Information Over A Wireless Link - Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications with the blade management module through at least one wired link, the blade servers also connected for data communications with the blade management module through at least one wireless link, including sharing an encryption key between the blade management module and one or more of the blade servers only through the at least one wired link connecting the blade management module to the one or more blade servers; encrypting information by the blade management module with the encryption key; transmitting the encrypted information by the blade management module to the one or more blade servers through the at least one wireless link; and decrypting the encrypted information by the blade server with the encryption key. | 03-10-2011 |
20110066865 | Nameplate Power Capping - A nameplate for power capping a computer including a mounting surface; a module integrated in the mounting surface for providing a machine-readable designation of a power cap for a particular computer; a human readable designation of a power cap for the particular computer integrated in the mounting surface; and a mount for attaching the mounting surface to a chassis of the particular computer such that the human readable designation of a power cap is exposed. | 03-17-2011 |
20110066910 | STEALTH MESSAGE TRANSMISSION IN A NETWORK - Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message. | 03-17-2011 |
20110106886 | Propagating Firmware Updates In A Peer-To-Peer Network Environment - Propagating firmware updates in a peer-to-peer network including identifying, that one or more nodes in the network have firmware that is uplevel with respect to the downlevel node; broadcasting an update request requesting an update to the firmware; receiving, from a plurality of nodes having firmware uplevel with respect to the downlevel node, a plurality of portions of the update, metadata describing each portion of the update received, and metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node; determining, in dependence upon the metadata describing each portion of the update received and the metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node, whether the portions of the update received comprise an entire update; and updating the firmware if the portions of the update received comprise the entire update. | 05-05-2011 |
20110107317 | Propagating Firmware Updates In A Raid Array - Propagating firmware updates in a RAID array including identifying, by a RAID controller, that a first drive has a firmware that is uplevel with respect to firmware of at least one other drive, the RAID controller comprising a module of automated computing machinery; selecting, by the RAID controller, a second drive having downlevel firmware with respect to the firmware of the first drive; obtaining, by the RAID controller, an uplevel firmware image from the first drive; and updating, by the RAID controller, the downlevel firmware on the selected second drive with the obtained firmware image. | 05-05-2011 |
20110142218 | ENHANCED PRIVACY CALLER IDENTIFICATION SYSTEM - A first telephone number assigned to the first telephone is cryptographically hashed to generate a first message digest, and the first telephone sends a signal to a second telephone over a communication network, wherein the signal includes the first message digest. The second telephone receives the first signal and searches its contact records to determine whether a telephone number in one of the contact records generates a message digest that matches the message digest received. Then, in response to the second telephone determining that a telephone number in one of the contact records generates a message digest that matches the first message digest, the second telephone identifies the contact record that generates the matching message digest and provides audible or visual output of content from the identified contact record. | 06-16-2011 |
20110147447 | LABEL-CONTROLLED SYSTEM CONFIGURATION - A system utilizes an optical scanner to scan a printed configuration label on which is printed a printed system configuration code. The printed system configuration code describes a system configuration of the system, and is used to dynamically configure the system. | 06-23-2011 |
20110279266 | AUTOMATIC VERIFICATION OF NETWORK CABLE CONNECTIONS - A system and method for guiding server chassis enumeration in a computer system are disclosed. One embodiment provides a method of connecting a plurality of computer server chassis configured as a plurality of nodes. For each cable connection between any two server chassis, a port on the first of the two server chassis to which a first end of a cable is connected is identified, and a port on the second server chassis to which a second end of the cable is connected is identified. The node containing second server chassis is uniquely designated by the port designator on the first server chassis, and the node containing the first server chassis is uniquely designated by the port designator on the second server chassis. An electronic alert is generated in response to any conflicting node designator. | 11-17-2011 |
20110282979 | Network Address Assignment In A Data Center - In a data center that includes a number of chassis, with each chassis including a chassis management module and a number of slots, each slot associated with a service processor: network address assignment includes discovering, by a chassis management module of a particular chassis, one or more other chassis management modules; negotiating, by the chassis management module with the other chassis management modules via IPv6 data communications, a chassis-specific range of IPv4 addresses available for assignment to service processors of the particular chassis; providing, by the chassis management module to the service processors of the particular chassis, in dependence upon the chassis-specific range of IPv4 addresses, a base IPv4 address; and determining, by each service processor of the particular chassis, in dependence upon the base IPv4 address and a slot identifier of the slot associated with the service processor, an IPv4 address for the service processor. | 11-17-2011 |
20110289327 | CHASSIS POWER ALLOCATION USING EXPEDITED POWER PERMISSIONS - In one embodiment, a fixed chassis power budget is dynamically allocated to a plurality of servers inserted into a multi-server chassis. An inserted server may be inventoried by sequentially identifying server components, categorically-defined component power limits, and actual component power requirements of the inventoried components. A power permission may be granted to the inserted server prior to completion of the inventory, based on power-related information inferred from a chassis and server specification or from the inventoried components. | 11-24-2011 |
20120036346 | PARTIAL HIBERNATION RESTORE FOR BOOT TIME REDUCTION - Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed. | 02-09-2012 |
20120137066 | DYNAMIC USE OF RAID LEVELS RESPONSIVE TO WORKLOAD REQUIREMENTS - Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array. | 05-31-2012 |
20120137289 | PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A computer program product is provided, including computer usable program code for running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and computer usable program code for setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources. | 05-31-2012 |
20120209988 | AUTOMATIC SERVER POSITION DETERMINATION - Systems and methods are provided for determining the location of a target computer device, such as a server in an array of interconnected servers. In one embodiment, a method comprises selecting a first server defining a first point of an axis of a reference coordinate system and selecting a second server defining a second point of the axis. A first cable is connected from the target server to the first server and a second cable is connected from the target server to the second server. The location of the target server is determined according to the length of the first cable, the length of the second cable, and the locations of the first and second servers. The axis may be designated using an axis cable, by connecting a first end of the axis cable to the first server and connecting a second end of the axis cable to the second server. | 08-16-2012 |
20120219154 | STEALTH MESSAGE TRANSMISSION IN A NETWORK - Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message. | 08-30-2012 |
20120255993 | LABEL-CONTROLLED SYSTEM CONFIGURATION - A system has an optical scanner for reading a printed system configuration code on a printed configuration label. The printed system configuration code includes configuration information that describes a bus speed of a system bus of the system. A processor dynamically configures the system according to the configuration information decoded from the printed system configuration code. | 10-11-2012 |
20120272001 | DYNAMIC USE OF RAID LEVELS RESPONSIVE TO WORKLOAD REQUIREMENTS - Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array. | 10-25-2012 |
20120272243 | PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A method includes running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources. | 10-25-2012 |
20120278483 | AUTOMATIC SERVER POSITION DETERMINATION - A method is provided for determining the location of a target computer device, such as a server in an array of interconnected servers. In one embodiment, the method comprises selecting a first server defining a first point of an axis of a reference coordinate system and selecting a second server defining a second point of the axis. A first cable is connected from the target server to the first server and a second cable is connected from the target server to the second server. The location of the target server is determined according to the length of the first cable, the length of the second cable, and the locations of the first and second servers. The axis may be designated using an axis cable, by connecting a first end of the axis cable to the first server and connecting a second end of the axis cable to the second server. | 11-01-2012 |
20120331396 | AUTOMATED PRIVACY LEVEL SUGGESTIONS FOR SOCIAL NETWORKING - Embodiments of the present invention provide a method, system and computer program product for the automated suggestion of a privacy level setting for a new connection in a social network. In an embodiment of the invention, a method for automated suggestions of privacy level settings for a new connection in a social network is provided. The method includes receiving a new connection for an end user of a social network and identifying mutual connections between the new connection and the end user. Thereafter, a suggested privacy setting for the new connection can be displayed in a display of a computer based upon privacy settings of the identified mutual connections. Optionally, a selection can be received of a different privacy setting than the suggested privacy setting and the different privacy setting can be established for the new connection. | 12-27-2012 |
20130103788 | Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation. | 04-25-2013 |
20130103974 | Firmware Management In A Computing System - Managing firmware in a computing system storing a plurality of different firmware images for the same firmware includes: calculating, for each firmware image in dependence upon a plurality of predefined factors, a preference score; responsive to a failure of a particular firmware image, selecting a firmware image having a highest preference score; and failing over to the selected firmware image. | 04-25-2013 |
20130104248 | Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation. | 04-25-2013 |
20130125113 | Pairing Physical Devices To Virtual Devices To Create An Immersive Environment - Pairing physical devices to virtual devices to create an immersive environment, including: identifying, by a device pairing module, a virtual device in a virtual environment; identifying, by the device pairing module, a physical device in a physical environment; and pairing, by the device pairing module, the virtual device in the virtual environment with the physical device in the physical environment such that the physical device in the physical environment delivers virtual environment content, wherein the virtual environment content is content being delivered to an object in the virtual environment. | 05-16-2013 |
20130152157 | AUTOMATIC FILTERING IN SOCIAL NETWORKS - Embodiments of the present invention provide a method, system and computer program product for automated filtering of content viewing rights in a social network. In an embodiment of the invention, a method for automated filtering of content viewing rights in a social network includes selecting content directed for publication to different members of a social network executing in memory of a host server and computing a context for the content. The method additionally includes applying a rule to the context and to at least one member profile corresponding to one of the members of the social network in order to determine whether or not the content is to be blocked from viewing by the one of the members based upon a relationship between the member profile and the computed context. Thereafter, access to the content by the one of the members is permitted when permitted by the rule. | 06-13-2013 |
20130159985 | DETERMINING OPTIMAL UPDATE FREQUENCY FOR SOFTWARE APPLICATION UPDATES - Embodiments of the present invention provide a method, system and computer program product for configurably recommending a software application update. In an embodiment of the invention, a method for configurably recommending a software application update is provided. The method includes receiving an update for a software application along with a set of ratings for the update. The method also includes comparing in memory of a computer the set of ratings with a pre-stored threshold. Finally, the method includes prompting in the computer to apply the update to the software application responsive to the set of ratings meeting the pre-stored threshold. | 06-20-2013 |
20130179885 | Virtual Machine Administration For Data Center Resource Managers - Virtual machine administration for data center resource managers including discovering resources of the datacenter to be managed by a resource manager; determining, in dependence upon attributes of the resources, processing capabilities of the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, memory capabilities of the discovered resources; determining, in dependence upon attributes of the resources, minimum memory requirements for managing the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, minimum processing requirements for managing the discovered resources; deploying, in dependence upon the determined processing capabilities and memory capabilities upon one or more of the resources of the datacenter to be managed, a virtual machine having at least the minimum memory requirements and the minimum processing requirements; and deploying the resource manager on the virtual machine. | 07-11-2013 |
20130212267 | Dynamically Balancing Resources In A Server Farm - Dynamically balancing resources in a server farm, where the server farm includes servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, and the balancing of resources includes: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 08-15-2013 |
20130212294 | Processing Computer Graphics Generated By A Remote Computer For Streaming To A Client Computer - Processing computer graphics generated by a remote computer for streaming to a client computer for display on a display device operatively coupled to the client computer, the graphics streamed to the client computer in a plurality of frames, including, for each frame: selecting, by a graphics module of the remote computer in dependence upon a compression profile, regions of the frame to compress at a lower compression rate than other regions of the frame; compressing the frame for streaming; streaming the compressed frame to the client computer; receiving the compressed frame in the stream; decompressing the compressed frame; and displaying the decompressed frame on the display device operatively coupled to the client computer. | 08-15-2013 |
20130253757 | Maintaining A Dynamic Service Registry For A Self-Diagnosing Device - Maintaining a dynamic service registry for a self-diagnosing device, including: detecting, by the self-diagnosing device, a fault condition, wherein the fault condition indicates that the self-diagnosing device needs to be serviced; detecting, by the self-diagnosing device, that the fault condition has been resolved; determining, by the self-diagnosing device, the geographic location of the self-diagnosing device upon detecting that the fault condition was resolved; and entering, by the self-diagnosing device, the fault condition and the geographic location of the self-diagnosing device when the fault condition was resolved into the dynamic service registry. | 09-26-2013 |
20130312113 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 11-21-2013 |
20130312114 | Region-Based Sharing of Pictures - An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting. | 11-21-2013 |
20130315399 | MULTI-DIMENSIONAL AUDIO TRANSFORMATIONS AND CROSSFADING - A system for generating mixed audio output using a multi-dimensional audio map includes a computer processor and a multi-dimensional crossfader configured to implement a method. A first audio file is read. A multi-dimensional audio map includes a plurality of audio attribute layers, each including a first dimension representing an audio attribute value for a location defined by at least two other dimensions within a multi-dimensional space. A path is determined to transition between two points in the multi-dimensional audio map. A transition is performed between the two points in the multi-dimensional audio map by selecting corresponding values from each of the plurality of audio attribute layers between the two points. A mixed output is generated by applying the corresponding values from each of the plurality of audio attribute layers between the two points to a portion of the first audio file. | 11-28-2013 |
20130315400 | MULTI-DIMENSIONAL AUDIO TRANSFORMATIONS AND CROSSFADING - A method for creating a multi-dimensional audio map is provided. The method includes assigning a first audio attribute to a multi-dimensional space comprising at least three dimensions. The method also includes creating, by a computer processor responsive to user input, a first audio attribute layer within the multi-dimensional space, including a first dimension representing an audio attribute value of the first audio attribute for a location defined by at least two other dimensions. A method for generating a mixed output using the multi-dimensional audio map is also provided. | 11-28-2013 |
20140040875 | FEDERATED SYSTEM AUTOMATIC UPDATE COMMUNICATION TO ENABLE SELECTIVE UPDATE OF CRITICAL FIRMWARE ELEMENTS - A method for firmware update coordination in a federated computing system can include receiving in a host one of different computers coupled to one another in a federated computing system, different version levels of firmware versions in peer ones of the different computers. The method additionally can include recording in a compatibility list in the host computer, different version levels of firmware versions for respectively different peer ones of the computers. The method yet further can include selecting a firmware update to be applied to the host computer and comparing a version level of the selected firmware update to the different version levels in the compatibility list. Finally, the firmware update can be applied to the host computer only if the version level of the selected firmware update is present in the compatibility list, but otherwise rejecting the firmware update. | 02-06-2014 |
20140075170 | AUTOMATED FIRMWARE VOTING TO ENABLE MULTI-ENCLOSURE FEDERATED SYSTEMS - One embodiment provides a method of initializing a federated computer system from a fabric of nodes connected by a federated interface. Each node casts a vote to the federated interface for a candidate firmware version supported by the node casting the vote. The candidate firmware version having received the greatest number of votes is identified, and the computer system is initialized as a federated system of the nodes that support the firmware version identified as having received the greatest number of votes. A process of iterative voting may be used to identify a greater number of nodes supporting a compatible firmware version. | 03-13-2014 |
20140075173 | AUTOMATED FIRMWARE VOTING TO ENABLE A MULTI-ENCLOSURE FEDERATED SYSTEM - A method initializes a federated computer system from a fabric of nodes connected by a federated interface. Each node casts a vote to the federated interface for a candidate firmware version supported by the node casting the vote. The candidate firmware version having received the greatest number of votes is identified, and the computer system is initialized as a federated system of the nodes that support the firmware version identified as having received the greatest number of votes. A process of iterative voting may be used to identify a greater number of nodes supporting a compatible firmware version. | 03-13-2014 |
20140104174 | Ultra-Compact Keyboard - An embodiment of the invention provides a method of character recognition where input is received from an actuated key. The angle of the input is determined with a sensor, wherein the angle of the input includes pressure on a first axis, pressure on a second axis, and/or pressure on an additional axis. A processor matches the angle of the input to an identified character in a memory device, wherein the memory device includes a plurality of characters, each of the characters corresponding to a key and an angle of input. The identified character is displayed on a display. | 04-17-2014 |
20140104176 | Ultra-Compact Keyboard - An embodiment of the invention provides a method of character recognition where input is received from an actuated key. The angle of the input is determined with a sensor, wherein the angle of the input includes pressure on a first axis, pressure on a second axis, and/or pressure on an additional axis. A processor matches the angle of the input to an identified character in a memory device, wherein the memory device includes a plurality of characters, each of the characters corresponding to a key and an angle of input. The identified character is displayed on a display. | 04-17-2014 |
20140344025 | Annotation-Based Voting for E-Readers and Social Networking Enabled Browsers - Techniques for annotation-based voting for online content are provided. In one aspect, a method for voting for online content is provided which includes associating content selected by a voter from a first content set with a user profile of the voter; identifying the selected content in a second content set upon the second content set being accessed by one or more users socially connected to the voter; and visually accenting the selected content in the second content set. The method may include retrieving profile information for the voter; and associating the profile information for the voter with the selected content in the second content set. The method may further include displaying the profile information for the voter along with the selected content in the second content set. | 11-20-2014 |
20140344348 | Annotation-Based Voting for E-Readers and Social Networking Enabled Browsers - Techniques for annotation-based voting for online content are provided. In one aspect, a method for voting for online content is provided which includes associating content selected by a voter from a first content set with a user profile of the voter; identifying the selected content in a second content set upon the second content set being accessed by one or more users socially connected to the voter; and visually accenting the selected content in the second content set. The method may include retrieving profile information for the voter; and associating the profile information for the voter with the selected content in the second content set. The method may further include displaying the profile information for the voter along with the selected content in the second content set. | 11-20-2014 |
20150033168 | GRAPHICAL ASSOCIATION OF TASK BAR ENTRIES WITH CORRESPONDING DESKTOP LOCATIONS - Embodiments of the present invention address deficiencies of the art in respect to task bar management and provide a method, system and computer program product for graphical association of task bar entries. In one embodiment of the invention, a method for graphically associating a window with a task bar entry in a windowing operating system GUI can be provided. The method can include rendering multiple windows in a z-space sequence in a desktop of the windowing operating system graphical user interface and detecting a proximity event for an entry in a task bar for the windowing operating system graphical user interface. In response to detecting the proximity event, a corresponding one of the windows in the desktop can be highlighted without re-ordering the z-space sequence. | 01-29-2015 |