Patent application number | Description | Published |
20080218125 | Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery. | 09-11-2008 |
20080218126 | Conditional Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with selected predetermined variable conditions. In an exemplary embodiment, a user is enabled to select the predetermined conditions under which the charging of a battery is suspended until such conditions have changed. Such conditions include, for example, physical location of the battery being charged and/or the time and/or date when the battery is being charged. A user GUI is provided to enable a user to input selected times and/or dates and/or locations when the device containing the battery is likely to be away from a charging source and needs to be fully charged, and/or selected times and/or dates and/or locations when the device is likely to have access to a power source and the battery is enabled to be charged only to a storage level. | 09-11-2008 |
20080222715 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 09-11-2008 |
20080256618 | METHOD TO APPLY NETWORK ENCRYPTION TO FIREWALL DECISIONS - A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information. | 10-16-2008 |
20090052645 | TELECONFERENCE SYSTEM WITH PARTICIPANT FEEDBACK - A method, medium and implementing processing system are provided for facilitating teleconference-based meeting moderation by the addition of a “live feedback” feature, with instrumentation such as by means of an instant messaging systems when instant messaging conference systems equipped with this feature are used to supplement teleconferences, the participants provide instant feedback (anonymously, if desired) to the meeting moderator. The audience can let the moderator know their valuation of the current discussion. Based on feedback, the moderator can take appropriate action, such as to steer the conversation into areas that will be received favorably by the meeting participants. | 02-26-2009 |
20090094695 | ACCOUNT ASSOCIATION GENERATION - Illustrative embodiments provide a computer implemented method, data processing system and computer program product for generating an association between a configuration item and an account. In one illustrative embodiment, the computer implemented method comprises selecting the configuration item requiring account association to create a selected configuration item, and selecting a set of rules for the selected configuration item to form a set of selected rules, wherein the selected set of rules is used to associate configuration items to accounts. Further the method determines whether a match is present between the set of selected rules and the selected configuration item, and responsive to determining that a match is present, obtains account mapping information for an account identified by the match, and associates the selected configuration item with the account using the account mapping information. | 04-09-2009 |
20090113353 | CURSOR LOCATOR - Illustrative embodiments provide a computer implemented method, data processing system and a computer program product for indicating the location of a cursor within an application to a user. In one illustrative embodiment the computer implemented method comprises initiating a monitoring service to generate collected information regarding the location of the cursor within the application and comparing the collected information with a set of respective predetermined values to create a set of compared values. Responsive to a determination based on the set of compared values, presenting a visual cue indicating the location of the cursor to the user. | 04-30-2009 |
20090113486 | METHOD AND SYSTEM OF ENABLING COMPLETE VIEWING CONTENT FOR SELECTED PROGRAMMING - A system for enabling complete viewing of selected programming content. In response to receiving an input data stream from a programming service provider, the input data stream is stored in a supplemental storage. In response to a user selecting a programming channel after a program starts to air, the input data stream is stored in a programming storage. Then, the stored data stream is outputted from the supplemental storage to a viewing device. | 04-30-2009 |
20100250118 | PORTABLE NAVIGATION DEVICE POINT OF INTEREST SELECTION BASED ON STORE OPEN PROBABILITY - A probability that a selected point of interest is accessible to customers for commercial transactions is determined. In response to receiving a mailing address of a selected candidate point of interest and a calculated estimated time of arrival, it is determined whether the mailing address of the selected candidate point of interest is stored in a data storage device. In response to determining that the mailing address of the selected candidate point of interest is stored in the data storage device, a percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions at the calculated estimated time of arrival is assigned based on utility usage data and a confidence level associated with the utility usage data stored in the data storage device. The percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions is sent via the network. | 09-30-2010 |
20120324562 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 12-20-2012 |