Patent application number | Description | Published |
20080218125 | Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery. | 09-11-2008 |
20080218126 | Conditional Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with selected predetermined variable conditions. In an exemplary embodiment, a user is enabled to select the predetermined conditions under which the charging of a battery is suspended until such conditions have changed. Such conditions include, for example, physical location of the battery being charged and/or the time and/or date when the battery is being charged. A user GUI is provided to enable a user to input selected times and/or dates and/or locations when the device containing the battery is likely to be away from a charging source and needs to be fully charged, and/or selected times and/or dates and/or locations when the device is likely to have access to a power source and the battery is enabled to be charged only to a storage level. | 09-11-2008 |
20080222715 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 09-11-2008 |
20080228894 | Scrolling Chat for Participation in Multiple Instant Messaging Conversations - A computer implemented method, data processing system, and computer program product for enabling users to view a plurality of instant messaging chat conversations and respond quickly and easily a selected conversation, while minimizing the impact on the users' other activities. Users are also provided with the option of choosing which instant messaging conversations to monitor and which responses from particular people or topics to display. Multiple instant messaging chat conversations are provided to a user via a scrolling chat window, wherein the scrolling chat window allows the user to scroll through and monitor the multiple instant messaging chat conversations. When user input is received for a selected instant messaging chat conversation, the selected instant messaging chat conversation is loaded and displayed into an instant messaging chat window to allow the user to respond to the selected instant messaging chat conversation. | 09-18-2008 |
20080243582 | METHOD AND SYSTEM FOR MANAGING CONFLICTING CALENDAR ENTRIES - The present invention enables a user to schedule meetings and detect scheduling conflicts. A system user such as an employee schedules a meeting. The time and date of the meeting is stored in an account for that user. When the same user schedules another meeting, that meeting is detected and compared with any previously and scheduled and stored meetings for that user. If there is a conflict between the presently scheduled meeting and any previously scheduled meeting, then the present invention alerts the user and gives the user the opportunity to select the new meeting for that time or to retain the currently scheduled meeting. The present invention can also store and track the unscheduled meetings. In the event the scheduled meeting is postponed or canceled, the user can be notified and given the opportunity to schedule and attend a previously declined meeting that was scheduled for that same time. | 10-02-2008 |
20080250111 | Remote Operation of Instant Messaging Systems - A method for allowing remote operation of an instant messaging session is provided. A remote instant messaging client is selected from a list of remote instant messaging clients. User input, indicating an instant messaging command to be executed on the selected remote instant messaging client, is received. A request that includes the instant messaging command to be executed is sent to the selected remote instant messaging client. A message indicating receipt of the request by the selected remote instant messaging client is received from the selected remote instant messaging client. | 10-09-2008 |
20080250112 | Method and Apparatus for Determining Whether an Email Message is Ready for Transmission - A computer implemented method, apparatus, and computer usable program code to analyze an email message using a policy to form a result in response to detecting a request to send an email message. A determination is made as to whether the result indicates that the email message is complete. An alert is generated if a determination is present that indicates that the email message is incomplete. | 10-09-2008 |
20080256618 | METHOD TO APPLY NETWORK ENCRYPTION TO FIREWALL DECISIONS - A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information. | 10-16-2008 |
20080260138 | METHOD AND SYSTEM FOR USER INTERACTION WITHIN A QUEUE - A system for providing caller interaction within a queue. In response to receiving a call, it is determined whether a wait time exists before a caller is connected to a customer service representative. In response to determining that the wait time exists, it is determined whether the caller is interested in an interaction. In response to determining that the caller is interested in the interaction, a profile associated with the caller is loaded. In response to detecting a connection with an interactive system, interactive options are loaded from the interactive system and presented to the caller based on the profile. In response to receiving a selection from the interactive options, it is determined whether the selection includes a group interaction. In response to determining that the selection includes the group interaction, the group interaction is loaded based on the profile. Then, the caller is entered into the group interaction. | 10-23-2008 |
20080270916 | METHOD FOR AUTOMATICALLY INITIATING AN INSTANT MESSAGING CHAT SESSION BASED ON A CALENDAR ENTRY - A computer implemented method, data processing system, and computer program product for automatically initiating an instant messaging (IM) chat session based on a calendar entry. A user's IM client receives instructions to initiate an IM chat session based on a scheduled entry in the calendaring system. These instructions may be received from the user's calendaring system or a continuously running service, such as a daemon, independent of the IM client. Upon receiving the instructions, the IM client may optionally alert the user to the impending chat session. The IM client then presents a chat window for the instant messaging chat session to the user at a time specified in the scheduled entry. Data associated with the scheduled entry in the calendaring system, such as notes or attachments related to the chat session, may also be displayed in the chat window. | 10-30-2008 |
20080275986 | Method to Update Status on Multiple Voice and Text Systems from a Single Device - A method for updating a message on a plurality of devices from a single device comprising a Configuration Program (CP), an Audio Device Update Program (ADUP), and a Text Device Update Program (TDUP). Using the CP, the user may enable and disable the present invention, add or delete devices, create and save messages, select existing messages to play to callers or display to senders, enable automated status updates, enable multiple message levels, or enable availability updates. The automated status update automatically creates messages from the user's calendar. The multiple message levels are a hierarchy of messages in which the message sent to a caller or sender based on their identity. The availability update communicates the user's next available time to the caller or sender. The ADUP and TDUP select the appropriate message to play or send based on whether automated status updates, multiple message levels, and availability updates are enabled. | 11-06-2008 |
20080281823 | System and Method for Display of Chained Messages in a Single Email in Different Orders - Systems and methods for display of chained messages in a single email in different orders allow a user to specify sort criteria to determine the order of display of chained messages. The system includes a message finding program and a message sorting program. The message finding program identifies individual messages within an email and populates a message list with a unique identifier for each message and sorting data contained within each message. The message sorting program receives sorting criteria defined by a user via an email display and sorts the sorting data within the message list pursuant to the sorting criteria. After sorting the message list, the message sorting program provides the email display with the messages in order of their identifiers within the message list for display as a single email in their sorted order. | 11-13-2008 |
20080292065 | Single Point of Contact Personal Communication System - A computer/telephony integrated single-point-of-contact system (CISS) enabling a user to contact another using multiple devices with a single contact attempt is disclosed. A plurality of computer programs residing in a computer use a subscriber database, authorization database, priority list database, and device attributes database to determine how to respond to a request to contact a subscriber. If the request is an emergency, the computer repeatedly contacts all of the subscriber's devices until a response is received. Otherwise, the computer contacts the subscriber's devices in a sequential order determined by the subscriber. The computer can also delete redundant un-received messages from a subscriber's devices and create a real-time connection between the requester and the subscriber, if it is technically possible, at the subscriber's request. | 11-27-2008 |
20080294618 | SYSTEM AND METHOD FOR ADVANCED HANDLING OF MULTIPLE FORM FIELDS BASED ON RECENT OPERATOR BEHAVIOR - A method, system and computer program product for enhancing the usability of web browsers by analyzing the recent behavior of an operator while executing a search pattern on a computer network. In particular, a browser enhancement utility provides web browsers with the ability to store (for a limited time period) search terms used in a variety of web search patterns. The browser enhancement utility employs ranking algorithms to identify the relationships between searches and a ranking and matching algorithm to utilize stored search terms to find (text) matches in a web document. When the browser displays web pages after a search has occurred, the browser enhancement utility utilizes these matches in order to take actions to enhance document usability. These actions include: Highlighting terms that have been recently searched for; pre-selecting matching terms from drop down boxes or radio buttons; and focusing a web page to relevant sections of text. | 11-27-2008 |
20080294619 | SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF SEARCH SUGGESTIONS BASED ON RECENT OPERATOR BEHAVIOR - A method, system and computer program product for enhancing the usability of web browsers by analyzing the recent behavior of an operator while executing a search pattern on a computer network. A search history and indexing datastore is defined and associated with the web document parser. The web document parser parses through each returned web page for significant terms that may be of later importance to the user. These terms are then forwarded to the datastore and indexed along with the search term to later provide a historical guide to identify the user's areas/topics of interest. When a search term is entered within the web browser, the search terms is compared against the index of terms for similar terms. The similar terms found are ranked according to closeness to the entered search term, and the ranked terms outputted to the user for possible selection in lieu of the search term. | 11-27-2008 |
20090018923 | METHOD AND APPARATUS FOR RECOMMENDING A PAYMENT METHOD IN A TRANSACTION - The illustrative embodiments described herein provide a computer-implemented methods apparatus, and computer program product for recommending a payment method in a transaction. The process generates a user profile based on user information. The process receives data regarding incentives available for using a set of payment methods to form incentive policy data. The process identifies a set of parameters associated with the transaction. The process generates a set of recommended payment methods in the set of payment methods using the user profiles the incentive policy data, and the set of parameters to form a recommendation. The set of recommended payment methods are recommended to complete the transaction. The process provides the recommendation to a user. | 01-15-2009 |
20090018955 | METHOD AND APPARATUS FOR PROVIDING USER ACCESS TO PAYMENT METHODS - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for providing user access to payment methods. The process generates a set of recommended payment methods in a set of payment methods to form a recommendation. The set of recommended payment methods are recommended to complete the transaction. The process provides the recommendation to a user on a user interface. The process provides the application for the user to apply for the right to use the recommended payment method on a user interface in response to a determination that a recommended payment method in the recommendation is presently unavailable to the user. | 01-15-2009 |
20090019377 | Method to Enable Selection of Segments in an Instant Messaging Application for Integration in Other Applications - A Segment Interface Program (SIP) is disclosed that enables a user to choose locations in other applications to receive segments, and to mark segments for manual or automatic transmission to those applications. The SIP comprises an Application Interface Program (AIP), a Segment Creator Program (SCP), a Segment Queue Program (SQP), and a Segment Delivery Program (SDP). The SIP accesses a Rules database, a codes database, and a queue database. The AIP enables a user to select a location in an application and assign an application code and a location code to the location. The SCP enables a user to select a segment in a chat transcript, assign an application code and a location code to the segment, and send the segment to the SQP. The SQP receives the segment, assigns a queue number, and places the segment in a queue table. The SDP reads the user code, the application code and, when the application is active, sends the segment to the location in the application with the corresponding code. A single segment may be inserted into an application in multiple locations by creating additional codes for multiple instances of a location. | 01-15-2009 |
20090028318 | LOCATION-BASED CALL ROUTING - A method and implementing computer system are provided in which users are enabled to create a database listing areas in which the user may be at any given moment and corresponding phone numbers to which calls directed to the user's phone number are re-routed if the user is in any of the designated areas when an incoming call is placed. In an exemplary embodiment, a global positioning system is implemented as a geographic locating device to determine the user's location at any time, and a routing server database is implemented and accessed to match the user's current location to one or more user-designated telephone numbers in an area proximate to the user's current location. | 01-29-2009 |
20090030984 | System and Method for Automatically Segmenting Content from an Instant Messaging Transcript and Applying Commands Contained Within the Content Segments - A system and method for automatically segmenting content from an instant messaging transcript and applying commands contained within the content segments is disclosed. The system includes a segment finding program, a command fording program, and a command list. The segment finding program identifies topic shifts in the IM conversation. The command finding program searches the identified topic segments for commands. Upon finding a command, the command finding program locates an appropriate action within the command list and executes it after obtaining user permission if so specified. The system works in conjunction with an IM program having functions to allow each user to control the segment finding and command finding programs. | 01-29-2009 |
20090037905 | METHOD FOR TRANSFERRING INVENTORY BETWEEN VIRTUAL UNIVERSES - The present invention provides a computer implemented method for transferring an item from a source virtual universe to a target virtual universe. A target virtual universe host opens a session between a source virtual universe host and itself. Next, it determines that the source virtual universe host is authorized to transmit the item to the target virtual universe host. Next, it receives a command from a client computer to transfer the item from the source virtual universe host to the target virtual universe host. Next, it receives item data in the target virtual universe host. | 02-05-2009 |
20090046094 | METHOD AND APPARATUS FOR PREDICTING AVATAR MOVEMENT IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method, apparatus, and computer useable program code to offer to move an avatar in a virtual universe. A computer predicts a location selection to form a prediction. The computer renders a first viewport in a computer display, based on the prediction. The first viewport includes a first user-control; a first coordinate; and a first attitude. The computer renders a second viewport comprising a second user-control, a second coordinate and a second attitude wherein at least one object is rendered in a computer display from a perspective distinct from a perspective of the first viewport. The computer receives an instruction corresponding to the first user-control. | 02-19-2009 |
20090046102 | METHOD AND APPARATUS FOR SPAWNING PROJECTED AVATARS IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method and apparatus to project a projected avatar associated with an avatar in a virtual universe. A computer receives a command to project the avatar, the command having a projection point. The computer transmits a request to place a projected avatar at the projection point to a virtual universe host. The computer renders a tab associated with the projected avatar. | 02-19-2009 |
20090046109 | METHOD AND APPARATUS FOR MOVING AN AVATAR IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer usable program code for moving an avatar. A computer renders a first viewport in a computer display. The first viewport may comprise a first tab, a first coordinate, and a first attitude. A first object is rendered based on the first coordinate and the first attitude in a region. The computer renders a second tab. The computer receives a user selection corresponding to the second tab. Next, the computer renders a second viewport comprising a second coordinate and a second attitude. The computer renders the second object in a computer display from a perspective distinct from the first viewport. In addition, the computer registers the avatar as associated with the second coordinate and second attitude in the virtual universe, wherein the first tab is a visual indication of movement history. | 02-19-2009 |
20090052645 | TELECONFERENCE SYSTEM WITH PARTICIPANT FEEDBACK - A method, medium and implementing processing system are provided for facilitating teleconference-based meeting moderation by the addition of a “live feedback” feature, with instrumentation such as by means of an instant messaging systems when instant messaging conference systems equipped with this feature are used to supplement teleconferences, the participants provide instant feedback (anonymously, if desired) to the meeting moderator. The audience can let the moderator know their valuation of the current discussion. Based on feedback, the moderator can take appropriate action, such as to steer the conversation into areas that will be received favorably by the meeting participants. | 02-26-2009 |
20090094244 | METHOD FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 04-09-2009 |
20090094277 | AUTOMATIC OPTIMIZATION OF DISPLAY LAYOUT FOR MOBILE DEVICES - A computer implemented method, a computer program product, and a mobile device are disclosed for presenting a list of invokable actions to a user of the mobile device. Responsive to identifying the commencing of the invokable action, specific attributes of the invokable action are identified and stored in a corresponding data structure. From the specific attributes stored within the corresponding data structure, a most probable invokable action is identified. When the commencing of a subsequent invokable action is identified, the most probable invokable action is presented to the user. | 04-09-2009 |
20090094288 | Conversation Persistence In Real-time Collaboration System - Previously conducted conversations in real-time collaboration messages are persistently stored, either by client or a server, and then are associated with conversational items presented to a user (e.g. contact names, topics, etc.). An icon is provided near each listed item, which when selected, displays to the user summaries or titles of all transcripts to which the selected item pertains or relates. The user may select one or more summaries or titles for which the conversation is to be resumed, causing the system to retrieve the stored transcript and resume appending new conversational entries to it, so that the user recovers conversational context effortlessly and accurately. Enhanced versions of the invention include sharing of transcripts so that all participants receive the context of the conversation, and server-side or client-side implementations. | 04-09-2009 |
20090106664 | PUBLIC STATUS DETERMINATION AND SECURITY CONFIGURATION OF A BROWSER - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system. | 04-23-2009 |
20090106835 | METHOD AND APPARATUS FOR PROTECTING SENSITIVE INFORMATION ON A PUBLICLY ACCESSED DATA PROCESSING SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system. | 04-23-2009 |
20090110158 | METHOD AND APPARATUS OF AUTOMATED MESSAGE CONVERSION BASED ON AVAILABILITY OF BANDWIDTH - A computer implemented method, apparatus, and computer usable program product for managing a communications session. The process monitors a bandwidth of the communications device in response to detecting an exchange of audio-based messages on a communications device. In response to detecting the bandwidth below a threshold, the process converts a subsequent outgoing audio-based message into an outgoing text-based message and associates a low bandwidth indicator to the outgoing text-based message to form a distinguished text-based message. The process then transmits the distinguished text-based message for receipt by an intended recipient. | 04-30-2009 |
20090113353 | CURSOR LOCATOR - Illustrative embodiments provide a computer implemented method, data processing system and a computer program product for indicating the location of a cursor within an application to a user. In one illustrative embodiment the computer implemented method comprises initiating a monitoring service to generate collected information regarding the location of the cursor within the application and comparing the collected information with a set of respective predetermined values to create a set of compared values. Responsive to a determination based on the set of compared values, presenting a visual cue indicating the location of the cursor to the user. | 04-30-2009 |
20090113486 | METHOD AND SYSTEM OF ENABLING COMPLETE VIEWING CONTENT FOR SELECTED PROGRAMMING - A system for enabling complete viewing of selected programming content. In response to receiving an input data stream from a programming service provider, the input data stream is stored in a supplemental storage. In response to a user selecting a programming channel after a program starts to air, the input data stream is stored in a programming storage. Then, the stored data stream is outputted from the supplemental storage to a viewing device. | 04-30-2009 |
20090125819 | METHOD AND SYSTEM FOR SPLITTING VIRTUAL UNIVERSES INTO DISTINCT ENTITIES - Systems and methods for allowing an administrator or program to select a region or set of avatars in a virtual universe grid for splitting into another, separate and distinct virtual universe grid. If a region is selected, all of the avatars and virtual universe resources associated with the region are locked, their data is retrieved, and another separate virtual universe grid is commanded to create and insert the avatars and resources in it. If avatars are selected, all of the resources, scripts, histories, and information regarding the selected avatars are retrieved, and the avatars are locked in the source universe. Then, another, separate virtual universe grid is commanded to create universe user identifiers for the avatars, and they are inserted into the separate VU grid. Cleanup includes deleting the region and/or avatars from the first (source) virtual universe grid. | 05-14-2009 |
20090141168 | Sub-program avoidance redirection for broadcast receivers - A system for automatically tuning a primary broadcast receiver using a secondary broadcast receiver to receive a first broadcast signal corresponding to a source of an origin program, one or more program transition detectors to monitor first broadcast signal tuned by the secondary broadcast receiver to determine and signal a transition from a non-original program content to origin program content while a user views or hears alternate programming from a primary broadcast receiver, and automatically tuning of the primary broadcast receiver to the first broadcast signal upon detection by the program transition detector that one or more of user-specific tune conditions have been met. | 06-04-2009 |
20090182820 | METHOD FOR AUTOMATICALLY MODIFYING ELECTROINIC DISTRIBUTION LISTS USING PREDEFINED RULES - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 07-16-2009 |
20090198664 | METHOD AND SYSTEM FOR MERGING DISPARATE VIRTUAL UNIVERSES ENTITIES - A migration tool for merging disparate virtual universes by selecting a source region or source account, selecting a destination edge or destination account, retrieving and storing virtual universe information for the source region or account, inserting the virtual universe resources of the source region or account into the destination region or account, activating the inserted resources, and deleting the source resources from the source region or account. | 08-06-2009 |
20090222338 | Monitoring and Rewards Methodologies for "Green" Use of Vehicles - Energy-efficiency related data corresponding to dynamic energy-efficiency related operational parameters of a vehicle are collected from in-vehicle sensors and energy-efficiency parameters may be computed therefrom. The energy efficiency-related parameters and energy-efficiency parameters are then transmitted either directly of through a wireless and/or network link(s) to a station at which a transaction with a vehicle operator may be performed. An incentive based on efficiency of vehicle operation is computed and awarded to provide feedback to a vehicle operator to provide information concerning efficient vehicle operation and to encourage efficient and environmentally responsible vehicle operation. Both energy efficiency and environmental effects may be displayed at the station or substantially continuously and in substantially real time within the vehicle. | 09-03-2009 |
20090245095 | Voice Over Internet Protocol Clarity During Degradation - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for improving voice over Internet Protocol clarity during degradation. In one illustrative embodiment, the computer implemented method comprises monitoring a call, determining whether degradation exists; and responsive to a determination that degradation exists, applying a corrective action. The computer implemented method further comprises determining whether a quality of the call has improved and responsive to determining that the quality of the call has improved, further monitoring the call to form a monitored quality. The computer implemented method further comprises, determining whether monitored quality is acceptable, and responsive to determining monitored quality acceptable, removing the corrective action. | 10-01-2009 |
20090247147 | Predictive Mobile Phone Service Disruption Service - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for a predictive mobile phone service disruption service. In one illustrative embodiment, the computer implemented method comprises monitoring a cellular call of a caller, calculating a location and vector of the caller, and determining whether the caller is approaching a drop zone. The computer implemented method responsive to determining the caller is approaching a drop zone, estimates a duration of a loss of service, and responsive to determining the caller is approaching a drop zone, selectively notifying the caller. | 10-01-2009 |
20090267937 | FLOATING TRANSITIONS - A computer implemented method and apparatus for floating object transitions. In one embodiment, tracking data identifying a location of an avatar in relation to a range of an object in a virtual universe is received. The range comprises a viewable field. In response to the tracking data indicating an occurrence of a trigger condition, a set of flotation rules associated with the trigger condition is identified. An optimal location and orientation of the object is identified for each flotation action in a set of flotation actions associated with the set of flotation rules. The set of flotation actions are initiated to float the object above a surface. The object changes the location and orientation of the object in accordance with the set of flotation actions associated with the set of flotation rules. | 10-29-2009 |
20090267948 | OBJECT BASED AVATAR TRACKING - A computer implemented method, apparatus, and computer program product for object based avatar tracking. In one embodiment, a range for an object in a virtual universe is identified. The range comprises a viewable field of the object. Avatars in the viewable field of the object are capable of viewing the object. Avatars outside the viewable field of the object are incapable of viewing the object. In response to an avatar coming within the range of the object, an object avatar rendering table is queried for a session associated with the avatar unique identifier and the object unique identifier. The object avatar rendering table comprises a unique identifier of a set of selected objects and unique identifiers for each avatar in a range of a selected object in the set of selected objects. An object initiation process associated with the object is triggered. | 10-29-2009 |
20090267950 | FIXED PATH TRANSITIONS - A computer implemented method, apparatus, and computer program product for fixed path transitions in a virtual universe environment. In one embodiment, tracking data that identifies a location of an avatar in relation to a range of an object in a virtual universe is received. The range comprises a viewable field. In response to the tracking data indicating an occurrence of a trigger condition associated with a fixed path rule, a fixed path defined by the fixed path rule is identified. A speed of movement and an orientation of the object associated with the fixed path rule is identified. Movement of the object along the fixed path defined by the fixed path rule is initiated. The object then moves along the fixed path at the identified speed and with the orientation associated with the fixed path rule. | 10-29-2009 |
20090267960 | Color Modification of Objects in a Virtual Universe - A computer implemented method, apparatus, and computer program product for modifying an object. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. The process then calculates modified pixel color values to form a modified color in response to detecting a condition for triggering modification of the object. Thereafter, the process modifies a color of the object to form the modified color when the location of the set of avatars is within the range of the object. | 10-29-2009 |
20090271422 | Object Size Modifications Based on Avatar Distance - A computer implemented method, apparatus, and computer program product for modifying objects. In one embodiment, tracking data is obtained which identifies a location of a set of avatars in relation to a range of the object. The range of the object includes a viewable field. In response to determining that the object requires modification, a size of the object is compared with a set of size constraints to form a comparison. Thereafter, the size of the object is modified based on the comparison to form a set of size modifications. | 10-29-2009 |
20090310510 | FUTURE FORWARDING ZONES IN AD HOC NETWORKING SERVICE - A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles. | 12-17-2009 |
20090327219 | Cloning Objects in a Virtual Universe - In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. In response to the location of the avatar being within the range of the object, the process queries a data structure storing cloning data for a record of a clone of the object. Thereafter, the process instantiates the clone of the object in response to the presence of the record of the clone of the object in the data structure. The process then invokes a set of object methods associated with the record of the clone in the data structure. | 12-31-2009 |
20100001993 | GEOMETRIC AND TEXTURE MODIFICATIONS OF OBJECTS IN A VIRTUAL UNIVERSE BASED ON REAL WORLD USER CHARACTERISTICS - A computer implemented method, apparatus, and computer usable program product for modifying objects in a virtual universe. A user priority controller determines a real world identity of a set of users controlling a set of avatars within a viewable field of an object in a virtual universe. The user priority controller receives user information describing characteristics of the set of users based on the real world identity of each user in the set of users. The user priority controller generates a temporary and dynamic rule to control modification of the object based on the user information. The user priority controller modifies the object in accordance with the temporary and dynamic rule to increase visibility of the object to an avatar in the set of avatars. The temporary and dynamic rule initiates implementation of geometric and texture modifications to modify the object in accordance with the temporary and dynamic rule. | 01-07-2010 |
20100005423 | Color Modifications of Objects in a Virtual Universe Based on User Display Settings - A computer implemented method, apparatus, and computer program product for modifying an object. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. The process then selects a data collection method based on the location of the set of avatars. In response to detecting an event for triggering modification of the object, the process calculates a set of color modifiers based on display setting data to form a modified color. Thereafter, the process renders the object using the modified color when the location of the set of avatars is within the range of the object. | 01-07-2010 |
20100017408 | Automatic Email Consolidation for Multiple Participants - The invention is a data processing means wherein human perceptible elements of electronic information are gathered, prepared, formatted, or otherwise processed in forming a unified collection of such information storable as a distinct entity. In particular, the invention is a process for composing and displaying a consolidated message document. The preferred embodiment of the invention is a computer program that configures a general-purpose computer to implement the inventive process. Responsive to a user's selection of a message, the inventive process identifies all related messages that the user has received, inserts the related messages into a consolidated message document, and displays the consolidated message document on the user's output device. The inventive process further comprises the steps of removing duplicate message content, sorting the related messages within the consolidated message document according to user-specified preferences, storing the consolidated message document, and marking the related messages for deletion. | 01-21-2010 |
20100017481 | System and Method for Sectional E-Mail Transmission - A process of segmenting a single email so that portions of it may be directed to or away from select recipients is disclosed. The sender highlights portions of the email and right clicks (or key command, button, or menu item) and selects an option to select recipients. The operator interface then provides the sender with the option of selecting recipients from their address book or the server's address book. To speed the process along, the sender may select those already on the To, Cc, or Bcc distribution lists. The sender then selects whether those chosen will receive the highlighted portion or if they will be excluded from receiving it. Lastly, the sender will have the option of providing text that is unique to each of the selected groups. | 01-21-2010 |
20100057644 | INTERACTIVE DIGITAL VIDEO LIBRARY - A system for increasing user interaction with a digital video library. In response to receiving a question by an interactive digital video library server from a user regarding course material being presented from a digital video library, it is determined whether the question is in an audio format. In response to determining that the question is in an audio format, the question is converted into a text format. The course material is searched in a time sliced video index database for an answer to the question using keywords found in the text format of the question. Also, other course materials similar to the course material are searched in a video knowledge base. A weight is assigned to each search result hit found in the course material and the other course materials. Search result hits are outputted in a priority order according to assigned weight and user preference. | 03-04-2010 |
20100094476 | ENERGY USAGE MONITORING METHOD AND SYSTEM - A monitoring method and system. The method includes monitoring by a monitoring apparatus, a power configuration for electrical devices and a status for power supplier entities. The monitoring apparatus re-balances a power usage for the electrical devices. The monitoring apparatus generates a first report indicating current loads associated with the electrical devices. The monitoring apparatus transmits the first report to the power supplier entities. The monitoring apparatus generates a group of reports indicating power consumption associated with the power supplier entities. The monitoring apparatus transmits each report of the group of reports to an associated power supplier entity of the power supplier entities. The monitoring apparatus generates a second report indicating updated power consumption associated with the power supplier entities. The monitoring apparatus stores the second report. | 04-15-2010 |
20100107047 | PREVENTING NOT FOUND ERROR (404) RESPONSES ON DYNAMICALLY LOADED MISSING IMAGES - A mechanism for determining if images exist before publishing to a web server, and replacing missing images with temporary images for the purpose of providing alternate content while eliminating web server error responses, which prevents needless alerts to site administrators. Upon detecting a modification to a web page, a determination is made as to whether the modification includes a link to an image that does not exist at a location specified by a path in the link to the image. Responsive to a determination that the modification includes a link to an image that does not exist at the location, an image placeholder is created for the image at the location. | 04-29-2010 |
20100107091 | PUBLISHING REQUESTS FOR DYNAMICALLY LOADED MISSING IMAGES - A mechanism for determining if images exist before publishing to a web server, and replacing missing images with temporary images for the purpose of providing alternate content while publishing a request for a replacement image. Upon detecting a modification to a web page, a determination is made as to whether the modification includes a link to an image that does not exist at a location specified by a path in the link to the image. Responsive to a determination that the modification includes a link to an image that does not exist at the location, an image placeholder is created for the image at the location. A request is then published for a replacement image for the image placeholder. Responsive to receiving a replacement image for the image placeholder, the image placeholder is replaced with the replacement image at the location. | 04-29-2010 |
20100177117 | CONTEXTUAL TEMPLATES FOR MODIFYING OBJECTS IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer program product for modifying object styles in a virtual universe. An object is rendered in accordance with a first contextual style template from a plurality of contextual style templates. The first contextual style template comprises first geometric and texture data to display the object with a first style. In response to detecting a set of contextual changes associated with the object, a second contextual style template is identified from the plurality of contextual style templates. The set of contextual changes triggers implementation of the second contextual style template to change the first style of the object to a second style. The object is rendered in accordance with second geometric and texture data in the second contextual style template to form a modified object, wherein the modified object is displayed with the second style. | 07-15-2010 |
20100250118 | PORTABLE NAVIGATION DEVICE POINT OF INTEREST SELECTION BASED ON STORE OPEN PROBABILITY - A probability that a selected point of interest is accessible to customers for commercial transactions is determined. In response to receiving a mailing address of a selected candidate point of interest and a calculated estimated time of arrival, it is determined whether the mailing address of the selected candidate point of interest is stored in a data storage device. In response to determining that the mailing address of the selected candidate point of interest is stored in the data storage device, a percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions at the calculated estimated time of arrival is assigned based on utility usage data and a confidence level associated with the utility usage data stored in the data storage device. The percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions is sent via the network. | 09-30-2010 |
20100250478 | Demo Verification Provisioning - A method, system, and computer program product for issuing an alert when a method of a live demonstration deviates from demonstration simulation actions. A computer receives a command to commence a demonstration simulation. During the demonstration simulation, capture logic of a computer is initialized. The capture logic records events of the demonstration simulation. When a live demonstration subsequently initiated, demonstration verification logic of the computer continually monitors, in real-time, events of the live demonstration and compares the events to the previously recorded events captured during the demonstration simulation. In response to detecting that a live demonstration has deviated from the recorded demonstration simulation method, the demonstration verification logic issues a non-invasive alert. The non-invasive alert may be issued using visual, audible, or vibration feedback cues in such manner that an audience observing the live demonstration is un-aware of the non-invasive alert. | 09-30-2010 |
20100251337 | SELECTIVE DISTRIBUTION OF OBJECTS IN A VIRTUAL UNIVERSE - A method, product, and system are directed to selective distribution of a virtual universe in a virtual universe. In one embodiment, permission is granted to access the virtual universe, whereby a user navigates to a region. Metadata is detected in a user's profile. A virtual universe object is detected in the region. The virtual universe object includes a tag, which includes one or more fields. The tag and the metadata are compared. A level of similarity is detected between the tag and the metadata in the user's profile. Responsive to detecting the level of similarity between the fields included with the tag and the metadata in the user's profile, the virtual universe object is presented to the user. Either an acceptance or a rejection of the virtual universe object is received. Responsive to receiving an acceptance, the virtual universe object is included in the user's inventory. | 09-30-2010 |
20100332285 | Intellectual Property Component Business Model for Client Services - An embodiment of the invention provides a computerized system for providing an IP framework, including a storage component, a user interface, and a reporting module. The storage component includes a collection of database tables having a capability field and keyword field. The database tables include data from a strategic planning computer module, an invent computer module, an IP creation computer module, an IP administration computer module, a defend computer module, an influence computer module, and a capitalize computer module. The user interface receives as input, an invention disclosure and/or a configuration file for an IP capability. The reporting module processes the input in the storage component and produces the IP framework. | 12-30-2010 |
20110003578 | Automatic Wireless Utilization of Cellular Telephone Devices - A system and method for notifying emergency responders, family, and other contact parties of an urgent vehicle condition such as a breakdown or crash, by using a short-range wireless communicator mounted on the vehicle to employ a peer-to-peer communications capability to find and co-opt a nearby long-range communication device, such as a Bluetooth enabled phone, which is not mounted on the vehicle, such as a passer's-by telephone. The invention obtains authorization from the co-opted device to use it as a forwarding proxy, and transmits a notification message to one or more parties, such as emergency dispatchers, family members, etc., via the short-range link to the co-opted device, which then transmits the message to the recipient via the long-range network, such as via a telephone network. | 01-06-2011 |
20110055344 | SYSTEM FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - A system in which an initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the entries in the created distribution list are examined. From this list, features of the entries are identified. From these features, criteria are generated that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 03-03-2011 |
20110113018 | METHOD AND SYSTEM FOR MERGING DISPARATE VIRTUAL UNIVERSES ENTITIES - A migration tool for merging disparate virtual universes by selecting a source region or source account, selecting a destination edge or destination account, retrieving and storing virtual universe information for the source region or account, inserting the virtual universe resources of the source region or account into the destination region or account, activating the inserted resources, and deleting the source resources from the source region or account. | 05-12-2011 |
20110179396 | Method and System for Software Reuse Utilizing Naive Group Annotation of Incomplete Software Descriptions Employing a Self-Reporting Element - Software reuse utilizing naive group annotation of incomplete software descriptions. A software code is decimated whereby the software code's attributes, such as variable, class and method names are obfuscated into non-informative forms. The decimated software code is then presented to two or more participants that include at least one naive and one informed participant. The naive participant(s) poses a predetermined number of question(s) to and receive answer(s) from the informed participant(s). After receiving the answer(s) posed to the informed participant(s), the naive participant(s) proceeds to guess the function of the presented decimated software code. The annotations, i.e., questions and answers, to the decimated software code under review are collected and stored in a database. | 07-21-2011 |
20110279461 | SPAWNING PROJECTED AVATARS IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method and apparatus to project a projected avatar associated with an avatar in a virtual universe. A computer receives a command to project the avatar, the command having a projection point. The computer transmits a request to place a projected avatar at the projection point to a virtual universe host. The computer renders a tab associated with the projected avatar. | 11-17-2011 |
20110289429 | Conversation Persistence in Real-time Collaboration System - Previously conducted conversations in real-time collaboration messages are persistently stored, either by client or a server, and then are associated with conversational items presented to a user (e.g. contact names, topics, etc.). An icon is provided near each listed item, which when selected, displays to the user summaries or titles of all transcripts to which the selected item pertains or relates. The user may select one or more summaries or titles for which the conversation is to be resumed, causing the system to retrieve the stored transcript and resume appending new conversational entries to it, so that the user recovers conversational context effortlessly and accurately. Enhanced versions of the invention include sharing of transcripts so that all participants receive the context of the conversation, and server-side or client-side implementations. | 11-24-2011 |
20120209922 | SMART ATTACHMENT TO ELECTRONIC MESSAGES - Aspects of the present invention associate an unsent electronic message with a target file that is attached to a first stored electronic message. A command to attach a file to the unsent electronic message is received. A list identifying one or more files attached to one or more stored electronic messages is displayed. The target file is one of the one or more files. An input identifying the target file is received. One of the target file and a file that identifies a location of the target file on a storage device is attached to the unsent electronic message. | 08-16-2012 |
20120266088 | CONTEXTUAL TEMPLATES FOR MODIFYING OBJECTS IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer program product for modifying object styles in a virtual universe. An object is rendered in accordance with a first contextual style template from a plurality of contextual style templates. The first contextual style template comprises first geometric and texture data to display the object with a first style. In response to detecting a set of contextual changes associated with the object, a second contextual style template is identified from the plurality of contextual style templates. The set of contextual changes triggers implementation of the second contextual style template to change the first style of the object to a second style. The object is rendered in accordance with second geometric and texture data in the second contextual style template to form a modified object, wherein the modified object is displayed with the second style. | 10-18-2012 |
20120324502 | STREAMING VIDEO WITH ENHANCED OVERLAY POSITIONING - Aspects of the present invention place a second object contained within an overlay atop a first object in a first video stream. Suggested positions at which to place the second object atop the first object are received from a plurality of viewers in a first group of viewers of the first video stream. A consensus position at which to place the second object atop the first object is calculated based on the suggested positions. The second object is placed atop the first object at the consensus position. The first and second objects are transmitted to a second group of viewers of the first video stream after a delay period. | 12-20-2012 |
20120324562 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 12-20-2012 |
20130007166 | PLAYBACK OF INSTANT MESSAGING SESSION HISTORY - Systems, methods and media for playback of instant messaging session history in an instant messaging system by facilitating recording and playback of an instant messaging session history to a user are disclosed. Embodiments may include, during an instant messaging session where one or more instant messaging events occur, determining a timestamp associated with the one or more instant messaging events and recording an indication of the one or more instant messaging events and their associated timestamps. Embodiments may also include receiving one or more playback commands and, in response to the received playback commands, displaying playback of the one or more instant messaging events based on their associated timestamps. The instant messaging events may include one or more of a text message, file transfer, input device movement, or a status indication such as offline, returned from offline, away, returned from away, secure session established, session beginning or session ending. | 01-03-2013 |
20130009972 | SPAWNING PROJECTED AVATARS IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method and apparatus to project a projected avatar associated with an avatar in a virtual universe. A computer receives a command to project the avatar, the command having a projection point. The computer transmits a request to place a projected avatar at the projection point to a virtual universe host. The computer renders a tab associated with the projected avatar. | 01-10-2013 |
20130021950 | Selective Teleconference Interruption - A system and method for controlling a peer-to-peer, unmoderated conference call, which allows a non-talking conferee to send an in-band interrupt request signal which is detected by the conference bridge, which automatically determines which conferee is currently talking, and continuously sends an alert signal to the talking conferee, but prevents transmission of alert signal and interrupt request signal to all other, non-speaking conferees. When the talking conferee quits talking, or acknowledges the interrupt request, or a timeout occurs, alert signal is discontinued, and the request conferee (or another conferee) may speak. Optionally, after a timeout occurs, the voice of the currently speaking conferee is removed from the conference summation, effectively muting the non-yielding conferee. | 01-24-2013 |
20140282383 | Techniques for Providing Environmental Impact Information Associated With Code - A technique for providing environmental impact information associated with code includes determining, based on execution of the code on a computer system, an environmental impact of a code execution sequence included in the code. A section of the code that is associated with the code execution sequence is then annotated with environmental impact information associated with the environmental impact of the code execution sequence. | 09-18-2014 |