Patent application number | Description | Published |
20080222043 | SYSTEM AND METHOD FOR TRANS-VENDOR LICENSE REGISTRATION AND RECOVERY - Computer implemented method, system and computer usable program code for recovering application software in a data processing system. A computer implemented method for recovering application software in a data processing system includes receiving user data and application data from a plurality of users over a computer network, wherein the application data relates to application software of the plurality of users and includes application license data for applications that include a license. The received user data and application data are stored. A request is received over the computer network from a user of the plurality of users to recover application software of the user, and the requested application software is provided to the user over the computer network, wherein the provided application software is enabled and configured based on the user data and application data related to the provided application software. | 09-11-2008 |
20080229227 | Methods and Apparatus for Implementing an Integrated User Interface for Managing Multiple Virtual Machines Operative in a Computing System - The present invention concerns methods and apparatus for managing multiple virtual machines simultaneously operative in a computing environment. The methods and apparatus of the present invention provide an integrated work environment—for example, a desktop—which incorporates graphical and control elements from multiple virtual machines. In embodiments of the present invention, application programs and resources available in multiple virtual machines can be accessed from a single desktop. Methods and apparatus of the present invention provide visual cues for associating control elements and resources with particular virtual machines. In embodiments of the present invention, multiple virtual machines operative in a computing environment can comprise a plurality of collaborative virtual machines, or a private virtual machine and one or more collaborative virtual machines. | 09-18-2008 |
20080235330 | Method and Apparatus for Utilizing Portable E-Mail Addresses - A signal bearing medium tangibly embodies a program of machine-readable instructions executable by a digital processing apparatus to perform operations comprising receiving an email message having an extended email address encoded virtual address, resolving said address to an actual email address, replacing the virtual address with the actual email address, and transmitting said email message. | 09-25-2008 |
20080235678 | Methods and Apparatus for Patching Software in Accordance with Instituted Patching Policies - The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. In still further circumstances, a particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system. | 09-25-2008 |
20080235806 | Methods and Apparatus for Implementing Context-Dependent File Security - The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file. | 09-25-2008 |
20080320135 | METHOD AND SYSTEM FOR ESTABLISHING NETWORK CONNECTIONS - A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network. | 12-25-2008 |
20090210885 | SYSTEM & METHOD FOR CONTROLLING THE DISPOSITION OF COMPUTER-BASED OBJECTS - A secure object manager obtains, from an authorized person, a specification for disposition of at least one object, and creates first instructions, pertaining to the disposition, for a remote secure-object agent on a remote system. A copy of the object and the first instructions are sent to a remote secure-object agent on a remote system, which controls the copy based on the first instructions. | 08-20-2009 |
20090307041 | Methods and apparatus for interactive specification of context-sensitive service level agreements; for provisioning of resources required during service delivery events regulated by service level agreements; and for monitoring compliance with service level agreements during service delivery events - In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event. In instances where a given service delivery does not comply with service level attributes specified in a controlling service level agreement, the methods and apparatus of the present invention take corrective action. | 12-10-2009 |
20090307335 | Methods and apparatus for interactive specification of context-sensitive service level agreements; for provisioning of resources required during service delivery events regulated by service level agreements; and for monitoring compliance with service Level agreements during service delivery events - In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event. In instances where a given service delivery does not comply with service level attributes specified in a controlling service level agreement, the methods and apparatus of the present invention take corrective action. | 12-10-2009 |
20100293258 | DYNAMIC OPTIMIZATION OF MOBILE SERVICES - A method, system, and article of manufacture are disclosed for transforming a service process definition. This service process definition is comprised of computer readable code. The method comprises the steps of expressing a given set of assumptions in a computer readable code; and transforming said process definition by using a processing unit to apply said assumptions to said process definition to change the configuration of the process definition. The process definition may be transformed by using factors relating to the specific context in or for which the process definition is executed. Also, the process definition may be transformed by identifying, in a flow diagram for the service process definition, flows to which the assumptions apply, and applying program rewriting techniques to those identified flows. | 11-18-2010 |
20120176232 | PREVENTION OF TEXTING WHILE OPERATING A MOTOR VEHICLE - A system and method includes sensors configured to measure conditions of a vehicle. A monitoring module is configured to evaluate the conditions input thereto from the sensors. The monitoring module is further configured to determine a state of a mobile device located within the vehicle. Based upon a combination of the conditions of the vehicle and the state of the mobile device, a determination of improper use of the mobile device is made. | 07-12-2012 |
20120176235 | MOBILE COMPUTING DEVICE EMERGENCY WARNING SYSTEM AND METHOD - A warning system and method include a memory device configured to store one or more condition criteria. A monitoring device is configured to monitor a status of the one or more condition criteria. The monitoring device is triggered by a triggering event related to the status to generate a warning signal responsive to the triggering event. A mobile computing device is configured to communicate with the monitoring device and an external network to receive the warning signal and output a warning message on the external network to one or more designated entities. | 07-12-2012 |
20120226898 | Apparatus And Methods For Activity-Based Management Of Computer Systems - Apparatus and methods are disclosed for performing computer system management on an activity basis. In one embodiment, computer-system-related items are associated with at least one activity to be performed using the computer system. Then, management procedures are established for the at least one activity. Next, when the computer system is used to perform the at least one activity, the computer-system-related items associated with the at least one activity are managed in accordance with the management procedures established for the at least one activity. In another embodiment, apparatus and methods monitor patterns of use of a computer system. Using information gathered during monitoring operations, activity models are formulated, and for each activity model a management plan is devised. After management plans have been devised for each activity model, the use of the computer system is monitored to identify actions being performed with the computer system. The identified actions are then compared with the activity models to determine which activity model best fits the identified actions. Management of computer-system-related items associated with the activity is then performed using the management plan associated with the activity model that best fits the actions being performed with the computer system. | 09-06-2012 |
20120233336 | Situation-Driven Spontaneous Networking - In an exemplary embodiment, a method is disclosed that includes, in an electronic device, forming a hypothesis that a situation exists based on one or more situation definitions and data from one or more sensors accessible by the electronic device. The method includes searching for other electronic devices via one or more network interfaces in the electronic device and establishing a network with one or more other electronic devices found during the searching. The method also includes receiving information from the one or more other electronic devices, the information corresponding to the situation. The method further includes, based at least on the information, modifying the hypothesis that the situation exists. Apparatus and computer readable memory media are also disclosed. | 09-13-2012 |
20120293547 | Management Of Access To And Life Cycles Of Virtual Signs - Many different methods, apparatus, and program products are disclosed for handling virtual signs over their life cycles. Potential future locations and headings of a mobile device are used to fetch virtual signs in advance of when the virtual signs might be used. Techniques are disclosed for handling timelines of virtual signs, including registering and responding to events in the timelines. Techniques are disclosed for allowing localities to license virtual signs. Techniques are disclosed to allow advertisers to bid for and win virtual sign competitions and product placement. Techniques are presented for presenting billing information to owners of virtual signs. | 11-22-2012 |
20120326855 | PREVENTION OF TEXTING WHILE OPERATING A MOTOR VEHICLE - A system and method includes sensors configured to measure conditions of a vehicle. A monitoring module is configured to evaluate the conditions input thereto from the sensors. The monitoring module is further configured to determine a state of a mobile device located within the vehicle. Based upon a combination of the conditions of the vehicle and the state of the mobile device, a determination of improper use of the mobile device is made. | 12-27-2012 |
20120326860 | MOBILE COMPUTING DEVICE EMERGENCY WARNING SYSTEM AND METHOD - A warning system and method include a memory device configured to store one or more condition criteria. A monitoring device is configured to monitor a status of the one or more condition criteria. The monitoring device is triggered by a triggering event related to the status to generate a warning signal responsive to the triggering event. A mobile computing device is configured to communicate with the monitoring device and an external network to receive the warning signal and output a warning message on the external network to one or more designated entities. | 12-27-2012 |
20120329443 | DYNAMIC OPTIMIZATION OF MOBILE SERVICES - A method, system, and article of manufacture are disclosed for transforming a service process definition. This service process definition is comprised of computer readable code. The method comprises the steps of expressing a given set of assumptions in a computer readable code; and transforming said process definition by using a processing unit to apply said assumptions to said process definition to change the configuration of the process definition. The process definition may be transformed by using factors relating to the specific context in or for which the process definition is executed. Also, the process definition may be transformed by identifying, in a flow diagram for the service process definition, flows to which the assumptions apply, and applying program rewriting techniques to those identified flows. | 12-27-2012 |
20140082171 | REMEDIATING EVENTS USING BEHAVIORS - Remediating events of components using behaviors via an administrator system and an administrator client. The administrator system receives an event from a component of an information technology (IT) environment. A behavior is determined at least partly from the event. The behavior is determined to be an anomalous behavior at least partly from a group of previously received events. A coefficient is calculated, via a calculation, for the anomalous behavior at least partly from a weight. The administrator system sends a description of the anomalous behavior and a group of options to the administrator client. The description is at least partly based on the calculation. The administrator system receives a severity indication from the administrator client. The weight, the calculation, and the description are updated based on the severity indication. | 03-20-2014 |
20140082407 | REMEDIATING EVENTS USING BEHAVIORS - Remediating events of components using behaviors via an administrator system and an administrator client. The administrator system receives an event from a component of an information technology (IT) environment. A behavior is determined at least partly from the event. The behavior is determined to be an anomalous behavior at least partly from a group of previously received events. A coefficient is calculated, via a calculation, for the anomalous behavior at least partly from a weight. The administrator system sends a description of the anomalous behavior and a group of options to the administrator client. The description is at least partly based on the calculation. The administrator system receives a severity indication from the administrator client. The weight, the calculation, and the description are updated based on the severity indication. | 03-20-2014 |