Patent application number | Description | Published |
20080222084 | DISPLAYING TEXT OF VIDEO IN BROWSERS ON A FRAME BY FRAME BASIS - A method, system, and computer program product for presenting text from multimedia data to a user is provided. In one embodiment, multimedia data containing associated text data is received by a data processing system. The associated text data is extracted from the multimedia data. The associated text data is then outputted without outputting moving images from the multimedia data. | 09-11-2008 |
20080222245 | Client-Server Methods for Dynamic Content Configuration for Microbrowsers - A microbrowser such as web-enabled wireless telephones and personal digital assistants allows a user to configure types of objects to be blocked from download including object memory consumption, display area, download time, and restrictions on animated images and executable scripts. Microbrowser state conditions such as battery level and network connection mode are considered when providing said limitations such that more restrictions may be placed during low battery periods to maximize battery life. For example, during low battery conditions or analog connection mode, a user may configure an enhanced microbrowser not to download advertisements, run scripts or animated objects in order to maximize remaining battery life. In another example, a user may configure an enhanced microbrowser to block the download of objects containing audio, or which will occupy more than a certain percentage of the available display area. | 09-11-2008 |
20080235771 | Method and System For Dynamic Adjustment of Computer Security Based on Network Activity of Users - A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level. | 09-25-2008 |
20080319972 | SHORT PERIOD SEARCH KEYWORD - A search engine provides a registration of short period search terms to provide memorable key words that allow a person to view a specific Web page without having to remember a long and complicated uniform resource locator. A search engine is modified to weight a specific search term to the highest value for a short period of time. A content provider may pay a price to have a memorable search term registered for a period of time. When the search engine receives a search request with the registered search term, the particular page will be placed on top of the search results due to the increased weight. | 12-25-2008 |
20090024706 | GRANULARLY SELECTING A SUBSET OF RECIPIENTS WHO CAN REPLY TO A SENDER'S E-MAIL - A method, system, and computer program product for assigning reply status to an outgoing electronic mail (e-mail) message. While creating an e-mail message, an interface is provided for granularly assigning or denying reply privileges to recipients of an outgoing e-mail message. Reply status is assigned by selecting a subset of recipients by name, e-mail address, and/or e-mail group who may reply to the e-mail. As the recipient's reply status is modified, the outgoing e-mail is updated, revising the reply e-mail address for each recipient. When the recipient is granted reply status, the e-mail address of the original sender is provided as the reply e-mail address. However, in the event the recipient is not granted reply status, the e-mail address of an automated, unmanned e-mail account is provided as the reply e-mail address. | 01-22-2009 |
20090030969 | Method and System for Operating a Rating Server Based on Usage and Download Patterns Within a Peer-To-Peer Network - A method and a system is presented for pruning a peer-to-peer network such that a peer-to-peer search within the peer-to-peer network is initiated beginning with those nodes on which relevant content has previously been found for particular search keywords. For each completed search, a peer node gathers client rating results and then forwards the rating information to a rating server; these results reflect the degree to which searches successfully located content for keywords in a search using particular peer nodes. A rating server maintains a database of results received from nodes. Prior to initiating a new search at a peer node, the peer node consults one or more rating databases to retrieve a set of initial nodes to which the node should initiate the new search in order to maximize the speed and success of finding relevant content. The node then performs the new search using the set of initial nodes. | 01-29-2009 |
20090063476 | Method and Apparatus for Restricting a Fan-Out Search in a Peer-to-Peer Network Based on Accessibility of Nodes - A method, apparatus, and computer implemented instructions for restricting a fan-out type search of a distributed database. A search request is received indicating that a requesting node originating the search request desires to avoid receiving search results including inaccessible nodes. Responsive to receiving the search results from other nodes, the search results are filtered to remove search results from inaccessible nodes to form filtered search results. The filtered search results are passed to the requesting node. | 03-05-2009 |
20090119178 | Dynamic Content Configuration for Microbrowsers by State, Resource Allocation and User Preferences - A microbrowser such as web-enabled wireless telephones and personal digital assistants allows a user to configure types of objects to be blocked from download including object memory consumption, display area, download time, and restrictions on animated images and executable scripts. Microbrowser state conditions such as battery level and network connection mode are considered when providing said limitations such that more restrictions may be placed during low battery periods to maximize battery life. For example, during low battery conditions or analog connection mode, a user may configure an enhanced microbrowser not to download advertisements, run scripts or animated objects in order to maximize remaining battery life. In another example, a user may configure an enhanced microbrowser to block the download of objects containing audio, or which will occupy more than a certain percentage of the available display area. | 05-07-2009 |
20090164911 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR CREATING PARENT/CHILD ENTRIES FOR A CALENDAR EVENT TO ENABLE CUSTOMIZATION FOR CALENDAR-EVENT ATTENDEES - Systems, methods and computer program products for a parent/child approach to calendar-event notices with user-set selective enabling of which child is displayed. Systems, methods and computer program products described herein include a method for generating a notice for a calendar-event, the method including identifying calendar event criteria and attendees for the calendar-event, creating a notice for the calendar-event including parent calendar event criteria, enabling child attachments for the calendar-event notice, setting preferences for the child attachments, creating the child attachment with child calendar event criteria and attaching the child attachment to the calendar-event notice, associating the parent calendar-event criteria with the child calendar-event criteria and selecting which child calendar-event criteria is displayed with the parent calendar-event criteria in response to displaying the parent calendar-event criteria on a computer. | 06-25-2009 |
20090177974 | MULTIPLE PROFILES FOR A USER IN A SYNCHRONOUS CONFERENCING ENVIRONMENT - A method, system, and computer program product for managing multiple profiles in a synchronous conferencing system. A synchronous conferencing account is provided for a first user of the synchronous conferencing system. The synchronous conferencing account includes a plurality of user profiles for the first user. The user profiles identify the first user differently. Each user profile is associated with one or more data fields identifying the first user. The data fields may include any or all of a name, a nickname, a login name, and an avatar. A request from a second user of the synchronous conferencing system to communicate with the first user is received. The request includes an identification of the second user. One of the user profiles is selected based on the identification of the second user. The data fields associated with the selected user profile are transmitted to the second user. | 07-09-2009 |
20090182842 | Method And System For Redirecting Data Requests In Peer-To-Peer Data Networks - A methodology for operating a data sharing application in a peer-to-peer network is presented. After a first peer node receives a request for a copy of a specified file from a second peer node, the first peer node may either return a copy of the specified file or a response message containing an alternate node list associated with the specified file. The alternate node list contains a set of node identifiers indicating a set of alternate peer nodes within the peer-to-peer network that may have a copy of the specified file. The alternate node list is dynamically maintained at each peer node. The response provided by the first peer node, i.e. either a copy of the specified file or the alternate node list, can be determined based on an operational condition of the first peer node, e.g., whether or not the first peer node is experiencing an overload condition. | 07-16-2009 |
20090193494 | MANAGING ACTIONS OF VIRTUAL ACTORS IN A VIRTUAL ENVIRONMENT - A method, system, and computer usable program product for monitoring the actions of a virtual actor are provided in the illustrative embodiments. An interaction of the virtual actor acting in a role is detected. A set of policies is applied to the interaction. The set of policies include an auditing policy. Auditing according to the auditing policy is determined based on the role of the virtual actor. | 07-30-2009 |
20090222255 | USING GENDER ANALYSIS OF NAMES TO ASSIGN AVATARS IN INSTANT MESSAGING APPLICATIONS - A method for displaying gender-based avatar representations of users in instant messaging communications comprises receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender for the first user selected from male, female, and neutral; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account registered with the instant messaging system; and displaying the username for the first user and an avatar representation indicative of the probable gender for the first user in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface. | 09-03-2009 |
20090222526 | USING GENDER ANALYSIS OF NAMES TO ASSIGN AVATARS IN INSTANT MESSAGING APPLICATIONS - A data processing system includes a processor, a memory, and computer readable instructions stored in the memory for execution by the processor to perform a method comprising receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender selected from male, female, and neutral; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account; and displaying the username for the first user and an avatar representation indicative of the probable gender in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface. | 09-03-2009 |
20090254620 | NOTIFYING CO-RECIPIENTS OF OTHERS CURRENTLY REPLYING TO COMMUNICATIONS - A mechanism for notifying co-recipients of a communication that other recipients are currently composing a reply to the received communication is provided. The notification may be provided regardless of which type of communication application is being used to reply to the communication. With this mechanism, attribute information for a communication currently being composed on a client communication device using one of a plurality of different communication types is obtained. The attribute information may include an identifier of a communication type currently being used to compose the communication. A previously distributed communication related to the communication currently being composed is identified and one or more recipients of the previously distributed communication are identified. A notification message is sent to one or more communication devices associated with the one or more recipients of the previously distributed communication. The notification message may identify a communication type currently being used to compose the communication. | 10-08-2009 |
20090271714 | IDENTIFYING MUTUAL FRIENDS IN ONLINE ENVIRONMENTS - The invention described herein detects an external user entering into a virtual world that includes a virtual area. In turn, the invention described herein identifies a plurality of joined users that joined each virtual area and computes a joined user weighting for each of the plurality of joined users. The joined user weightings include friend of a friend level weightings and commonality weightings. Next, the invention described herein computes a virtual area friendliness level for each of the virtual areas by aggregating each of the joined user weightings for each of the virtual areas, and provides the virtual area friendliness levels to the external user in order for the external user to select the appropriate virtual area. | 10-29-2009 |
20090308928 | SYSTEM TO IMPROVE COMMUNICATION USING A LASER BAR CODE SCANNER AND ASSOCIATED METHODS - A system to improve communication may include a laser barcode scanner to generate a laser-light to read barcodes. The system may also include a controller to determine a state of operation of the laser barcode scanner. The system may further include a projection unit to provide the laser-light as human understandable information based upon the controller's determination. | 12-17-2009 |
20100070863 | METHOD FOR READING A SCREEN - The present disclosure is directed to a method for reading a computer screen having a set of information and a button for submitting the set of information. The method may comprise collecting the set of information; determining a set of representative information, wherein the set of representative information is a subset of the set of information; concatenating the set of representative information to form a summarized context; associating the summarized context with the button; and producing audible sound reciting the summarized context when the button receives focus from a computer mouse. | 03-18-2010 |
20110161437 | ACTION-BASED E-MAIL MESSAGE QUOTA MONITORING - E-mail applications can be extended to allow recipients to specify quotas indicating maximum numbers of e-mail messages from specific senders based on actions indicated for the recipients to take. A sender can set a quota specifying that no more than five action related e-mail messages should be sent by each sender per week. Quotas may also be set for a number of e-mail messages received that do not require action. Recipient quota information is accessible by senders' e-mail applications so that senders are aware of the quotas before sending an e-mail message. After determining recipients for an e-mail message, an e-mail application can determine quotas for the recipients based on an action indicated in the e-mail message for the sender. The e-mail application can determine if the e-mail message to be sent will approach or reach the quota, and display a notification before the sender sends the e-mail message. | 06-30-2011 |
20120047238 | Client-Server Methods for Dynamic Content Configuration for Microbrewers - A microbrowser such as web-enabled wireless telephones and personal digital assistants allows a user to configure types of objects to be blocked from download including object memory consumption, display area, download time, and restrictions on animated images and executable scripts. Microbrowser state conditions such as battery level and network connection mode are considered when providing said limitations such that more restrictions may be placed during low battery periods to maximize battery life. For example, during low battery conditions or analog connection mode, a user may configure an enhanced microbrowser not to download advertisements, run scripts or animated objects in order to maximize remaining battery life. In another example, a user may configure an enhanced microbrowser to block the download of objects containing audio, or which will occupy more than a certain percentage of the available display area. | 02-23-2012 |
20120179465 | REAL TIME GENERATION OF AUDIO CONTENT SUMMARIES - Audio content is converted to text using speech recognition software. The text is then associated with a distinct voice or a generic placeholder label if no distinction can be made. From the text and voice information, a word cloud is generated based on key words and key speakers. A visualization of the cloud displays as it is being created. Words grow in size in relation to their dominance. When it is determined that the predominant words or speakers have changed, the word cloud is complete. That word cloud continues to be displayed statically and a new word cloud display begins based upon a new set of predominant words or a new predominant speaker or set of speakers. This process may continue until the meeting is concluded. At the end of the meeting, the completed visualization may be saved to a storage device, sent to selected individuals, removed, or any combination of the preceding. | 07-12-2012 |
20140114710 | GATHERING AND MINING DATA ACROSS A VARYING AND SIMILAR GROUP AND INVOKING ACTIONS - A system includes a distribution center for scanning mail intended for and received from clients in a community. The mail scanned for generating sender, recipient, type, and arrival data. Category data is generated and includes a payables category, a donation category, and a printed matter category. Client preferences data is also generated. The data is mined to find commonalities of mail sent to and received from clients. An action is invoked based on the mined data and it is determined that the action is a payables, donation, or printed matter action. If the action is either a payables or donation action then, a client and a third party are notified prior to execution of the action. If the action is a printed matter action then, then a printed matter shared by more than one client is presented for sharing. | 04-24-2014 |
20140115772 | SHOWER HEAD CONTROLLER - An apparatus includes a sensor module, a transmission module, a flow reduction module, and a flow return module. The sensor module senses presence of a shower item on a shelf in a shower and senses a lack of presence of the shower item on the shelf. The transmission module wirelessly transmits an item missing signal. The item missing signal is transmitted in response to sensing a lack of presence of the shower item on the shelf. The flow reduction module reduces water flow to a shower head in the shower from a first flow level to a reduced flow level in response to wirelessly receiving the item missing signal. The flow return module returns water flow to the first flow level in response to expiration of a restore time delay or wirelessly receiving an item return signal in response to sensing a presence of the shower item on the shelf. | 05-01-2014 |
20140350930 | Real Time Generation of Audio Content Summaries - Audio content is converted to text using speech recognition software. The text is then associated with a distinct voice or a generic placeholder label if no distinction can be made. From the text and voice information, a word cloud is generated based on key words and key speakers. A visualization of the cloud displays as it is being created. Words grow in size in relation to their dominance. When it is determined that the predominant words or speakers have changed, the word cloud is complete. That word cloud continues to be displayed statically and a new word cloud display begins based upon a new set of predominant words or a new predominant speaker or set of speakers. This process may continue until the meeting is concluded. At the end of the meeting, the completed visualization may be saved to a storage device, sent to selected individuals, removed, or any combination of the preceding. | 11-27-2014 |
20150074189 | Gathering Participants for Meetings - Participants for an in-progress meeting are gathered, preferably by broadcast of instant messaging notifications thereto. Information for people who are invited to a scheduled meeting but are not participating when the meeting begins, as well as for one or more additional people who are mentioned by the current participants of the meeting as desired new invitees to the in-progress meeting, is placed on a participant list. A disambiguation process may be used in cases where it is not clear who was intended in the discussion of a new invitee. Responses to the notifications are collected and used to populate a consolidated joining status window, where this joining status window depicts the joining status of persons on the participant list. | 03-12-2015 |