Patent application number | Description | Published |
20090275317 | CONNECTING A PHONE CALL TO A MOBILE TELECOMMUNICATION DEVICE BASED ON THE TIME OF DAY THAT THE COMMUNICATION IS INITIATED - A method, system, and computer-readable medium with executable code for connecting an outgoing phone call to a user destination device based on the time the phone call is initiated. A user of a user destination device transmits a policy information packet containing contact numbers of a primary user destination device and all secondary user destination devices that the user may be reached at during specific times of the day to a call originating device. In response to the user of a call originating device initiating a request to connect a phone call to the user destination device, the call originating device autonomously selects the correct recipient user destination device by interpreting the policy information packet. The call originating device then connects the phone call to the primary user destination device or to a secondary user destination device depending on the current time of day. | 11-05-2009 |
20090287777 | OFF-LINE SMARTPHONE FILE SYSTEM SNAPSHOTS - Methods and apparatus, including computer program products, implementing and using techniques for distributing a file by email from a mobile device. An email is composed on the mobile device. A user selection is received of a file to be attached to the email. The selection is made from an off-line snapshot of a remote file system in which the file is located. A link corresponding to the location of the file in the remote file system is embedded into the email. The email with the link is placed in a queue on the mobile device. The email with the file corresponding to the link is sent in response to the remote file system becoming available to the mobile device. | 11-19-2009 |
20090313351 | KEEPING CONVERSATIONS CONFIDENTIAL - Methods and apparatus, including computer program products, implementing and using techniques for keeping confidential records pertaining to selected communications made with a communication device. A user input is received designating one or more contacts with whom communications made with the communication device are to remain confidential. Information about the designated one or more contacts is transmitted to a server which stores records pertaining to communications made with the communication device. A statement is generated for the communications made with the communication device based on information stored on the server. Records pertaining to communications that are to remain confidential are displayed as an alias on the statement. | 12-17-2009 |
20100076802 | Autonomously Rescheduling Appointments - A method, system, and computer program product for autonomously rescheduling a future meeting in response to receiving a meeting cancellation notice of a previously scheduled meeting. A meeting rescheduling logic (MRL) of a server receives a cancellation of a scheduled meeting of an identified contact. The MRL may select a highest priority meeting from a plurality of meetings that has been flagged with an auto-move-up status. The MRL determines if all attendees of the selected meeting are available to attend the meeting at the open time slot of the identified contact's calendar. Upon determining that all attendees of the selected meeting are available at the open time slot, the MRL reschedules the selected meeting at the open time slot, and notifies all attendees. Additionally, the MRL may cancel a lower priority meeting of the attendees to accommodate moving a higher priority meeting into the open time slot. | 03-25-2010 |
20100088291 | METHOD, SYSTEM AND COMPUTER-USABLE MEDIUM FOR EARLY NOTIFICATION OF A PENDING DIGITAL VIDEO RECORDER DELETION EVENT - A method, system and computer-usable medium for early notification of a pending deletion event by a digital playback device. Programs associated with the digital playback device can be scheduled for deletion in advance by a digital playback device interface manually and/or automatically. A deletion event can be notified through a remote delivery by analyzing scheduled recordings and hard drive space if the digital playback device recognizes a recording is close to the deletion event. The notification of the deletion event can be enabled by configuring a number of notification options maintained for each user profile by the digital playback device at a predefined time. The deletion event can be modified through the remote means, which allows a user to send information back to the digital playback device after a deletion notification is received. The deleted files can be moved to a deleted programs folder from which the program can be recovered and the recording can be irrevocably removed after a time period. | 04-08-2010 |
20100092160 | METHOD AND SYSTEM FOR MANAGING MULTIPLE USER LOCKS AND DELETION REQUESTS FOR A DIGITAL VIDEO RECORDER - A method and system for managing multiple user locks and deletion requests on a digital video recorder (DVR) is disclosed. Files associated with the DVR can be protected from deletion by allowing users to lock a recorded file utilizing a number of locking strategies. The recorded file can also be locked by multiple users and the recording can be deleted when the users specifically remove the lock. A simpler interface for each user can be provided to prevent other users from deleting recorded files, which have not yet been viewed. Such an approach allows for an administrative override to prevent users from locking recordings and never unlocking in order to prevent the DVR exhausting disk space. | 04-15-2010 |
20100150208 | METHOD AND APPARATUS FOR CONSERVING TRANSCEIVER POWER - The present invention utilizes radio-frequency identification (“RFID”), which consume a small amount of energy, to allow two transceivers with frequency hopping spread spectrum units to discover each other. A first transceiver may, for example, have a first energy capacity, an RFID transceiver, and a first frequency hopping spread spectrum unit. A second transceiver with a lower energy capacity would then have an active RFID tag and a second frequency hopping spread spectrum unit. | 06-17-2010 |
20100239222 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - Displaying a secondary media stream within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to crop the primary media stream to accommodate a size of the inset definition selected. The primary media stream is cropped to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the cropped primary media stream for user viewing. | 09-23-2010 |
20110010216 | SOFTWARE LICENSE USAGE AMONGST WORKGROUPS USING SOFTWARE USAGE DATA - An approach is provided that receives a message from a first user. The first user's message requests a license to a licensed product that has previously been purchased by the organization. The system identifies current users in the organization that currently have licenses to the licensed product. A need score is calculated that reflects a needs analysis of the first user to the licensed product. Current user need scores are calculated and these need scores correspond to the needs of the current users pertaining to the licensed product. The first user's need score is compared to the current user product need scores and a second user is selected based on the comparison where the first user's need score is better than the second user need score. The second user's license to the licensed product is revoked and the first user is granted a license to the licensed product. | 01-13-2011 |
20110258613 | SOFTWARE DEBUGGER ACTIVATION BASED ON KEY PERFORMANCE INDICATORS - A software debugger is enabled and runs in the background for debugging a computer software program. The target criteria for one or more Key Performance Indicators of interest relating to the program performance are established before the program begins its execution. During execution, the debugger is activated and takes control of the program execution if a Key Performance Indicator meets its established criteria. The execution of the program is paused, and the program enters a debug mode during which an execution state of the program in system memory could be examined and modified. The debugger also provides functions for controlled execution like single-stepping, forwarding and rewinding. A user interface coupled to the debugger allows a user to interact with the debugger and control program execution. | 10-20-2011 |
20110320526 | METHOD FOR CAPTURING AND RECORDING URLS SHARED DURING CORRESPONDENCE - Systems and methods of managing URLs including capturing and recording URLs are presented. A digital processor detects a URL in a communication communicated between a sending-user and a receiving-user. The detected URL is automatically stored in a cache memory specific to the sending-user or receiving-user. The cache memory allows bookmarking of URLs to be avoided and centrally stores the URLs in browser history of the respective user improving his searching efficiency. The cache memory serves as a pre-bookmark incubator or filter. | 12-29-2011 |
20120076291 | Automated call to a contact with whom another form of communication is exchanged - A method of automating a telephone call to a contact with whom a text based electronic communication is exchanged. The method can include, via a processor, receiving from a first electronic messaging client a first identifier corresponding to a first text based electronic communication sent to a user or received by the user, and receiving from a second electronic messaging client a second identifier corresponding to a second text based electronic communication sent to the user or received by the user. Via the processor, a list that identifies at least the first identifier and the second identifier can be presented. Responsive to receiving a user selection of the first identifier or the second identifier, via the processor, a telephone call can be automatically initiated to a telephone number that corresponds to the selected identifier. | 03-29-2012 |
20120077469 | Automated electronic messaging to a person with whom another form of communication is exchanged - A method of, within an electronic messaging client that communicates using a first form of communication, receiving from a user an input identifying a tag that identifies at least one communication session corresponding to a second form of communication. The tag can be processed to identify at least one electronic messaging address associated the person with whom a communication is exchanged during the identified communication session. A recipient identifier field in the electronic messaging client can be automatically populated with the electronic messaging address. The electronic message can be communicated to the person using the electronic messaging address. The electronic messaging address also can be selected from list identifying a plurality of communication sessions corresponding to at least a second form of communication. | 03-29-2012 |
20120131074 | Contact Information Management - A method includes, with a first computing device, receiving contact information for an entity from a connector, the connector being a human operator of a peer computing device that stores a contact information database for contacts of the connector, the contact information being contact information for the entity, where the connector is providing the contact information to put an operator of the first computing device in communication with the entity, after receiving the contact information, receiving a communication with the first computing device from the entity, and in response to receiving the communication from the entity, displaying at least some of the contact information in an introduction tag along with notification of receiving the communication. | 05-24-2012 |
20120158836 | AUTOMATIC DOWNLOAD OF WEB CONTENT IN RESPONSE TO AN EMBEDDED LINK IN AN ELECTRONIC MAIL MESSAGE - A method in a distributed computer system includes a server and a client and is for delivering Web content within a body section of electronic mail messages. The method includes receiving at a server, at least one mail message containing an embedded hyperlink. The method includes downloading Web content associated with the hyperlink into the message store at the server. The method also includes transmitting the mail message and at least one of a link to the Web content downloaded into the message store at the server and the corresponding Web content for display at the client. The method includes determining whether the client has a preset time for downloading messages containing Web content. In response to determining that a preset time for downloading Web content exists, the method includes caching the message and Web content at the server until the preset time is reached. | 06-21-2012 |
20120158881 | Software License Agreement Amongst Workgroups Using Software Usage Data - A license handling information handling system receives an electronic message from a first computer system utilized by a first user. The first user's message requests a license to a licensed product that has previously been purchased by the organization. The license handling information handling system identifies a second user in the organization that currently has a license to the licensed product, and requests that the second user relinquish the license to the licensed product. The second user indicates that the second user's license will be relinquished for a temporary time period. The licensing handling information handling system sends an electronic message, including the temporary time period, to the first user. In response to the first user accepting the temporary time period, the second user's license to the licensed product is revoked, and the first user is granted a license to the licensed product. | 06-21-2012 |
20120260339 | Imposter Prediction Using Historical Interaction Patterns - An approach is provided in which an electronic message is received from a source at a network interface that is accessible from the information handling system. A source address corresponding to the electronic message is identified, wherein the source address also corresponds to a legitimate source. Current usage patterns are extracted from the received electronic message and historical usage patterns are retrieved that correspond to the identified source address. The historical usage patterns being previously gathered from previous messages received from the legitimate source. The extracted current usage patterns and the retrieved historical usage patterns are compared. A user of the system is notified in response to the comparison revealing that the source is an imposter. | 10-11-2012 |
20130036267 | PLACEMENT OF DATA IN SHARDS ON A STORAGE DEVICE - A method, system and computer program product for placing data in shards on a storage device may include determining placement of a data set in one of a plurality of shards on the storage device. Each one of the shards may include a different at least one performance feature. Each different at least one performance feature may correspond to a different at least one predetermined characteristic associated with a particular set of data. The data set is cached in the one of the plurality of shards on the storage device that includes the at least one performance feature corresponding to the at least one predetermined characteristic associated with the data set being cached. | 02-07-2013 |
20130036269 | PLACEMENT OF DATA IN SHARDS ON A STORAGE DEVICE - A method, system and computer program product for placing data in shards on a storage device may include determining placement of a data set in one of a plurality of shards on the storage device. Each one of the shards may include a different at least one performance feature. Each different at least one performance feature may correspond to a different at least one predetermined characteristic associated with a particular set of data. The data set is cached in the one of the plurality of shards on the storage device that includes the at least one performance feature corresponding to the at least one predetermined characteristic associated with the data set being cached. | 02-07-2013 |
20130129322 | OPTIMIZING VIDEO RECORDER POWER USAGE - A method, program product and system are provided for controlling the amount of power consumed by DVR devices in recording and playing broadcast video events. In an exemplary embodiment, upcoming recording requests are compared against a schedule guide for both local and networked DVRs. The system enables a user to make a selection to delay a scheduled recording up to a selected time in the future. The system then reschedules recordings to optimally overlap other scheduled recording to enable optimal usage of DVR tuners for a given period of time based upon the number of tuners in a DVR. In another separate embodiment or in combination with tuner optimization, recording events are rescheduled, within an authorized delay period, to a time when power rates are lower. | 05-23-2013 |
20130132738 | Externally Powered System Access - A method, programmed medium and system are provided for an enhanced interface connection for a primary electronic device such that system storage devices (e.g. hard drives, solid state drives, flash drives, etc.) within the primary device may be made available to other nearby devices in the event of a power supply failure or battery failure or to preserve-battery power in the primary system whereby the data on a storage device within a primary system becomes accessible by external devices, without necessitating the removal of the storage medium or full powering-up of the primary system. | 05-23-2013 |
20130133009 | OPTIMIZING VIDEO RECORDER POWER USAGE FOR DVR NETWORK - A method, program product and system are provided for optimizing recording requests to minimize electricity usage for a network of DVRs. The disclosed methodology analyzes upcoming recording requests against a schedule guide including both local and networked DVRs. Overlaps in requested recordings and broadcasts during same or close proximity time slots are identified. Requested recordings are then rescheduled to optimally overlap recording times based upon the number of tuners in each DVR system. Changes in recording schedules are then communicated to other interconnected DVRs in a network. | 05-23-2013 |
20130198400 | Cognitive Dynamic Allocation in Caching Appliances - An approach is provided in which a caching appliance receives a data packet over a network connection utilizing a network protocol. The caching appliance selects a storage area based upon the network protocol and stores the data packet in the selected storage area. In one embodiment, the caching appliance identifies a service level that corresponds to the network protocol and selects the storage area based upon the identified service level. | 08-01-2013 |
20130208187 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - A secondary media stream is displayed within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to display the primary media stream to accommodate a size of the inset definition selected. The primary media stream is displayed to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the displayed primary media stream for user viewing. | 08-15-2013 |