Patent application number | Description | Published |
20090006561 | METHOD OF AND SYSTEM FOR RETRACTING INSTANT MESSAGES - A method of and system for enabling retraction of instant messages detects a command to send an instant message from an instant message window. The system determines if the command is the first command sent from the instant message window after the window has received focus. If so, the system delays the execution of the command for a delay time according to a retraction policy, and provides a retraction control for canceling said command. The system cancels the command in response to actuation of the retraction control. The system may cancel the instant message in response to actuation of the retraction control. The system sends the instant message in response to expiration of the delay time without an actuation of the retraction control. The system may provide a control for sending the instant message before expiration of the delay time. The retraction policy may provide different delay times for different categories of recipients. The delay time may be zero for certain categories of recipients. The retraction policy may be configurable by a user. | 01-01-2009 |
20090024916 | Seamless Asynchronous Updates of Dynamic Content - A master web page is partitioned into multiple partitions to create a partitioned web page. Each of the multiple partitions is correlated with a corresponding partition cache in a browser. The browser polls a web server for any invalidation event, wherein the invalidation event changes a content of an invalid partition from the multiple defined partitions. In response to the polling detecting the invalidation event, an identifier of the invalid partition is sent to the browser. Utilizing the identifier, a request is sent for new content that will update the invalid partition. This new content is sent to the browser, which updates the invalid partition with the new content, thus updating the partitioned web page without affecting the other partitions of the partition web page. | 01-22-2009 |
20090048845 | APPARATUS, SYSTEM, AND METHOD FOR VOICE CHAT TRANSCRIPTION - An apparatus, system, and method to transcribe a voice chat session initiated from a text chat session. The system includes a chat server, a voice server, and a transcription engine. The chat server is configured to facilitate a text chat session between multiple instant messaging clients. The voice server is coupled to the chat server and configured to facilitate a transition from the text chat session to a voice chat session between the multiple instant messaging clients. The transcription engine is coupled to the voice server and configured to generate a voice transcription of the voice chat session. The voice transcription may be aggregated into a text chat history. | 02-19-2009 |
20090083134 | Adaptive Advertising Based On Social Networking Preferences - A method of providing targeted advertising includes an electronic commerce site that receives a request from a user for a webpage. The electronic commerce site determines an identifier, such as email address, for the user. The electronic commerce site encodes the identifier in a request, such as a universal resource locater (URL), associated with an advertisement. The electronic commerce site embeds the advertisement in the requested webpage and sends the webpage to the user. When an advertising service receives the URL from the user, the advertising service sends a query to a social networking site. The query includes the identifier. Upon receiving preference information for the user from the social networking site in response to query, the advertising service uses the preference information to determine products of interest to the user. The advertising service sends a webpage to the user. The webpage from the advertising service includes information on the products of interest. | 03-26-2009 |
20090138520 | Maintaining and Replicating Chat Histories - A consolidated instant messaging message history is maintained at a selected point of presence. Non-selected instant messaging points of presence include instant messaging messages that were transmitted during one or more instant messaging sessions conducted between the non-selected instant messaging points of presence and one or more instant messaging participants. The selected instant messaging point of presence retrieves instant messaging messages included at the non-selected instant messaging points of presence. The retrieved messages are stored on a storage device accessible to the selected instant messaging point of presence in a consolidated instant messaging chat history. | 05-28-2009 |
20090287836 | AJAX PROXY INDIRECTION FOR EXTERNAL DOMAIN REQUESTS - An Ajax proxy indirection technique enables a local, front-end proxy server to handle Ajax requests from an Ajax client that must be serviced by an external Ajax server in an external domain, instead of a local Ajax back-end server exposing itself to the external domain. The front-end proxy server accepts the Ajax client's request and forwards it to the local Ajax back-end server. The proxy server asks the local AJAX server for the credentials to be used in the “external” AJAX request. The local Ajax back-end server then responds to the proxy server with meta-data for the external domain request that the proxy will make to the external domain. The proxy server uses the credentials of the “external” AJAX request to make the external request to the external Ajax server in the external domain. The proxy server performs any authentication and necessary domain mapping with the external Ajax server before sending a response from the external Ajax server back to the client. | 11-19-2009 |
20100005266 | Technique for estimating the size of an in-memory cache - This Sampling Object Cache System (“SOCS”) estimates the size of an in-memory heap-based object cache without the need to serialize every object within the cache. SOCS samples objects at a user-determined rate and then computes a “sample size average” for each type of class-whether a top class, type of top class or non top class. Using these sample size averages, a statistically accurate measure of the overall size of the cache is calculated by adding together the total size of the objects in the cache for each class type. | 01-07-2010 |
20100058467 | EFFICIENCY OF ACTIVE CONTENT FILTERING USING CACHED RULESET METADATA - A start offset and an end offset can be identified within unfiltered content that is to be filtered. This unfiltered content can include HTML content. A corresponding start offset and an end offset of the unfiltered content can be matched against a set of content objects contained in a content cache. Each of the content objects can be associated with rule metadata. At least one filter rule can be extracted from metadata of a matching cache object. A programmatic action can be performed based upon the extracted filter rule. Computer readable output can result from the programmatic action. The output can include content that has been filtered in accordance with the extracted filter rule. | 03-04-2010 |
20100077029 | SYSTEM AND METHOD FOR INTELLIGENT MULTI-PERSON CHAT HISTORY INJECTION - A method, system, and program is provided for automatically searching and injecting a multi-person chat history into a chat session, and allowing users to inject a multi-person chat history into a new chat session. | 03-25-2010 |
20100250706 | SELECTIVE PARTIAL UPDATES OF WEB CONTENT - A request for a partial update of web content is received that identifies at least one web content element associated with the web content. An update is requested for the identified at least one web content element from a content server. The partial update of the web content is performed in response to receipt of the update for the identified at least one web content element from the content server. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 09-30-2010 |
20110258622 | PLUGGABLE ACTIVATION ENGINE EXTENSIONS VIA VIRTUAL DISKS - A computer-implemented method, system and/or computer program product configure an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use. | 10-20-2011 |
20110306395 | Method, System and Computer Program Product for Creating Custom Tutorials Based on Interactive Gameplay - The present invention provides a method, system, and program product for creating a custom tutorial comprising the controller inputs associated with the controller manipulations that cause an action observed by a player during game play. Controller inputs are saved during game play. In response to a first player performing an action to create a tutorial, controller inputs from a tagged player are captured. A custom tutorial is created for performing game actions performed by the tagged player's avatar comprising the captured controller inputs. The tutorial is sent to a memory device accessible by the first player. | 12-15-2011 |
20110312424 | Peer to Peer Video Game Clip Sharing - The present invention provides a method, system, and program product for automatically sharing video clips of video game action. A video capture application sets game action triggers for video clip capture. The video sharing application automatically captures a video clip during a video game in response to triggering actions during playing of a game. The video sharing application automatically tags recipients. Then, the video sharing application automatically sends the captured video clip to the tagged recipients. | 12-22-2011 |
20110314046 | MULTI-SOURCE ELECTRONIC FORMS WITH CONCEALED FIELDS - Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or more user, and selectively displaying the population data to each user. The population data may be displayed to the various users based on the security authorization of the user seeing the form. Upon completion of the form by the users, the form may be further completed and submitted for processing or approval. | 12-22-2011 |
20110314217 | ESTIMATING THE SIZE OF AN IN-MEMORY CACHE - This Sampling Object Cache System (“SOCS”) estimates the size of an in-memory heap-based object cache without the need to serialize every object within the cache. SOCS samples objects at a user-determined rate and then computes a “sample size average” for each type of class—whether a top class, type of top class or non top class. Using these sample size averages, a statistically accurate measure of the overall size of the cache is calculated by adding together the total size of the objects in the cache for each class type. | 12-22-2011 |
20120042264 | CONFIGURING A POLICY FOR SHARING BROWSER HISTORY - A browser history is shared with peers in a social network by configuring a policy. What websites and what members are to be shared are defined in the policy. A history of the usage of the links to the defined websites by the defined members is gathered. The browser histories are published to a social networking service. The links are displayed to the user with a representation identifying the usage by the members. | 02-16-2012 |
20120047449 | INTEGRATING A USER BROWSING FEED INTO A CO-BROWSING SESSION - A method for integrating a user browsing feed into a co-browsing session may include allowing a computing device of a user in a co-browsing session to independently navigate a network from each other user in the co-browsing session. The method may also provide an indication of content being viewed by each other user in the co-browsing session on the computing device of the user. | 02-23-2012 |
20120099482 | APPLICATION-SPECIFIC CHARGEBACK OF CONTENT CACHED AT THE WIRELESS TOWER - A method for application-specific chargeback of content cached at a wireless tower of a RAN includes receiving a request for content from an end user device in a base station of a RAN and routing the request to an application in a packet switched data communications network from the base station by way of a CN. Content from the application can be received in the base station within a response to the request, the response can be cached in a local cache of the base station in connection with the application and the response can be forwarded to the end user device. Subsequently, in response to a new request for the content received in the base station, the content can be served in a response from the local cache. Further, an identity of the application can be transmitted to a remote charging service external to the base station but within the RAN for charging the application in consequence of having served the content from the local cache of the base station. | 04-26-2012 |
20120110472 | PERSISTING ANNOTATIONS WITHIN A COBROWSING SESSION - A request to navigate to a Uniform Resource Identifier (URI) can be received within a cobrowsing session. The cobrowsing session can be associated with a unique session identifier of a cobrowsing application. The cobrowsing application can be part of a collaboration software. An annotation previously associated with the URI from a historic cobrowsing session can be retrieved. Content associated with the URI can be obtained and presented within an interface associated with the cobrowsing session. The annotation can be presented within the content associated with the URI of the interface. | 05-03-2012 |
20120159305 | PERSISTING ANNOTATIONS WITHIN A COBROWSING SESSION - A request to navigate to a Uniform Resource Identifier (URI) can be received within a cobrowsing session. The cobrowsing session can be associated with a unique session identifier of a cobrowsing application. The cobrowsing application can be part of a collaboration software. An annotation previously associated with the URI from a historic cobrowsing session can be retrieved. Content associated with the URI can be obtained and presented within an interface associated with the cobrowsing session. The annotation can be presented within the content associated with the URI of the interface. | 06-21-2012 |
20120165036 | LOCATION BASED WIRELESS TOWER CACHING - Embodiments of the present invention provide a method, system and computer program product for wireless tower caching. In an embodiment of the invention, a method for wireless tower caching in a radio access network (RAN) can include receiving a response to a request from an end user device wirelessly coupled to a base station of the RAN, determining geographic positioning data for the response and identifying a most geographically wireless tower coupled to the RAN relative to the determined geographic positioning data (such as the closest wireless tower to the determined geographic positioning data). Thereafter, the response can be cached at a cache in a base station of the identified wireless tower. In this way, the cached content can remain relevant for a significant period of time in as much as the correlation between a likely position of the end user device and the content cached at the base station of the wireless tower at the time of use of the cached content is strong. | 06-28-2012 |
20120167093 | WEATHER ADAPTIVE ENVIRONMENTALLY HARDENED APPLIANCES - Embodiments of the present invention provide a method, system and computer program product for weather adaptive environmentally hardened appliances. In an embodiment of the invention, a method for weather adaptation of an environmentally hardened computing appliance includes determining a location of an environmentally hardened computing appliance. Thereafter, a weather forecast including a temperature forecast can be retrieved for a block of time at the location. As a result, a cache policy for a cache of the environmentally hardened computing appliance can be adjusted to account for the weather forecast. | 06-28-2012 |
20120173990 | MULTI-SOURCE ELECTRONIC FORMS WITH CONCEALED FIELDS - Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or more user, and selectively displaying the population data to each user. The population data may be displayed to the various users based on the security authorization of the user seeing the form. Upon completion of the form by the users, the form may be further completed and submitted for processing or approval. | 07-05-2012 |
20120174100 | PLUGGABLE ACTIVATION ENGINE EXTENSIONS VIA VIRTUAL DISKS - A computer-implemented method configures an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use. | 07-05-2012 |
20120203820 | PREDICTING WORKLOAD BY PER LOOK BASED DATA - Provided are techniques to track a user's attention with respect to elements displayed on a computer screen, correlate the elements to resources and pre-fetch the resources prior to a user request to access the resource. Data storage is allocated for the fetching of content that the user is anticipated to access and a business is notified of a user's interest in an advertisement so that the business may make purchasing, warehousing and shipping decisions. | 08-09-2012 |
20120214514 | LOCATION BASED WIRELESS TOWER CACHING - Embodiments of the present invention provide a method, system and computer program product for wireless tower caching. In an embodiment of the invention, a method for wireless tower caching in a radio access network (RAN) can include receiving a response to a request from an end user device wirelessly coupled to a base station of the RAN, determining geographic positioning data for the response and identifying a most geographically wireless tower coupled to the RAN relative to the determined geographic positioning data (such as the closest wireless tower to the determined geographic positioning data). Thereafter, the response can be cached at a cache in a base station of the identified wireless tower. | 08-23-2012 |
20120244934 | INTELLIGENT SCREEN SELECTION - Provided are technologies for the distribution of signals corresponding to players in a multi-player game situation to be distributed of appropriate video displays. Frames of a video signal are mapped to corresponding game controllers and the game controllers are mapped to display devices. Frames are then routed to an appropriate video display on a corresponding display device. | 09-27-2012 |
20120244935 | SYNCHRONIZING GAME CHARACTER DISPLAY WITH GAME PLAYER VIEWING DETECTION - Provided is a device for the display of the perspective associated with selected characters on a video display. A single player may be associated with multiple characters within the game, i.e. one player may be responsible for controlling multiple players. The disclosed technology modifies the displayed image so that the player views the game from the perspective of a particular game character determined by the eye gaze focus of the player. | 09-27-2012 |
20120284611 | SELECTIVE PARTIAL UPDATES OF WEB CONTENT - A request for a partial update of web content is received that identifies at least one web content element associated with the web content. An update is requested for the identified at least one web content element from a content server. The partial update of the web content is performed in response to receipt of the update for the identified at least one web content element from the content server. | 11-08-2012 |
20120297006 | MULTI-DOMAIN CO-BROWSING UTILIZING LOCALIZED STATE MANAGEMENT - A master and a slave computing device within a co-browsing session can be identified. The devices can be associated with a first Unified Resource Identifier (URI) where a portion of the URI is a fully qualified domain name of a Domain Name System (DNS) hierarchy. The devices can be associated with a co-browsing application. A request associated with a second URI from the master computing device can be detected. The second URI can share a root domain with the first URI. A portion of a master artifact associated with the master device can be conveyed to the slave device. The master artifact can be associated with state information of the session. A portion of a slave artifact linked to the slave device can be modified with the portion of the master artifact. The devices can be navigated to the second URI in response to the request. | 11-22-2012 |
20120297007 | MULTI-DOMAIN CO-BROWSING UTILIZING LOCALIZED STATE MANAGEMENT - A master and a slave computing device within a co-browsing session can be identified. The devices can be associated with a first Unified Resource Identifier (URI) where a portion of the URI is a fully qualified domain name of a Domain Name System (DNS) hierarchy. The devices can be associated with a co-browsing application. A request associated with a second URI from the master computing device can be detected. The second URI can share a root domain with the first URI. A portion of a master artifact associated with the master device can be conveyed to the slave device. The master artifact can be associated with state information of the session. A portion of a slave artifact linked to the slave device can be modified with the portion of the master artifact. The devices can be navigated to the second URI in response to the request. | 11-22-2012 |
20120297368 | Fake Check-In Entries Posted on Behalf of Social Network Users - An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application. | 11-22-2012 |
20130132483 | Fake Check-In Entries Posted on Behalf of Social Network Users - An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application. | 05-23-2013 |
20130185284 | GROUPING SEARCH RESULTS INTO A PROFILE PAGE - Methods are disclosed for grouping search results into a profile page. A search engine accepts a user search string and generates a first set of results. In response to the first set of results, a query generator generates queries corresponding to a number of entities sharing a common name. The search engine executes the queries, returning responsive data sets. An entity resolver merges the data sets to ensure that each unique entity is represented by a single data set. A threshold may be defined such that results meeting a certain level of similarity are merged. A profile generator creates a profile page for each unique entity using biographical data contained in the respective data sets, and generates a results page containing links to each unique profile. The results page is then sent to the user for display on a graphical user interface. | 07-18-2013 |
20130191464 | BUSINESS-TO-BUSINESS SOCIAL NETWORK - Systems and methods for providing a social network. The methods involve: creating a relationship between a first entity and a second entity; setting authorization which indicates that a user of said first entity is authorized to view inventory data of said second entity; receiving a request to view first inventory data of said first entity and second inventory data of said second entity by said user; and determining whether said user is authorized to view said second inventory data. If said user is authorized: querying a first remote inventory management system of said first entity for said first inventory data and a second remote inventory management system of said second entity for said second inventory data; receiving said first and second inventory data; generating an aggregate view comprising said first and second inventory data; and providing content of said aggregate view to a client computing device of said first entity. | 07-25-2013 |
20130212039 | REVIEW TIMELINE FOR OWNERSHIP LIFECYCLE EXPERIENCE - A consumer review system, including: a review interface presented on a display device; and a timeline in the review interface, wherein the timeline includes an aggregate set of user reviews corresponding to a product or a service, wherein the review interface is configured to organize the user reviews in the timeline by event date according to a lifecycle of the product or the service for each user. | 08-15-2013 |
20130246416 | GROUPING SEARCH RESULTS INTO A PROFILE PAGE - Methods are disclosed for grouping search results into a profile page. A search engine accepts a user search string and generates a first set of results. In response to the first set of results, a query generator generates queries corresponding to a number of entities sharing a common name. The search engine executes the queries, returning responsive data sets. An entity resolver merges the data sets to ensure that each unique entity is represented by a single data set. A threshold may be defined such that results meeting a certain level of similarity are merged. A profile generator creates a profile page for each unique entity using biographical data contained in the respective datasets and generates a results page containing links to each unique profile. The results page is then sent to the user for display on a graphical user interface. | 09-19-2013 |
20140108548 | Fake Check-In Entries Posted on Behalf of Social Network Users - An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application. | 04-17-2014 |