Patent application number | Description | Published |
20090178028 | METHOD AND SYSTEM FOR INVOKING JUST-IN-TIME DEBUGGER - A method and system for invoking Just-In-Time debugger is described, which can provide more efficient JIT debugging for complex code mixed applications. A method for invoking a Just-In-Time (JIT) debugger according to one embodiment includes checking a code type of a code address where a JIT debugging request is triggered from a process of a code-mixed application in response to the JIT debugging request from the process; acquiring corresponding JIT debugging information for different code types of the code-mixed application; and invoking a JIT debugger corresponding to the code type in response to the checked code type of the code address in the process and the acquired corresponding JIT debugging information. | 07-09-2009 |
20090248824 | THEME-BASED INSTANT MESSAGING COMMUNICATIONS - Instant messaging communications are controlled using themes. A theme is a definition of properties and features of a specific instance of an instant messaging communications environment. Themes are stored at a server computer and may be requested by users of a client computer. Themes may be made available to users based on enterprise policies established by the owner of the server computer. Once downloaded to the client computer, a theme may be personalized by the user of the client computer provided personalization is consistent with the enterprise policy. Inheritance techniques may be used to provide personalized themes that remain consistent with enterprise policy while extending functions not defined in the enterprise policy. A user may select different themes manually. Alternatively, theme selection may be automated based on system detection of events such as time of day, user location, availability of network connections and the like. Changes in a downloaded theme may be returned to and stored by the server for future use by the user of the client computer. | 10-01-2009 |
20100049755 | Method and Apparatus for Increasing Efficiency of Data Storage in a File System - A method, apparatus, and computer instructions for storing data in a file system. A determination is made as to whether space is available in an inode of the file in the file system. The data is stored into the inode in response to space being available. Additionally, data for a file may be stored in a block that is partially filled with data from another file. Data for a file may be stored using either the inode or by sharing a block. Data also may be stored using both of these mechanisms. | 02-25-2010 |
Patent application number | Description | Published |
20090094368 | INSTANT MESSAGING GENERAL QUEUE DEPTH MANAGEMENT - The present invention provides systems, methods and computer program product code for data processing systems to manage instant messaging sessions and windows of a first user. An instant messaging chat window is initiated. Responsive to initiating the first instant messaging chat window, the first instant messaging chat window is flagged as a first active window, and an active window counter is incremented. A state of the first user is identified based on the active window counter. The state of the first user is then displayed to a second user. | 04-09-2009 |
20090135444 | METHOD TO PROTECT SENSITIVE DATA FIELDS STORED IN ELECTRONIC DOCUMENTS - A computer implemented method, a computer program product, and a data processing system control the presentation of sensitive data within a document. A request to open a document is received. Responsive to receiving the request to open the document, sensitive data within the document is identified. Responsive to identifying sensitive data within the document, the occurrence of an expiration date for the sensitive data is identified. Responsive to identifying the occurrence of the expiration date for the sensitive data, the sensitive data is redacted to create an edited document. The edited document is then displayed to the user. | 05-28-2009 |
20090144619 | METHOD TO PROTECT SENSITIVE DATA FIELDS STORED IN ELECTRONIC DOCUMENTS - A computer implemented method, computer program product and data processing system control the presentation of sensitive data within a document. A request to open a document having redacted sensitive data is received. Responsive to receiving the request to open the document, a reference to sensitive data is identified within the document. The reference points to a separate location than that of the document itself. Responsive to identifying the reference to sensitive data within the document, an attempt to resolve the reference to the separate location is made. If the reference to the separate location cannot be resolved, the document is displayed without the redacted sensitive data. | 06-04-2009 |
20090204729 | Identifying a Cable With a Connection Location - The illustrative embodiments provide a cable management system, a computer program product, a cable, a method for manufacturing a cable, and a method for guiding a user in identifying a connection location for a cable of interest. A processor, in a data processing system, receives a cable identification from the cable of interest. The processor then matches at least one connection location with the cable of interest based on the cable identification. Responsive to matching the at least one connection location with the cable of interest, the processor activates an indicator that identifies the at least one connection location for connecting the cable of interest. | 08-13-2009 |
20090307684 | MANAGING PACKAGE DEPENDENCIES - An illustrative embodiment provides a computer implemented method for managing package dependencies for an application installation. The computer implemented method identifies a set of used files for the application and a package for a respective file in the set of used files to form identified packages, adding names of the identified packages to an original package list of package names for the application, wherein the original package list defines package dependencies, and determines whether the identified packages can be located. The computer implemented method, responsive to a determination that the identified packages can be located, determines whether files within the identified packages can be found, responsive to a determination that the files within the identified packages can be found, determines whether files within the identified packages were used, and responsive to a determination that the files within the identified packages were used, updates the original list of package names for the application to form an updated list of managed package dependencies. The computer implemented method further creates a difference list between the updated list and the original list of package names and selectively installs the application using a combination of the original list of package names and the difference list according to the package dependencies. | 12-10-2009 |