Patent application number | Description | Published |
20120059647 | Touchless Texting Exercise - A method, system, and computer program product are provided for touchless texting that enhances user activity. A plurality of graphical images are displayed on a computer display. An exercise motion is detected using a camera, and the motion is resolved to a selected graphical image from the plurality of graphical images. The selected graphical image is entered into an application. | 03-08-2012 |
20120254195 | SELF-PRESENTING REPORT - A method, system and computer program product may identify information of interest to form identified points of interest using a report specification, create a master detail relationship using the identified points of interest, apply an order to the identified points of interest, apply annotations to the identified points of interest, apply highlighting to the identified points of interest, generate an enhanced report specification based on at least the order, annotations, or highlighting of the identified points of interest, and execute the enhanced report specification. | 10-04-2012 |
20120272170 | SELECTABLE VARIABLE SPEED CONTROLLED OBJECT MOVEMENT - A technique for selectable variable speed for controlled object movement receives a selection of a point on an object being moved, using a selector, to form a selected point, calculates a displacement of the selected point from a center of the object being moved to form a displacement value, calculates a sensitivity value using the displacement value, calculates a movement speed using the sensitivity value, wherein a ratio of movement speed to displacement is configurable as a ratio that is inversely proportional to the distance from the center of the object being moved and provides movement speed information for object movement. | 10-25-2012 |
20120317640 | VARIABLE LENGTH, MULTIDIMENSIONAL AUTHENTICATION KEYS - Provided are techniques for determining access to a secure system. A portion of an input sequence is received. A security factor of the received portion of the input sequence is determined by calculating: P(is)*P(gu), where P(is) is a probability of the input sequence being a valid password, and where P(gu) is a probability of a gesture pertaining to a user based on historical data collected from the user. It is determined whether the security factor has reached a predetermined level. In response to determining that the security factor has reached the predetermined level, access to the secure system is allowed before the entire input sequence is received. | 12-13-2012 |
20130007577 | DRILL-THROUGH LENS - Provided are techniques for providing drill-through information. User input of locations of one or more target documents and values of parameters for those one or more target documents is received. A user is allowed to move a drill-through lens window across a source document, wherein the drill-through lens window displays a floating, transparent target document. In response to the drill-through lens window hovering over the data in the source document, in real time: the data is selected in the source document, the selected data is identified as a parameter for a target document, the parameter is used to obtain further details from the target document, and the drill-through lens window is displayed showing the further details. | 01-03-2013 |
20130007583 | COMPARATIVE AND ANALYTIC LENS - Provided are techniques for comparing data. User selection of first data to be compared is received. User input of one or more formulas used in making comparisons is received. The user is allowed to move a Comparative and Analytic (CA) lens window to hover over second data, wherein the CA lens window displays a floating, transparent document. In response to the CA lens hovering over the second data, in real-time, the first data and the second data are compared according to the one or more formulas, and the CA lens window is displayed showing the first data and the comparison between the first data and the second data. | 01-03-2013 |
20130117320 | REPORT DATA JUSTIFIERS - A method includes providing a source report for display that includes a first plurality of data values each associated with a first context, the first context comprising an intersection of dimensions of a multidimensional database. The method includes receiving a selection of a first data value of the first plurality, and providing a drill-through report for display generated based at least in part on the selected data value. The drill-through report includes a second plurality of data values each associated with a second context comprising an intersection of at least one dimension of the first context and at least one other dimension not in the first context. The method includes receiving an indication of a relationship between the selected data value and the drill-through report, updating the source report to include a graphical representation of the relationship, and providing the updated source report having the graphical representation for display. | 05-09-2013 |
20130117649 | REPORT DATA JUSTIFIERS - A method includes providing a source report for display that includes a first plurality of data values each associated with a first context, the first context comprising an intersection of dimensions of a multidimensional database. The method includes receiving a selection of a first data value of the first plurality, and providing a drill-through report for display generated based at least in part on the selected data value. The drill-through report includes a second plurality of data values each associated with a second context comprising an intersection of at least one dimension of the first context and at least one other dimension not in the first context. The method includes receiving an indication of a relationship between the selected data value and the drill-through report, updating the source report to include a graphical representation of the relationship, and providing the updated source report having the graphical representation for display. | 05-09-2013 |
20130117695 | MOVING AN ACTIVITY ALONG TERMINALS ASSOCIATED WITH A PHYSICAL QUEUE - Aspects of this disclosure describe techniques for moving an activity down a physical queue. An example technique estimates a wait time to reach a service point for a user at a first position of a physical queue, selects an activity for the user at the first position of the physical queue based on the estimated wait time, the activity including an interactive application, sends the selected activity to a terminal associated with the first position of the physical queue, and, after receiving an indication that the user has advanced to a second position that is closer to the service point than the first position, forwards the activity to a terminal associated with the second position of the physical queue. | 05-09-2013 |