Patent application number | Description | Published |
20090271438 | Signaling Correspondence Between A Meeting Agenda And A Meeting Discussion - Methods, apparatus, and products are disclosed for signaling correspondence between a meeting agenda and a meeting discussion that include: receiving a meeting agenda specifying one or more topics for a meeting; analyzing, for each topic, one or more documents to identify topic keywords for that topic; receiving meeting discussions among participants for the meeting; identifying a current topic for the meeting in dependence upon the meeting agenda; determining a correspondence indicator in dependence upon the meeting discussions and the topic keywords for the current topic, the correspondence indicator specifying the correspondence between the meeting agenda and the meeting discussion; and rendering the correspondence indicator to the participants of the meeting. | 10-29-2009 |
20090292580 | AMBIENT PROJECT MANAGEMENT - A computer-implemented method of ambient ad hoc project management can include defining a project and associating a project decay function with the project, wherein the project decay function regulates a rate at which project health declines. Responsive to detecting a project event, one or more parameters of the project decay function can be determined from the project event. Project health can be calculated according to the project decay function using the parameter(s). An indication of the project health can be output. | 11-26-2009 |
20100005099 | System and Method for Socially Derived, Graduated Access Control in Collaboration Environments - A method for socially derived, graduated access control to a collaboration environment includes calculating a variable reputation score for a user based on a user's actions within a collaboration environment; and dynamically enabling graduated access control to the collaboration environment based on the reputation score. | 01-07-2010 |
20110289159 | MESSAGE BROADCASTING IN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide message broadcasting within a clustered computing environment such as a Cloud computing environment. Specifically, under the present invention, a message is received in a message queue (e.g., on a message queue server). From the message queue, the message is sent to a single node of a plurality of heterogeneous nodes within the clustered computing environment. The single node can be selected based on any factor such as a best available node within the plurality of nodes. This single node will process the message and identify a set of message listeners to whom the message should be broadcast. Typically, the set of message listeners is identified based on a topic of the message and an association of the topic to the set of message listeners (e.g., as set forth in a table or the like). In any event, the single node will then publish the message to the set of message listeners. Delivery confirmations, responses, etc. associated with the message will then be tracked, processed, and/or routed by the single node. Thus, embodiments of the present invention obviate the need for a given message from having to be delivered to and/or processed by multiple nodes. | 11-24-2011 |
20110314466 | CREATING INSTANCES OF CLOUD COMPUTING ENVIRONMENTS - Embodiments of the present invention provide a flexible approach to construct/create instances of cloud computing environments. Specifically, under embodiments of the present invention, an image of a virtual machine instance is created from the following components: image bits; content such as the liner notes, manual, metadata, etc.; end user information (so that the image can be customized for one or more specific end users); values provided to an installer; and cloud based values (e.g., IP address, hostname, etc.). By constructing the virtual machine using this approach, dynamic aspects of the image are managed external to the static binary representation of the image. This would include artifacts such as documentation, install scripts, binary files, etc. Additionally, user supplied data can be captured dynamically and copied to customize the image at the time of instance creation. Still yet, embodiments of the present invention provides system level configuration to construct the virtual machine. | 12-22-2011 |
20120030238 | AUTOMATICALLY IDENTIFYING PERSONALIZED SUPPORT - Embodiments of the present invention leverage information of the end-user and personal annotations/tags attached to resources and/or support related thereto (e.g., people, documents, etc.) to provide personalized support. Among other things, these embodiments allow for the mapping of expert “system”-based support to social technology to enable dynamic, localized support. In a typical embodiment, the system will analyze a profile of a user, as well as tags the user has attached to requested computer resources. Based on the profile and the tags, individualized support can be provided automatically. | 02-02-2012 |
20120042163 | SECURELY IDENTIFYING HOST SYSTEMS - Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s). | 02-16-2012 |
20120072555 | LINKING INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (GUI or the like), and associated with a set of rules. The set of rules indicates a behavior/reaction of one instance when an action is performed with respect to another instance linked thereto. These embodiments could be implemented external to or within a cloud operating environment. | 03-22-2012 |
20120072978 | Desired Font Rendering - An embodiment of the invention provides a method for displaying a message from a first user to a second user, wherein the message from the first user is received in a system of the second user. The message includes text in an intended font and metadata, wherein the metadata includes a link to a font source. It is determined whether the intended font is on the system of the second user; and, if the intended font is not on the system of the second user, rendering instructions are obtained from the font source. The rendering instructions include instructions on how to display the text in the intended font on the system of the second user without downloading the intended font to the system of the second user. The text is displayed in the intended font on the system of the second user using the rendering instructions. | 03-22-2012 |
20120180040 | TECHNIQUES FOR PERSONALIZING FEED CONTENT IN VIRTUALIZED COMPUTING ENVIRONMENTS - A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata. | 07-12-2012 |
20120215798 | System and Method for a Centralized URL Commenting Service Enabling Metadata Aggregation - An embodiment of the invention includes a method for centralized URL commenting, wherein user-generated comment data is extracted from web pages on a plurality of web sites. Access control parameters are also obtained from the web sites. The comment data is tagged with identifiers indicating the web sites that the comment data was extracted from, URLs indicating the web pages that the comment data are on, and authors of the comment data. The comment data is stored in a repository. Keywords are extracted from the comment data; and, the keywords are normalized. The normalizing of the keywords includes creating a single normalized keyword for multiple keywords related to the same topic, and tagging comment data that include at least one of the multiple keywords with the normalized keyword. Read access and/or write access to the repository is controlled based on the access control parameters. | 08-23-2012 |
20120215855 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 08-23-2012 |
20130124245 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 05-16-2013 |
20140012618 | Determining Availability Based on Percentage Available - An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy. | 01-09-2014 |
20140173279 | SECURELY IDENTIFYING HOST SYSTEMS - Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s). | 06-19-2014 |