Patent application number | Description | Published |
20100162209 | Embedding Software Developer Comments In Source Code Of Computer Programs - Computer-implemented methods, apparatus, and products for embedding software developer comments in source code of computer programs that includes receiving, by a software development application from a software developer, a location in source code of a computer program at which to insert a multimedia annotation, the multimedia annotation including software developer comments; and inserting, at the location in the source code, by the software development application, a hyperlink including a URL specifying a storage location for the multimedia annotation. | 06-24-2010 |
20110314451 | VALIDATING TRANSLATIONS OF EXTERNALIZED CONTENT FOR INCLUSION IN AN APPLICATION - A method and system for validating translated files for inclusion in an application being developed. Translatable files having externalized content in a single base language are sent for translation into other languages. Translated files resulting from a translation of the translatable files are received. Each translated file is statically and dynamically validated to detect error(s). The static validation is based on comparing the translatable files to the translated files. The dynamic validation is based on a simulation of how a user interface of the application presents the externalized content, without including an actual presentation of the externalized content by the user interface. Modified translated files that correct the detected error(s) are received and provided for a presentation of the externalized content by the user interface. | 12-22-2011 |
20120166989 | MANAGING TRANSPARENT WINDOWS - Methods and arrangements to manage transparent windows are described herein. Embodiments may comprise logic such as hardware and/or code to select one or more windows to make transparent and to switching the active window between source and target windows via the position of the mouse. Many embodiments provide a right click, pop-up menu (i.e., pressing the right mouse button generates a pop-up menu), a pull-down menu, or a button associated with windows. These features may allow a user to select individual or all windows to be transparent. A transparent window provides some view of windows or objects below the transparent window while providing some view of the contents such as graphics and/or text in the transparent window. Embodiments may also include management logic such as hardware and/or code to facilitate selection of a transparent window to make the window active. | 06-28-2012 |
20130054976 | LIGHTWEIGHT DOCUMENT ACCESS CONTROL USING ACCESS CONTROL LISTS IN THE CLOUD STORAGE OR ON THE LOCAL FILE SYSTEM - In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password. | 02-28-2013 |
20130116850 | GENERATING AND STORING ENERGY BY MOVING OBJECTS - Embodiments of the present invention relate to an approach for moving (e.g., lifting and lowering) objects (e.g., structures, cars, etc.) to generate and store energy to address energy shortage conditions. Specifically, the weight of an object is utilized to accumulate potential energy over a period of time through conversion of a source of energy (e.g. electricity) into potential energy when available power (i.e. supply) from the source of energy exceeds demand (e.g., an energy surplus condition is identified). This potential energy is then converted into another form of energy (e.g. electricity) over a period of time when excess power is needed (e.g., an energy shortage condition is identified). | 05-09-2013 |
20130265164 | THEFT DETERRENT DEVICE - An apparatus to deter theft of a movable product is provided. In one aspect, the apparatus comprises a housing, a plug connected to the housing to insert into an electrical socket to receive power, a bracket connected to the housing and having an opening to receive a locking cable while the opening of the bracket protrudes from the housing. A switch, within the housing, responsive to protrusion of the opening of the bracket from the housing to receive the locking cable. An electrical circuitry, within the housing, responsive to the switch being in a first state, and absence of power at the plug to sound an alarm, and responsive to the switch being in a second state or the presence of power at the plug to prevent sounding of the alarm. | 10-10-2013 |
20130335223 | ELECTRONICS THEFT DETERRENT SYSTEM - Embodiments of the present invention provide a method and system of deterring theft of an electronic device connected to an external source of charging power. In one aspect, responsive to a user request to arm the electronic device and the electronic device being connected to the source of charging power, the electronic device arming the electronic device. In another aspect, while the electronic device is armed, the electronic device detecting loss of the connection to the source of charging power, and in response, the electronic device activating an alarm or notifying another computing device that the connection of the electronic device has been disconnected from the source of charging power. | 12-19-2013 |
20140019935 | AUTOMATED APPLICATION GENERATION - A modification method and system. The method includes retrieving by a computer processor of a computing system a list of features and plug-ins associated with an application. The features include features version metadata and the plug-ins include plug-ins version metadata. The computer processor compares features source code associated with the features with previous versions of associated source code. The computer processor generates modified features version metadata associated with the features version metadata. The modified features version metadata includes updated version labels differing from previous version labels of the previous versions of associated source code. The features are assembled into an application. | 01-16-2014 |
20140250179 | COLONY APPLICATION - In a method for collaborating, a first computing device determines capabilities needed for an application to function. The first computing device enables one or more other computing devices to connect to the application. The first computing device determines capabilities of a second computing device, wherein the second computing device is connected to the application. The first computing device determines the capabilities needed for the application to function are met. The first computing device configures a user interface of the second device. | 09-04-2014 |
20140253417 | COLONY DESKTOP HIVE DISPLAY: CREATING AN EXTENDED DESKTOP DISPLAY FROM MULTIPLE MOBILE DEVICES USING NEAR-FIELD OR OTHER NETWORKING - Computer-implemented methods, computer program products and computer systems that create a virtual extended display on mobile devices by providing a first device in a first location and at least a second device in a second location, followed by joining together the first and second devices within an aggregation session via a network. Logical data of visual content is shared between the first and second devices, and the viewed output display of the visual content split amongst the first and second device displays within the aggregation session. During the aggregation session, at least one of the devices therein is manipulated by movement or changing device parameters to virtually change the viewed output display of the visual content on such manipulated device. | 09-11-2014 |
20140297593 | TEMPLATE-BASED REMOTE/LOCAL FILE SELECTION TECHNIQUES FOR MODULAR BACKUP AND MIGRATION - File selection techniques that can handle overlapping module contexts provide flexible and reversible backup, restore, migration, deployment and synchronization operations. Both remote (administrative) control and local (user) control of the file selection are provided. Application and configuration specific templates are provided to a user from the remote administrator for further customization by selecting or de-selecting configurations, applications and/or individual files or configuration entries. The templates may be controlled geographically by the IP address or identity associated with the user. A user's interaction with the customization is saved and the order of changes is maintained, so that when the templates are updated, the user's customizations can be re-applied. The administrator may override user settings based on rules, which may also be geographically determined. The file selection may also be altered based on media type and location, e.g., local backup vs. server backup. | 10-02-2014 |
20150046907 | VALIDATING TRANSLATIONS OF EXTERNALIZED CONTENT FOR INCLUSION IN AN APPLICATION - An approach is provided for validating translated files for inclusion in an application being developed. Content in a natural language is translated into another language and received as a first translation in a first translated file. Based on an error condition indicated by simulations of loading and presenting the first translation in a user interface of the application, a syntax error that causes the error condition is determined. The syntax error can include a lack of a match between a key and exactly one value, a missing key, or a mismatch of placeholders in the first translated file. Responsive to a receipt of a second translation of the content that includes the correction of the syntax error, and based on simulations of loading and presenting the second translation in the interface not indicating the error condition, the second translation is presented at runtime without causing the application to stop running. | 02-12-2015 |