Patent application number | Description | Published |
20100030648 | SOCIAL MEDIA DRIVEN ADVERTISEMENT TARGETING - Techniques and systems for selecting one or more advertisements to target (e.g., send to, display to, etc.) a user are disclosed wherein the interests of the user are inferred based on current behaviors of social media. Social media is collected and categorized according to some predetermined criteria, such as keywords or outlinks in a post. As a function of the social media collected, current topics in the social media are identified and an advertisement, or advertisements, relating to the current topics is selected. Current topics may be those topics that are more popular, for example, in the social media at the instant a user enters an ad-enabled site. | 02-04-2010 |
20100042910 | Social Media Guided Authoring - Techniques and systems for assisting an author in creating content for social media (e.g., blog posts, microblogs, tweets, etc.) are disclosed, wherein hints are provided to the author as a function of social media stored in a social media knowledge store. Social media is collected and stored in a social media knowledge store according to some criteria. Upon the happening of some predetermined event, for example, relevant information is retrieved from the social media knowledge store. The relevancy of information may be a function of editing context (provided by the author) and/or social media behavior, for example. The relevant information may be translated into hints that provide an author with suggestions and/or corrections, for example. This information is provided to the author through a social media environment (e.g., an authoring tool) that may be also be capable of receiving input from the author and outputting editing context. | 02-18-2010 |
20100057772 | AUTOMATIC DETERMINATION OF AN ENTITY'S SEARCHABLE SOCIAL NETWORK USING ROLE-BASED INFERENCES - Techniques and systems for determining a first entity's social network are provided herein. Data is extracted from one or more data sources associated with the first entity. Once data is extracted, a role of a second entity may be inferred using inference algorithms, rules, keywords, and/or tags in the data extracted. The first entity's social network may be determined by linking the first entity to the second entity and the second entity's role(s) in relation to the first entity. It will be appreciated that the first entity may also search his/her/its network and/or other entities' social networks if the first entity has been granted access by the other entities, for example. Additionally, information about entities found during the first entity's search may be added to a data source associated with the first entity. | 03-04-2010 |
20100058285 | COMPOSITIONAL VIEW OF IMPERATIVE OBJECT MODEL - A compositional or alternate object model is employed over an imperative object model to facilitate inspection and construction of imperative structures in a user-friendly manner. Transformations between compositional and imperative models and vice versa can be specified to provide a bridge between differing computing worlds. Moreover, various architectures and/or design patterns can be employed to effect transformation in different ways. | 03-04-2010 |
20110202909 | TIER SPLITTING FOR OCCASIONALLY CONNECTED DISTRIBUTED APPLICATIONS - Distributed programming is aided by tier splitting single-tier applications into multi-tier applications. Computations and persistent data are split across tiers to generate offlineable or occasionally connected distributed applications. More specifically, computations are divided amongst tiers while preserving the semantics of a single-tier application, and upstream-tier resident data and changes thereto are replicated downstream to facilitate offline work. | 08-18-2011 |
20120096435 | CAPABILITY-BASED APPLICATION RECOMMENDATION - Capabilities associated with a capability-based security model are utilized as a basis for discriminating between software applications. More specifically, software applications can be identified as a function of capabilities. A comparison can be made between software application capabilities and capabilities of interest to identify matches. Subsequently, users can be notified of any matching software applications. | 04-19-2012 |
20120102503 | Green computing via event stream management - The subject disclosure relates to resource optimization in a computing system by leveraging the asynchronous nature of event-based programming. Events arriving on respective event streams are intercepted by mechanisms as described herein that regulate the flow of events from the event stream(s) to their corresponding programs according to a desired resource usage level associated with processing of the programs. Event flow control is performed as described herein via operations on events such as buffering, queuing, desampling, aggregating, reordering. As additionally described herein, a resource usage level for a given processing entity can be determined based on considerations such as program priorities, power profiles or other resource profiles, and resource cost analysis. Further, techniques for extending input regulation as described herein to the case of load distribution among multiple processing nodes are provided. | 04-26-2012 |
20130091295 | PUBLISH/SUBSCRIBE SYSTEM INTEROPERABILITY - Publish/subscribe (pub/sub) systems can be interoperable. Differences between various pub/sub systems can be addressed to enable creative combination of streams from diverse pub/sub systems, among other things. More specifically, pub/sub systems can be unified to facilitate interaction, and adjustments can be made to compensate for any message stream idiosyncrasies. | 04-11-2013 |