Patent application number | Description | Published |
20080243582 | METHOD AND SYSTEM FOR MANAGING CONFLICTING CALENDAR ENTRIES - The present invention enables a user to schedule meetings and detect scheduling conflicts. A system user such as an employee schedules a meeting. The time and date of the meeting is stored in an account for that user. When the same user schedules another meeting, that meeting is detected and compared with any previously and scheduled and stored meetings for that user. If there is a conflict between the presently scheduled meeting and any previously scheduled meeting, then the present invention alerts the user and gives the user the opportunity to select the new meeting for that time or to retain the currently scheduled meeting. The present invention can also store and track the unscheduled meetings. In the event the scheduled meeting is postponed or canceled, the user can be notified and given the opportunity to schedule and attend a previously declined meeting that was scheduled for that same time. | 10-02-2008 |
20080250343 | Receiver content saving system - A method and system are provided in which a user is enabled to create a preferred playlist of the user's favorite songs or types of video presentations. An input device allows the user to add or delete items or key words of a song title or video presentation to or from the favorites list. In an exemplary video application, a user is enabled to indicate by using a digital video recorder, a specific type of broadcast such as “Sports” or “Basketball”. In an exemplary radio application, the user is enabled to list songs, or key words of the title if the user is unsure of the exact title, on the preferred playlist. Video signals or songs playing on several channels or stations are monitored and when a listed video type or song having the input key words from the user's favorites list begins to play on a station, the song and the full song title which is acquired from the received broadcast data, are automatically saved to memory for subsequent retrieval and playing by the user. In one example, the user is also enabled to add video types or songs to the favorites list by pressing a single “ADD” button at any time while a type of video or a favorite song is currently being played. The song then being played together with the title of the song or video presentation are then saved to memory for subsequent retrieval and playing. | 10-09-2008 |
20080260138 | METHOD AND SYSTEM FOR USER INTERACTION WITHIN A QUEUE - A system for providing caller interaction within a queue. In response to receiving a call, it is determined whether a wait time exists before a caller is connected to a customer service representative. In response to determining that the wait time exists, it is determined whether the caller is interested in an interaction. In response to determining that the caller is interested in the interaction, a profile associated with the caller is loaded. In response to detecting a connection with an interactive system, interactive options are loaded from the interactive system and presented to the caller based on the profile. In response to receiving a selection from the interactive options, it is determined whether the selection includes a group interaction. In response to determining that the selection includes the group interaction, the group interaction is loaded based on the profile. Then, the caller is entered into the group interaction. | 10-23-2008 |
20080276223 | Dynamic Source Code Analyzer - The invention is an improved integrated development environment (IDE). In particular, the improved IDE comprises a text editor, a source code analyzer, a rule database, and a solution database. The rule database stores source code patterns that represent classes of bugs, while the solution database stores source code patterns that represent corresponding alternative source code that corrects the bugs. The source code analyzer dynamically evaluates source code as a programmer develops the source code in the text editor, periodically comparing source code with the patterns in the rule database. If the source code analyzer matches a pattern with any source code, the source code analyzer displays the corresponding source code pattern from the solution database. The source code analyzer further gives the programmer the option to select the source code pattern from the solution database, at which time the editor changes the source code to conform to the appropriate pattern. | 11-06-2008 |
20080288378 | Processing system for recording media content - A method and system are provided in which a user is enabled to record, for example, a song or other radio and/or video content, on demand, and to account for and process appropriate payment for the use of the recorded content. The recorded material is saved and indexed by title and is retrievable for subsequent review, tabulation and/or playing at the user's convenience. In one example, a user is enabled to record received media content by pressing a single “ADD” button at any time while a favorite song is being received and played. The song then being played together with the title of the song or video presentation are then saved to memory for subsequent retrieval and playing. The received content is accounted for and tabulated and a payment for the use of the recorded song is processed by the user in accordance with a predetermined payment schedule. | 11-20-2008 |
20080317239 | Systems and Arrangements for Communicating with an Automated Interactive Telecommunications Service System - In one embodiment a method for accessing and interacting with an interactive telecommunications service system is disclosed. The method can include activating a programming mode, entering a plurality of keystrokes to create a keyed sequence where the keyed sequence can include a telephone number and a menu response sequence. The menu response sequence can control the menu driven portion of the telecom service system after the device is connected via a telecommunications network. The keyed sequence can include delays between each of the plurality of keystrokes. The delays can be recorded and a session identifier can also be recorded. The keyed sequence can be associated with the delays and the session identifier in response to the activated programming mode. Access to the service and results from a service request can be automated by the disclosed arrangements. | 12-25-2008 |
20080320411 | METHOD OF TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to enter text selecting text based upon the number of words in phrases of the text, upon the number of letters in words of the text, or upon other patterns of the text. The method may also involve indexing the selected text, matching text currently being entered by the user into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In many embodiments, the text may be selected from the text entered into any of several applications. In a few embodiments, the text may be selected from sources specified by a user. In further embodiments, the sources may constitute data files. | 12-25-2008 |
20090006161 | SYSTEMS AND METHODS FOR MANAGING EVENTS OF EVENT SCHEDULING APPLICATIONS - Systems, methods, and computer program products for managing events in time management or event scheduling applications, such as calendar applications, are disclosed. Embodiments comprise analyzing event parameters, such as selections from input solicited from prospective meeting attendees that are associated with events of the meeting, determining an arrangement of the events based on the analysis of the event parameters, and proposing the arrangement. System embodiments generally comprise a list of events for the meeting, such as event items in a database, a constraint solver to analyze parameters of events of the list, and an arrangement module to select an arrangement of the events based on analysis by the constraint solver. | 01-01-2009 |
20090018923 | METHOD AND APPARATUS FOR RECOMMENDING A PAYMENT METHOD IN A TRANSACTION - The illustrative embodiments described herein provide a computer-implemented methods apparatus, and computer program product for recommending a payment method in a transaction. The process generates a user profile based on user information. The process receives data regarding incentives available for using a set of payment methods to form incentive policy data. The process identifies a set of parameters associated with the transaction. The process generates a set of recommended payment methods in the set of payment methods using the user profiles the incentive policy data, and the set of parameters to form a recommendation. The set of recommended payment methods are recommended to complete the transaction. The process provides the recommendation to a user. | 01-15-2009 |
20090018955 | METHOD AND APPARATUS FOR PROVIDING USER ACCESS TO PAYMENT METHODS - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for providing user access to payment methods. The process generates a set of recommended payment methods in a set of payment methods to form a recommendation. The set of recommended payment methods are recommended to complete the transaction. The process provides the recommendation to a user on a user interface. The process provides the application for the user to apply for the right to use the recommended payment method on a user interface in response to a determination that a recommended payment method in the recommendation is presently unavailable to the user. | 01-15-2009 |
20090031336 | GROUP PREFERENCE CONTROL SYSTEM - A method, medium and implementing computer system are provided in which the aggregate preferences of a gathered group of individuals in a certain proximity and with respect to a predetermined perceivable and controllable function are ascertained. Individual preferences are processed to obtain a group preference and if the group preference meets predetermined criteria, the group preference is implemented with respect to the controllable function. In a specific example, movie preview playlists are modified by a control server according to the ascertained preferences of the particular group to whom the movie previews are being presented. In another example, the ambient temperature of a room in which a group of individuals is gathered is adjusted by a temperature-control server in response to the polled and ascertained preferences of each of the individuals. | 01-29-2009 |
20090055799 | SYSTEM AND METHOD FOR SOURCE CODE SECTIONAL LOCKING FOR IMPROVED MANAGEMENT - A system and method of managing source code and, more particularly, a system and method for locking sections of source code to eliminate conflicts during concurrent use by multiple users. The method includes locking a first section of a file and at least a second section of the file to permit editing thereof by different users to the exclusion of other users. The method further includes merging edits of the locked first section with remaining sections of the file including any edits made to the at least second section without overwriting any edits. | 02-26-2009 |
20090094088 | METHODS, SYSTEMS, AND APPARATUSES FOR AUTOMATED CONFIRMATIONS OF MEETINGS - Methods, systems, apparatuses, and computer program products for confirming attendance of prospective attendees to a meeting or events via time management or event scheduling applications, such as calendar applications, are disclosed. Various embodiments comprise scheduling the meeting, waiting for a period of time, and automatically sending confirmation requests to one or more prospective attendees of the meeting. Some embodiments also comprise sending invitations to and receiving acceptances by one or more prospective attendees. Some embodiments further comprise receiving one or more responses to the confirmation requests from the prospective attendees. Some embodiments may reschedule the meeting, or events of the meeting, based upon responses to the confirmation requests. Various embodiments may send or receive the confirmation requests and responses via instant messaging (IM) messages, e-mail messages, and short message service (SMS) messages. | 04-09-2009 |
20090106369 | DUPLICATE EMAIL ADDRESS DETECTION FOR A CONTACT - Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server. | 04-23-2009 |
20090110158 | METHOD AND APPARATUS OF AUTOMATED MESSAGE CONVERSION BASED ON AVAILABILITY OF BANDWIDTH - A computer implemented method, apparatus, and computer usable program product for managing a communications session. The process monitors a bandwidth of the communications device in response to detecting an exchange of audio-based messages on a communications device. In response to detecting the bandwidth below a threshold, the process converts a subsequent outgoing audio-based message into an outgoing text-based message and associates a low bandwidth indicator to the outgoing text-based message to form a distinguished text-based message. The process then transmits the distinguished text-based message for receipt by an intended recipient. | 04-30-2009 |
20090265435 | Email Server Cooperative Management for Automatic Routing of Emails Based on Preferences - Methods, systems, and media are disclosed for managing the routing of an email at the server level to an email client by preferences set in a routing application located on the server. One embodiment includes querying, by a routing application located on a server and associated with an email system, the email by comparison to conditions for each preference set in the routing application, wherein a preference comprises a routing action. Further, the method includes identifying, based on the querying and by the routing application, a match between the email and at least one of the conditions. Further still, the method includes performing, based on the match and by the routing application, the preference associated with the at least one of the conditions of the email, whereby the email is transmitted to an email client. | 10-22-2009 |
20090271448 | System, Method, and Computer Readable Media for Identifying a User-Initiated Log File Record in a Log File - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 10-29-2009 |
20090271700 | TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to index segments of text from multiple sources and receive segments of text being entered into text-entry applications in a floating application. The embodiments may also involve matching the segments of text to indexed segments of text and entering completions of the received segments of text into the text-entry applications. The completions may be based upon the matching, and the completion of a segment may be entered into the text-entry application from which it was received. | 10-29-2009 |
20090279677 | METHOD AND SYSTEM TO PREVENT UNINTENDED USERS FROM ACCESSING A RE-ROUTED COMMUNICATION - A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication. | 11-12-2009 |
20090279680 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL BASED ON MUTUAL CONTACTS OF A CONTACT LIST - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device. | 11-12-2009 |
20090280785 | METHOD AND SYSTEM FOR PERFORMING PROXIMITY BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device. | 11-12-2009 |
20090280787 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL THROUGH A THIRD PARTY DEVICE - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier. | 11-12-2009 |
20090280817 | METHOD AND SYSTEM FOR PERFORMING RECIPIENT BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device. These preferences may be stored on the intended receiving wireless device or remotely stored on the host carrier network. | 11-12-2009 |
20090280818 | METHOD AND SYSTEM FOR PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device. These preferences may be stored on the caller telecommunication device or remotely stored on the host carrier network. | 11-12-2009 |
20090292742 | System, Method, and Computer Readable Media for Identifying a Log File Record in a Log File - A system, a method, and a computer readable media for identifying a log file record in a log file are provided. The log file has a plurality of log file records therein. The plurality of log file records has a repeating pattern of log file records. The method includes displaying a first graphical user interface on a display device. The method further includes selecting the log file utilizing the first graphical user interface. The method further includes analyzing the log file to determine the repeating pattern of log file records. The method further includes selecting a first command button on the first graphical user interface that executes an algorithm to analyze additional log file records that were automatically added to the log file by a software program. The additional log file records are associated with the repeating pattern of log file records. The method further includes storing the first log file record in a memory device if a first log file record in the additional log file records has at least one command-related attribute that does not correspond to command-related attributes in the repeating pattern of log file records. | 11-26-2009 |
20100250478 | Demo Verification Provisioning - A method, system, and computer program product for issuing an alert when a method of a live demonstration deviates from demonstration simulation actions. A computer receives a command to commence a demonstration simulation. During the demonstration simulation, capture logic of a computer is initialized. The capture logic records events of the demonstration simulation. When a live demonstration subsequently initiated, demonstration verification logic of the computer continually monitors, in real-time, events of the live demonstration and compares the events to the previously recorded events captured during the demonstration simulation. In response to detecting that a live demonstration has deviated from the recorded demonstration simulation method, the demonstration verification logic issues a non-invasive alert. The non-invasive alert may be issued using visual, audible, or vibration feedback cues in such manner that an audience observing the live demonstration is un-aware of the non-invasive alert. | 09-30-2010 |
20100251386 | METHOD FOR CREATING AUDIO-BASED ANNOTATIONS FOR AUDIOBOOKS - A computer implemented method, a data processing system, and a computer program publish an audio annotation of a media signal. A media player plays a media signal. The media player then records an audio annotation to the media signal. Responsive to recording the audio annotation to the media signal, the media player records an identifier to be associated with the media signal. The audio annotation is then published to a social networking host. | 09-30-2010 |
20110003578 | Automatic Wireless Utilization of Cellular Telephone Devices - A system and method for notifying emergency responders, family, and other contact parties of an urgent vehicle condition such as a breakdown or crash, by using a short-range wireless communicator mounted on the vehicle to employ a peer-to-peer communications capability to find and co-opt a nearby long-range communication device, such as a Bluetooth enabled phone, which is not mounted on the vehicle, such as a passer's-by telephone. The invention obtains authorization from the co-opted device to use it as a forwarding proxy, and transmits a notification message to one or more parties, such as emergency dispatchers, family members, etc., via the short-range link to the co-opted device, which then transmits the message to the recipient via the long-range network, such as via a telephone network. | 01-06-2011 |
20120003931 | Method for Dynamic Changes to a User Profile Based on External Service Integration - The different illustrative embodiments provide a method, system, and program product for dynamic changes to a user profile based on external service integration. The method, system and program product comprise establishing a direct two-way communication between a first mobile device and a second mobile device when a first mobile device direct transceiver and a second mobile device direct transceiver are within a range of each other. A number of data is gathered from a number of internal sources or a number of external sources. An analysis of the number of data to determine a modification to a first list stored in the first device is performed. A modified first list is generated based on the analysis. The modified first list is automatically sent from the first mobile device to the number of second devices responsive to establishing the direct two-way communication between the first mobile device and a number of second devices. | 01-05-2012 |
20120003965 | Method for Information Sharing After Proximity Connection Has Ended - The different illustrative embodiments provide a method, system, and computer program product for sharing a list passed in a shared direct communication environment after a direct communication has ended among mobile devices. A profile associated with the first mobile device in a storage of a server computer is accessed by an indirect transceiver in the second mobile device responsive to a second mobile device acquiring an information that is responsive to a list previously received from a first mobile device and responsive to the information being acquired during a time when there is no direct communication between the first mobile device and the second mobile device. A contact information is retrieved, and the information is sent to a location specified by the contact information. | 01-05-2012 |
20120004954 | Crowd-Sourced Shopping List Augmentation - A method for receiving shopping recommendations is provided. In response to adding, by a client device, an item to a current shopping list of a customer, the client device sends the current shopping list with the added item to a server device for a shopping recommendation. In response to receiving, from the server device, a recommendation for a new item not found in the current shopping list of the customer, the client device displays the recommendation for the new item in the current shopping list of the customer. It is also determined whether a purchase incentive is associated with the new item recommended by the server device. In response to determining that a purchase incentive is associated with the new item recommended by the server device, the client device displays the purchase incentive with the new item recommended by the server in the current shopping list of the customer. | 01-05-2012 |
20120066237 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 03-15-2012 |
20120072201 | LANGUAGE TRANSLATION REUSE IN DIFFERENT SYSTEMS - An account system obtains a first translation file associated with it. The account system obtains a second translation file from a second account system, wherein the second account system is a data processing system. The account system determines whether a third account system has a third translation file with untranslated terms. The account system obtains the third translation file from the third account system, responding to a determination that the third account system has the third translation file with untranslated terms. The account system, responding to a determination that the third account system has the third translation file with untranslated terms, forms a comprehensive file from at least two files selected from the group consisting of the first translation file, second and/or third translation files. The account system translates the comprehensive file to form a translated file. | 03-22-2012 |
20120209882 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIA FOR IDENTIFYING A USER-INITIATED LOG FILE RECORD IN A LOG FILE - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 08-16-2012 |
20120254419 | NOTIFICATION TO USERS OF EVENTS - A method and system for notifying users of events. User activity of a user is monitored, based on user notification information in a storage location. The user notification information pertains to a scheduled event. In response to a detection, from the monitoring, of a change in the user activity, it is ascertained that the change necessitates notifying the user of the scheduled event due to the change impacting whether the user can participate in the scheduled event. Then the user is notified of the scheduled event. The user notification information in the storage location is modified, based on the detected change in the user activity, in response to receipt of an instruction from the user to change the user notification information in the storage location. | 10-04-2012 |
20120331414 | ARRANGEMENTS OF TEXT TYPE-AHEAD - A method and system of text entry. An attribute of text entered by a user into an application is determined. The entered text is matched to a single portion of each attribute segment of one or more indexed segments of text, based upon a determined attribute of each attribute segment and the determined attribute of the entered text. Each attribute segment consists of the single portion and a remaining portion. After the entered text is matched to a single portion of each attribute segment, a selection of a single attribute segment selected from the one or more indexed segments of text by the user is received. The remaining portion of the selected single attribute segment is entered into the application. | 12-27-2012 |
20130023273 | PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A caller telecommunication device transmits a call to an intended receiving wireless telecommunication device. In response, the caller telecommunication device transmits an instruction to a first proximate telecommunication device, wherein the instruction directs the first proximate telecommunication device to determine if the first proximate telecommunication device is within a predefined proximity of the intended receiving wireless telecommunication device. The predefined proximity is a distance within which the intended receiving wireless telecommunication device and other wireless telecommunication device can directly communicate by local signals. The caller communication device re-routes the call to the first proximate telecommunication device if the first proximate telecommunication device is within the predefined proximity of the intended receiving wireless telecommunication device. | 01-24-2013 |
20130111479 | Performance of Scheduled Tasks via Behavior Analysis and Dynamic Optimization | 05-02-2013 |
20130111484 | Identifying and Correcting Hanging Scheduled Tasks | 05-02-2013 |
20130111497 | Staggering Execution of Scheduled Tasks Based on Behavioral Information | 05-02-2013 |
20130283150 | PROVIDING ARCHIVED WEB PAGE CONTENT IN PLACE OF CURRENT WEB PAGE CONTENT - In accordance with the present disclosure a user can return to a previously viewed/archived version of a web-page when the content of the currently available webpage is different from the archived content. To facilitate such an interaction, a browser can archive displayed versions of web pages and their network address and when a user makes new request for the web page, the browser can determine that there is an archived version with the requested network address. When an archived version of the web page exists, the browser can prompt the user to determine if the user wants to “re-display” the contents of a previously displayed web page or if the user wants to display the current contents provided by the website server. | 10-24-2013 |
20130301821 | SYSTEMS AND ARRANGEMENTS FOR COMMUNICATING WITH AN AUTOMATED INTERACTIVE TELECOMMUNICATIONS SERVICE SYSTEM - In one embodiment a method for accessing and interacting with an interactive telecommunications service system is disclosed. The method can include activating a programming mode, entering a plurality of keystrokes to create a keyed sequence where the keyed sequence can include a telephone number and a menu response sequence. The menu response sequence can control the menu driven portion of the telecom service system after the device is connected via a telecommunications network. The keyed sequence can include delays between each of the plurality of keystrokes. The delays can be recorded and a session identifier can also be recorded. The keyed sequence can be associated with the delays and the session identifier in response to the activated programming mode. Access to the service and results from a service request can be automated by the disclosed arrangements. | 11-14-2013 |
20130305030 | TESTING A CONFIGURATION CHANGE - An approach is presented for testing a change (i.e., configuration change) in a configuration of a computing environment. A user identifier (ID) of a user is received from an administrative user having an administrative user ID. First configurable attributes of the user ID are determined. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is received. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation is performed by tracking data record modifications made by the TSID and based on the configuration change. The user ID and administrative user ID are unaffected by the configuration change. After completing the simulation, the data record modifications are undone. | 11-14-2013 |
20130318112 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 11-28-2013 |
20140058780 | NOTIFICATION TO USERS OF EVENTS - A method and system for notifying users of events. User activity of a user is monitored, based on user notification information in a storage location. The user notification information pertains to a scheduled event. In response to a detection, from the monitoring, of a change in the user activity, it is ascertained that the change necessitates notifying the user of the scheduled event due to the change impacting whether the user can participate in the scheduled event. Then the user is notified of the scheduled event. The user notification information in the storage location is modified, based on the detected change in the user activity, in response to receipt of an instruction from the user to change the user notification information in the storage location. | 02-27-2014 |
20140189526 | CHANGING LOG FILE CONTENT GENERATION - In a method for changing log file content generation, a computer extracts content of a log file. The content was generated by one or more computer programs at run-time. The content comprises a plurality of portions. The computer causes the extracted content to be displayed in a user interface. The computer detects a user interaction in the user interface. The user interaction manipulates at least one of the portions. The computer generates a rule for generating future log file content, wherein the generated rule is based on the user interaction in the user interface. | 07-03-2014 |
20140214777 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIA FOR IDENTIFYING A USER-INITIATED LOG FILE RECORD IN A LOG FILE - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file. | 07-31-2014 |
20140258879 | THEME ENGINE - A method includes activating a theme engine, determining a proximity between a user's device and at least one known person, and applying at least one theme to the user's device based on the proximity between the user's device and the at least one known person. | 09-11-2014 |
20140297589 | DYNAMICALLY SYNCHING ELEMENTS IN FILE - An approach is provided for synchronizing elements in files across a technical environment. In one embodiment, a processor obtains a first change to a first file. The processor also obtains data identifying a second file. The processor determines if the change is supported by a data library in a pre-defined list of data sources. The processor analyzes the data library to determine a type of the change. The processor applies the type of the change to the second file. | 10-02-2014 |
20140298185 | DYNAMICALLY ENHANCING USER INTERFACE - An approach is provided for dynamically enhancing and visually synchronizing elements in a display on a computing device. The approach includes using a processor to obtain a change to a first file and data identifying a second file one or more characteristics from a source file. The processor determines if the change is supported by a data library and analyzes the data library to determine the type of change. The processor then applies the type of change to the second file and generates a display associated with the second file on the computing device that includes the type of change applied to the second file. | 10-02-2014 |
20140317153 | PROCESSING DATA LOADS - A method and system for processing a data load. A request is received for a data load to load data into a database in accordance with a data template that includes data to be loaded into the database. The template includes columns and rows. The request specifies a request type characterized by at least one column that collectively includes unique data for each row. The columns include N sets of columns (N≧1) in addition to the at least one column. The data load is split into multiple loads of data. The multiple loads include one load and N additional loads. The one load is associated with the at least one column. The N additional loads are respectively associated with the N sets of columns and are configured to generate or modify one or more rows in each table of N respective additional tables in the database. | 10-23-2014 |
20140358615 | NOTIFICATION TO USERS OF EVENTS - A method and system for notifying users of events. Scheduled user activity of a user is monitored, based on user notification information in a storage location. The user notification information pertains to a scheduled event. In response to a detection, from the monitoring, of a change in the user activity, it is ascertained that the change necessitates notifying the user of the scheduled event due to the change impacting whether the user can participate in the scheduled event. The change in the scheduled user activity is independent of the scheduled event. Then the user is notified of the scheduled event. The user notification information in the storage location is modified, based on the detected change in the user activity, in response to receipt of an instruction from the user to change the user notification information in the storage location. | 12-04-2014 |