Patent application number | Description | Published |
20080207164 | Traffic Shaping of Cellular Service Consumption Through Modification of Consumer Behavior Encouraged by Cell-based Pricing Advantages - Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider. | 08-28-2008 |
20080250335 | Method and Apparatus for Enhancing Instant Messaging Systems - The present invention provides a method, apparatus, and computer instructions for organizing threads in an instant messaging session. Instant messages are received from a list of contacts. Each of these messages are stored in a set of folders, wherein each folders in the set of folders stores messages for a contact in the number of contacts. Each file is linked for access though a graphical user interface. Message threads are handled by displaying a primary dialog window, wherein the primary dialog window includes an ongoing conversation pane and an outgoing message pane. Responsive to a user input identifying a new thread, a secondary dialog window is displayed, wherein the secondary dialog window includes an ongoing conversation pane and an outgoing message pane. Responses to outgoing messages sent from the outgoing message pane are displayed in the primary dialog window in the ongoing conversation pane in the primary dialog window. Responses to outgoing messages sent from the outgoing message pane in the secondary dialog window are displayed in the ongoing conversation pane in the secondary dialog window, wherein the primary dialog window and the secondary dialog window. | 10-09-2008 |
20080250336 | Method and Apparatus for Enhancing Instant Messaging Systems - The present invention provides a method, apparatus, and computer instructions for organizing threads in an instant messaging session. Instant messages are received from a list of contacts. Each of these messages are stored in a set of folders, wherein each folders in the set of folders stores messages for a contact in the number of contacts. Each file is linked for access though a graphical user interface. Message threads are handled by displaying a primary dialog window, wherein the primary dialog window includes an ongoing conversation pane and an outgoing message pane. Responsive to a user input identifying a new thread, a secondary dialog window is displayed, wherein the secondary dialog window includes an ongoing conversation pane and an outgoing message pane. Responses to outgoing messages sent from the outgoing message pane are displayed in the primary dialog window in the ongoing conversation pane in the primary dialog window. Responses to outgoing messages sent from the outgoing message pane in the secondary dialog window are displayed in the ongoing conversation pane in the secondary dialog window, wherein the primary dialog window and the secondary dialog window. | 10-09-2008 |
20080281933 | Session Management Enhancements for Instant Messaging Applications - The invention comprises an improved demand-based messaging system that enables a user to effectively manage multiple messaging sessions. The messaging system comprises a messaging program operable on a plurality of electrical computers or data processing machines connected by one or more communications media. The messaging program comprises a conventional message composer program, a conventional message transport program, a conventional message reader program, and an inventive, user-configurable, policy-driven session management program. | 11-13-2008 |
20080289017 | APPARATUS, METHODS, AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK - A system, method, and service associated with a computing grid or a virtual organization include a request for proposal (RFP) generator, where the RFP describes a data processing task. The RFP is provided to multiple resource providers via the computing grid where each of the resource providers is potentially suitable for performing the data processing task on behalf of the resource consumer. An RFP response processor receives and evaluates RFP responses generated by one or more of the resource providers. An exception processor accessible to the RFP response processor evaluates any exception in the RFP to determine if the exception disqualifies the RFP response. The exceptions may include, for example, job time limit exceptions, resource requirement exceptions, hardware/software platform requirement exceptions and others. Exception rules may be defined to guide the evaluation of the exception. | 11-20-2008 |
20080311885 | Traffic Shaping of Cellular Service Consumption Through Delaying of Service Completion According to Geographical-Based Pricing Advantages - Changes in user behavior of usage of wireless services from a mobile device are encouraged in order to effect shaping of traffic and utilization patterns among a plurality of cells within a rate plan region, wherein a discount indicator disposed in said mobile device is provided to notify a user of a discount available for consuming wireless service from a given cell. A geo-cost policy established for that user or mobile device in which rules and conditions according to the available discounts and class of service are defined. A service completer queues services and automatically completes queued services upon present conditions meeting said geo-cost policy rules, such as delaying and later delivering messages when the mobile device relocates to a cell where discounts are being offered. | 12-18-2008 |
20090002164 | SYSTEM AND METHOD TO QUICKLY AND ACCURATELY DETECT AND REPORT COMPONENT FAILURES USING RFID - An apparatus for reporting failed components which integrates a radio-frequency identification tag sub-circuit into each component of a system, including a latch controllable by a diagnostic function. The latch has at least two stable modes including an unlatched mode which prevents said tag from transmitting signals upon query by a radio-frequency identification reader, and a latched mode which enables said tag to transmitting signals upon query by a radio-frequency identification reader. The latch is transitioned to said latched mode by the diagnostic function responsive to detection of a failure, fault, or error condition of said component by said diagnostic function. Subsequent “reading” by an RFID reader of the tag allows identification of the failed component without requiring system power or communications busses to be operative, where only failed components respond to the RFID reader, and the latch prevents known-good components from responding to the reader. | 01-01-2009 |
20090017803 | SYSTEM AND METHOD FOR DYNAMIC DETERMINATION OF A COMMON MEETING POINT - A method, computer program product, and a data processing system continuously tracks the potentially changing location of a plurality of global positioning system (GPS) enabled mobile devices such as a cellular phones or Personal Digital Assistant (PDA). Generated GPS location updates are used to determine the location and directional velocity of each monitored device. Unique and separate optimal navigation convergence routes are provided to each device. Convergence locations and ETA indicators are provided. A common destination for the devices based on the separate convergence routes is provided. The common destination can be user selected or automatically determined by the system. The system is capable of providing convergence route and common destination information even when users of the various GPS devices are unaware of their present location, the location of other consenting devices, or the location of the common destination. | 01-15-2009 |
20090077341 | Method and System for Automated Memory Reallocating and Optimization Between Logical Partitions - A method and system for reallocating memory in a logically partitioned environment. The invention comprises a Performance Enhancement Program (PEP) and a Reallocation Program (RP). The PEP allows an administrator to designate several parameters and identify donor and recipient candidates. The RP compiles the performance data for the memory and calculates a composite parameter. For each memory block in the donor candidate pool, the RP compares the composite parameter to the donor load threshold to determine if the memory is a donor. For each memory block in the recipient candidate pool, the RP compares the composite parameter to the recipient load threshold to determine if the memory is a recipient. The RP calculates the recipient workload ratio and allocates the memory from the donors to the recipients. The RP monitors and update the workload statistics based on either a moving window or a discrete window sampling system. | 03-19-2009 |
20090094612 | Method and System for Automated Processor Reallocation and Optimization Between Logical Partitions - A method and system for reallocating processors in a logically partitioned environment. The present invention comprises a Performance Enhancement Program (PEP) and a Reallocation Program (RP). The PEP allows an administrator to designate several parameters and identify donor and recipient candidates. The RP compiles the performance data for the processors and calculates a composite parameter. For each processor in the donor candidate pool, the RP compares the composite parameter to the donor load threshold to determine if the processor is a donor. For each processor in the recipient candidate pool, the RP compares the composite parameter to the recipient load threshold to determine if the processor is a recipient. The RP then allocates the processors from the donors to the recipients. The RP continues to monitor and update the workload statistics based on either a moving window or a discrete window sampling system. | 04-09-2009 |
20090100294 | System and Method for Path Saturation for Computer Storage Performance Analysis - A system and method for path saturation in a storage area network so that the throughput of the storage area network may be determined. The system and method includes a software utility suite that uses either a system administration scripting language, e.g., Perl or Korn shell, or by compiled or machine language software. The software utility suite includes a set of software tools to be installed on one or more computer systems sharing access to a data storage system, such as a storage area network (SAN). The software tools running on these separate computer systems communicate and collaborate in a peer-to-peer fashion in order to coordinate loading, testing and measurement of storage throughput on the shared data storage system. The software tools further coordinate the collection, storage and presentation of results data obtained through such loading, testing and measurement of the storage throughput of the shared data storage system. | 04-16-2009 |
20090113486 | METHOD AND SYSTEM OF ENABLING COMPLETE VIEWING CONTENT FOR SELECTED PROGRAMMING - A system for enabling complete viewing of selected programming content. In response to receiving an input data stream from a programming service provider, the input data stream is stored in a supplemental storage. In response to a user selecting a programming channel after a program starts to air, the input data stream is stored in a programming storage. Then, the stored data stream is outputted from the supplemental storage to a viewing device. | 04-30-2009 |
20090119579 | System for Monitoring Personal Computer Documents for Sensitive Data - An apparatus, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped. | 05-07-2009 |
20090171781 | LOCATION BASED ADVERTISEMENT DELIVERY TO PERVASIVE DEVICES - A computer implemented method, computer program product, and data processing system display advertisements on a pervasive device. A wireless signal for an advertisement is received by the pervasive device. The advertisement includes advertisement information. Responsive to receiving the wireless signal, the advertisement information is compared to user preferences to determine whether the advertisement information matches the user preferences. In the event that the advertisement information matches at least one of the user preferences, the advertisement is displayed on the pervasive device. | 07-02-2009 |
20090193110 | Autonomic Storage Provisioning to Enhance Storage Virtualization Infrastructure Availability - The invention is an improvement to a storage virtualization system that enables the system to determine a class of service for potential storage devices and allows a user, administrator, or application to select a minimum class of service for any given type of data. The class of service is based upon factors that reflect a potential storage device's reliability, such as the device type and historical uptime data. In a P2P environment, the class of service also includes additional factors, such as the type of attached processing unit and the type of operating system running the attached processing unit. | 07-30-2009 |
20090210500 | SYSTEM, COMPUTER PROGRAM PRODUCT AND METHOD OF ENABLING INTERNET SERVICE PROVIDERS TO SYNERGISTICALLY IDENTIFY AND CONTROL SPAM E-MAIL - Presently, when an e-mail message is identified as SPAM, it is deleted and the process ends. According to the system, computer program product and method provided herein, upon identifying an e-mail message as SPAM, source information, identity and data stream of the e-mail message are transferred to a database accessible by trusted ISPs. The trusted ISPs may compare the transferred data stream to data stream of incoming and outgoing e-mail messages to determine whether they are also SPAM and the transferred source information and identity may be used to determine an original sender (i.e., a spammer) of the message. | 08-20-2009 |
20090289787 | RESIDENTIAL SECURITY CLUSTER WITH ASSOCIATED ALARM INTERCONNECTS - The illustrative embodiments provide a computer implemented method, apparatus, and computer program product for security cluster monitoring and notification. A security cluster comprised of a plurality of structures is monitored for a plurality of events. When an occurrence of an event as defined by a set of parameters associated with a structure in the plurality of structures is identified, information about the event is generated. The information about the event is displayed through a user interface and transmitted to a set of computing devices associated with a set of structures in the plurality of structures. | 11-26-2009 |
20100017456 | System and Method for an On-Demand Peer-to-Peer Storage Virtualization Infrastructure - A system and method for creating an on-demand virtual drive from dedicated storage on a plurality of partners in a peer-to-peer network using an agent installed on each of the partners. The agent has a contributing program and a requesting program. The contributing program creates a first storage unit and a second storage unit, formatting the second storage unit so that it is not visible to the operating system of the partner and transmitting the size of the second storage unit to the other partners. The requesting partner creates a virtual drive using space on selected partner's second drives, and directs data blocks in and out of the virtual drive. A rules engine incorporating RAID algorithms governs the selection of the partners and allocation of available space. | 01-21-2010 |
20100179878 | TARGETED VEHICLE ADVERTISING AND ENTERAINMENT SYSTEM METHOD - In accordance with an aspect of the present invention, a system may be used with a first database, a second database and a global positioning system, wherein the first database has advertising content data and advertising correlation data stored therein, wherein the second database has identifying data and correlation data stored therein and wherein the global positioning system is operable to provide a position signal corresponding to a position of the system and the velocity of the system. The system includes a sensor portion, a processor portion and a display portion. The sensor portion is operable to detect a parameter and to generate a detected signal based on the detected parameter. The processor portion is operable to generate a correlation between the detected signal and a portion of the identifying data, to obtain a portion of the advertising content data based on a portion of the correlation data and the advertising correlation data, and to generate a display signal based on the advertising content data and the position signal. The display portion is operable to display data based on the display signal. | 07-15-2010 |
20110016410 | Aging and Elimination of Avatars and Associated Objects from Computer Simulated Displayed Virtual Universes - Aging of avatars and objects toward eventual removal or removal from the displayed virtual universe through enabling the setting of defined parameters for the aging of said avatars and objects toward eventual removal of said avatars and objects from said virtual universe space; and predetermining a set of events, the occurrence of any one of which events would modify the aging of selected avatars and objects. | 01-20-2011 |
20110082797 | VEHICLE USAGE-BASED TOLLING PRIVACY PROTECTION ARCHITECTURE - A client-side on-board computing device is partitioned into a trusted computing module, and a private computing platform. When a metric report is required, the private computing platform retrieves an original data file and transfers the original data file to the trusted computing module. The original data file includes a global positioning system coordinate stream and time information. Communication between the private computing platform and the trusted computing module is via an unencrypted serial link. The private computing platform applies at least one billing algorithm to the original data file to determine a billing charge. The private computer platform signs and hashes the billing charge using a private key of a public-private endorsement key pair to create a signed metric report. The private computer platform forwards the signed metric report to the trusted computing module via the unencrypted serial link. The trusted computing module then forwards the signed metric report by the trusted computing module to a billing authority. | 04-07-2011 |
20140007169 | INTERACTIVE DVR SYSTEM | 01-02-2014 |