Patent application number | Description | Published |
20120310618 | TECHNIQUES FOR APPLICATION TUNING - Techniques for tuning systems generate configurations that are used to test the systems to determine optimal configurations for the systems. The configurations for a system are generated to allow for effective testing of the system while remaining within budgetary and/or resource constraints. The configurations may be selected to satisfy one or more conditions on their distributions to ensure that a satisfactory set of configurations are tested. Machine learning techniques may be used to create models of systems and those models can be used to determine optimal configurations. | 12-06-2012 |
20120310870 | APPLICATION CONFIGURATION GENERATION - Techniques for tuning systems generate configurations that are used to test the systems to determine optimal configurations for the systems. The configurations for a system are generated to allow for effective testing of the system while remaining within budgetary and/or resource constraints. The configurations may be selected to satisfy one or more conditions on their distributions to ensure that a satisfactory set of configurations are tested. Machine learning techniques may be used to create models of systems and those models can be used to determine optimal configurations. | 12-06-2012 |
20140026221 | DEFENSE AGAINST SEARCH ENGINE TRACKING - Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit search queries as part of their normal activities. For a user, the search queries submitted and information regarding search results used to generate additional search queries on different, but related topics. The generated additional search queries are submitted automatically on behalf of the user at a sufficient frequency to prevent high accuracy data analysis on search queries. | 01-23-2014 |
20140033094 | HEURISTIC CACHING TO PERSONALIZE APPLICATIONS - Heuristic caching techniques are used to improve application usability within the constraints of computing resources. A user's behavior in connection with an application is recorded and used to intelligently determine which transitions of a user interface of the application to cache. In addition, the user may have one or more characteristics. Such characteristics may also be used to identify other users so that the other users' behavior in connection with the application can be used for intelligently determining which transitions of the user interface to cache. | 01-30-2014 |
20140074547 | PERSONAL AND WORKFORCE REPUTATION PROVENANCE IN APPLICATIONS - Techniques for storing information include making determinations whether to store data from a data source based at least in part on one or more reputation metrics calculated for an individual associated with the information. The scope of information collected about an individual is varied based on the individual's reputation and/or the reliability of the source of information, which may be a social network system or other data source. | 03-13-2014 |
20140074560 | ADVANCED SKILL MATCH AND REPUTATION MANAGEMENT FOR WORKFORCES - Data regarding members of an organization can be obtained and analyzed to calculate various values related to the reputation of the members and of the organization as a whole. The data sources may include external data sources, such as social network systems, and internal data sources, such as enterprise computer systems supporting the operations of the organization. The calculated values can be used to assist the organization in maintaining its own reputation, in complying with various laws and regulations, and for other activities in support of the organization's activities. | 03-13-2014 |
20140074928 | SEMI-SUPERVISED IDENTITY AGGREGATION OF PROFILES USING STATISTICAL METHODS - User profiles can be analyzed to identify profiles matching to the same identity. For example, profiles from different social network systems are analyzed to determine if the profiles are associated with the same user of the social network systems. Multiple heuristics may be calculated using different algorithms. The calculated heuristics may then be combined to generate a match score that indicates whether two profiles match. | 03-13-2014 |
20140075500 | REPUTATION-BASED AUDITING OF ENTERPRISE APPLICATION AUTHORIZATION MODELS - Reputation metrics are used to gauge risk of individuals to an organization, such as employees of a business. The reputation metrics may be calculated from both internal and external data sources, including social network profiles of the individuals. Calculations of risk are used to make determinations regarding the activities the individuals are authorized to engage in. | 03-13-2014 |
20150089366 | TEMPORAL GRAPH VISUALIZATION - An embodiment provides a timeline upon which a playhead indicator is moved or positioned. Changes to a displayed graph that are within a predetermined interval of the playhead indicator's time position are shown graphically on or near the graph. Actor icons are positioned on or near the displayed graph. The actor icons correspond to different entities (e.g., a person, group, organization, software agent, etc.) that has made a change to the graph. Change indicators both on the timeline and in association with the actor icons can be color-coded to indicate addition, deletion, modification or other operations to graph items or to other objects being displayed. | 03-26-2015 |
20150089422 | COMPUTER USER INTERFACE INCLUDING LENS-BASED NAVIGATION OF GRAPHS - In one embodiment, a movable area, referred to as a “lens,” on a graph display allows the user to preview the zoom level of the graph. When a node, line or other item in the graph is in the area of the lens, then the item can be shown at a different zoom level than rest of the graph. In particular embodiments, a heuristic algorithm can be used to dynamically determine the visual representation of a node when in the lens as unique from the depiction of the node when the node is outside of the lens. Operations can be made to the graph items within the lens such as adding, moving, deleting, or connecting items, etc. Other features are described. | 03-26-2015 |