Patent application number | Description | Published |
20110151862 | PERFORMANCE MANAGEMENT FOR A TELECOMMUNICATION NETWORK - A performance management method is operable for use with a performance management system linked to a telecommunication network. The method comprises receiving a problem report from a femtocell of a plurality of femtocells communicatively coupled to the telecommunication network. The femtocell is configured to provide communications from at least one mobile device to the telecommunication network through a broadband connection. The problem report identifies a fault being exhibited by a femtocell and a performance parameter identifying a degradation in the performance of the femtocell. The method includes analyzing the performance parameter for determining a corrective action to be performed in an environment linked to the femtocell. The method includes performing the corrective action in the environment linked to the femtocell. | 06-23-2011 |
20120208530 | PERFORMANCE MANAGEMENT FOR A TELECOMMUNICATION NETWORK - A performance management method is operable for use with a performance management system linked to a telecommunication network. The method comprises receiving a problem report from a femtocell of a plurality of femtocells communicatively coupled to the telecommunication network. The femtocell is configured to provide communications from at least one mobile device to the telecommunication network through a broadband connection. The problem report identifies a fault being exhibited by a femtocell and a performance parameter identifying a degradation in the performance of the femtocell. The method includes analyzing the performance parameter for determining a corrective action to be performed in an environment linked to the femtocell. The method includes performing the corrective action in the environment linked to the femtocell. | 08-16-2012 |
20140310763 | DETERMINING SECURITY FACTORS ASSOCIATED WITH AN OPERATING ENVIRONMENT - Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment. The computer determines security information corresponding to the current operating environment, wherein the security information includes a familiarity of the computer to the current operating environment, and a historical security of the computer in the current operating environment. | 10-16-2014 |
20140366086 | DETERMINING SECURITY FACTORS ASSOCIATED WITH AN OPERATING ENVIRONMENT - Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment. The computer determines security information corresponding to the current operating environment, wherein the security information includes a familiarity of the computer to the current operating environment, and a historical security of the computer in the current operating environment. | 12-11-2014 |
20150052516 | MANAGEMENT OF PRIORITIZING VIRTUAL MACHINES IN AN OPERATING ENVIRONMENT - Embodiments directed toward a method, system, and computer program product for placement of a plurality of virtual machines on a hardware resource are provided. The method can also include generating a user location vector for each candidate virtual machine from the plurality of candidate virtual machines by aggregating a plurality of user location metrics for each candidate virtual machine. The method can also include ranking, in response to a performance resource demanded by the plurality of candidate virtual machines being at or above a threshold of the performance resource available on the hardware resource, the candidate virtual machines as a function of an aggregate user location vector for each candidate virtual machine. The method can include selecting a subset of the candidate virtual machines for migration based on the ranking. | 02-19-2015 |
20150052528 | MANAGEMENT OF PRIORITIZING VIRTUAL MACHINES IN AN OPERATING ENVIRONMENT - Embodiments directed toward a method, system, and computer program product for placement of a plurality of virtual machines on a hardware resource are provided. The method can also include generating a user location vector for each candidate virtual machine from the plurality of candidate virtual machines by aggregating a plurality of user location metrics for each candidate virtual machine. The method can also include ranking, in response to a performance resource demanded by the plurality of candidate virtual machines being at or above a threshold of the performance resource available on the hardware resource, the candidate virtual machines as a function of an aggregate user location vector for each candidate virtual machine. The method can include selecting a subset of the candidate virtual machines for migration based on the ranking. | 02-19-2015 |
20150181370 | ELECTRONICALLY BINDING TO A LOST MOBILE DEVICE - A first mobile device detects a second mobile device in the vicinity of the first mobile device and determines that the second mobile device is lost. The first mobile device electronically binds to the second mobile device and obtains information relating to the second mobile device. The first mobile device sends the information relating to the second mobile device to a designated party. The first mobile device receives an indication that the second device is no longer lost. The first mobile device, in response to receiving the indication that the second device is no longer lost, unbinds from the second mobile device. | 06-25-2015 |
20160072849 | DETERMINING SECURITY FACTORS ASSOCIATED WITH AN OPERATING ENVIRONMENT - Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment. The computer determines security information corresponding to the current operating environment, wherein the security information includes a familiarity of the computer to the current operating environment, and a historical security of the computer in the current operating environment. | 03-10-2016 |
Patent application number | Description | Published |
20130080260 | Targeted Digital Media Content - Method and system is provided for targeted digital media content delivery. The method includes: receiving activation of the targeting service by a consumer; determining a first value of a human emotion metric corresponding to the mood of a consumer at a first time before or while consuming digital media content; determining a second value of that human metric at a second time while consuming the digital media content. The method also includes: comparing the first value of human emotion metric with the second value in order to determine a change in emotion of the consumer; and targeting the media content in accordance with the change in emotion of the consumer. | 03-28-2013 |
20160086230 | ADVERTISING WITHIN SOCIAL NETWORKS - An online social network is provided. A sentiment is determined for each of a plurality of users of an online social network (OSN) in relation to a first product. A category is determined for each of the plurality of users based, at least in part, on the sentiment of each of the plurality of users, respectively. A group including a first user and a second user of the plurality of users is generated based, at least in part, on the category of each of the first user and the second user and a relationship within the OSN between the first user and the second user. An advertisement is presented to the first user. An indication is presented to the first user that the advertisement is also presented to the second user. | 03-24-2016 |
20160086232 | ADVERTISING WITHIN SOCIAL NETWORKS - An online social network is provided. A sentiment is determined for each of a plurality of users of an online social network (OSN) in relation to a first product. A category is determined for each of the plurality of users based, at least in part, on the sentiment of each of the plurality of users, respectively. A group including a first user and a second user of the plurality of users is generated based, at least in part, on the category of each of the first user and the second user and a relationship within the OSN between the first user and the second user. An advertisement is presented to the first user. An indication is presented to the first user that the advertisement is also presented to the second user. | 03-24-2016 |
Patent application number | Description | Published |
20130293669 | SYSTEM AND METHOD FOR EYE ALIGNMENT IN VIDEO - A system for image manipulation enables an improved video conferencing experience. The system includes a camera; a display screen adjacent to the camera; a processor coupled to the camera and the display screen; and a memory coupled to the processor. Instructions executable by the processor enable receiving a source image from the camera and generating a synthetic image based upon the source image. The synthetic image corresponds to a view of a virtual camera located at the display screen. | 11-07-2013 |
20150220773 | SYSTEM AND METHOD FOR EYE ALIGNMENT IN VIDEO - A system for image manipulation enables an improved video conferencing experience. The system includes a camera; a display screen adjacent to the camera; a processor coupled to the camera and the display screen; and a memory coupled to the processor. Instructions executable by the processor enable receiving a source image from the camera and generating a synthetic image based upon the source image. The synthetic image corresponds to a view of a virtual camera located at the display screen. | 08-06-2015 |
20160004905 | METHOD AND SYSTEM FOR FACIAL EXPRESSION TRANSFER - A method and system of expression transfer, and a video conferencing system to enable improved video communications. The method includes receiving, on a data interface, a source training image; generating, by a processor and using the source training image, a plurality of synthetic source expressions; generating, by the processor, a plurality of source-avatar mapping functions; receiving, on the data interface, an expression source image; and generating, by the processor, an expression transfer image based upon the expression source image and one or more of the plurality of source-avatar mapping functions. Each source-avatar mapping function maps a synthetic source expression to a corresponding expression of a plurality of avatar expressions. The plurality of mapping functions map each of the plurality of synthetic source expressions. | 01-07-2016 |