Patent application number | Description | Published |
20090006971 | PORTAL PAGE GENERATION - A solution for generating a portal page based on a data item. In particular, one or more portlets are selected from a set of available portlets based on the data item. The selected portlet(s) are then included on the portal page, which can be provided to a user device for display. The data item can be provided to a content provider for the portlet in order to generate the display area for the portlet. Information on the user and/or user device can be used when selecting the one or more portlets for inclusion on the portal page. | 01-01-2009 |
20090037823 | DETACHABLE AND REATTACHABLE PORTAL PAGES - A portal environment may include at least one detachable and reattachable portal page. The detachable and reattachable portal page may include a detach feature to detach the portal page from the portal environment. A reattach feature may be provided to reattach a detached portal page to the portal environment. In another embodiment, a method to detach and reattach at least one portal page may include detaching a selected portal page in response to activating a detach feature. The method may also include reattaching the detached portal page in response to activating a reattach feature. The selected, detached portal page may be transferred to a window in response to activating the detach feature. Tunneling communication may be provided between the detached portal page and the portal environment. | 02-05-2009 |
20090049387 | METHOD AND SYSTEM TO CONTROL OPERATION OF A PORTLET - A method to control a portlet associated with a portal page may include deactivating a selected portlet in response to operating a deactivation feature. The method may also include reactivating the selected portlet in response to operating a reactivation feature. The method may also include freezing a portlet content in the selected portlet in response to deactivating the selected portlet. The method may further include disabling hyperlinks, buttons and other inputs to the selected portlet in response to deactivating the selected portlet. The method may further include reconfiguring a portal server to ensure that a portlet content of a selected portlet cannot be affected while the selected portlet is deactivated. | 02-19-2009 |
20090282388 | OPTIMIZING THE HANDLING OF SOURCE CODE REQUESTS BETWEEN A SOFTWARE CONFIGURATION MANAGEMENT (SCM) SYSTEM AND A SOFTWARE INTEGRATED DEVELOPMENT ENVIRONMENT (IDE) USING PROJECTED ANCILLARY DATA - The present invention can include a solution for optimizing the handling of source code requests by a software configuration management (SCM) system by using projected ancillary data. When a SCM system receives a request for a source code file from a software integrated development environment (IDE), ancillary data can be projected for the requested source code file. Ancillary data can represent supplementary source code files and/or a revision update for an existing source code file. The projected ancillary data can be appended to a response message that already contains the requested source code file. The response message can then be sent to the software IDE. | 11-12-2009 |
20090319995 | ENHANCING SOURCE CODE DEBUGGING AND READABILITY USING VISUAL SYMBOLS - The present invention provides the ability to enable a special view of source code in which the textual name of classes, variables, methods and object instances can be replaced with graphical symbols. A method of displaying computer source code according to the present invention comprises assigning unique graphical symbols to a plurality of corresponding textual names of source code classes, methods, and variables, replacing the plurality of textual names of the classes, methods, and variables with the corresponding assigned unique graphical symbols, and displaying the source code with the unique graphical symbols in place of the corresponding textual names of the classes, methods, and variables. | 12-24-2009 |
20100017485 | ENFORCING CONFORMANCE IN EMAIL CONTENT - In an email message method and system, an email server receives at least one user-defined constraint for a first email message, where the user-defined constraint comprises at least one of an expected format and expected content of a reply email message. The email server associates the at least one user-defined constraint with the first email message and sends the first email message to a recipient. In response to receiving the reply email message, the email server validates the reply email message against the at least one user-defined constraint. | 01-21-2010 |
20110055704 | METHOD AND SYSTEM TO CONTROL OPERATION OF A PORTLET - A method to control a portlet associated with a portal page may include deactivating a selected portlet in response to operating a deactivation feature. The method may also include reactivating the selected portlet in response to operating a reactivation feature. The method may also include freezing a portlet content in the selected portlet in response to deactivating the selected portlet. The method may further include disabling hyperlinks, buttons and other inputs to the selected portlet in response to deactivating the selected portlet. The method may further include reconfiguring a portal server to ensure that a portlet content of a selected portlet cannot be affected while the selected portlet is deactivated. | 03-03-2011 |
20110264757 | NOTICE OF RESTORED MALFUNCTIONING LINKS - Embodiments include devices, systems, methods, and articles of manufacture that facilitate sending notices that a previously identified malfunctioning link or pointer has been restored or otherwise rendered useable. Embodiments can include systems with a registry wherein when a user discovers that a link is not functioning properly the registry may register the malfunctioning link, may facilitate further queries of the malfunctioning link, and may provide updates to one or more user portals that the previously malfunctioning link or pointer is no longer malfunctioning. | 10-27-2011 |
20110264953 | Self-Healing Failover Using a Repository and Dependency Management System - Systems, devices, methods, and articles of manufacture employing repair modules are provided. The modules may be automatically deployed in conjunction with dependency mechanisms upon identifying a malfunctioning application. The modules may be specifically tailored for certain diagnosis or repair and may be selected for deployment to a second application using information regarding the malfunction of a first application. | 10-27-2011 |
20110320954 | RELATED WEB FEED CORRELATION WITH DYNAMIC CONTENT ACCESS - At least one element of received first feed content of a first feed is determined by a computer client device to include a first feed correlation identifier. The first feed correlation identifier identifies a portion of a second feed associated with the at least one element of the received first feed content. The received first feed content is displayed with a first selectable user interface element associated with the at least one element of the received first feed content determined to include the first feed correlation identifier. A selection of the first selectable user interface element is detected. In response to detecting the selection of the first selectable user interface element, a feed server is queried for the portion of the second feed identified by the first feed correlation identifier. | 12-29-2011 |
20120179539 | PAY-PER-CLICK FRAUD PROTECTION - Embodiments of the invention provide a fraud prevention method for a pay-per-click data processing system. The method can include receiving a click through for a link in a host site which references a marketed site. The method also can include identifying a link address for the link in the click through. The method yet further can include comparing the identified link address to a modified link address recorded for an actual link address for the marketed site. Finally, the method can include quashing the click through if the identified link address is not the modified link address. Conversely, the method can include redirecting the click through to the marketed site if the identified link address is the modified link address. | 07-12-2012 |
20120179940 | NOTICE OF RESTORED MALFUNCTIONING LINKS - Embodiments include devices, systems, methods, and articles of manufacture that facilitate sending notices that a previously identified malfunctioning link or pointer has been restored or otherwise rendered useable. Embodiments can include systems with a registry wherein when a user discovers that a link is not functioning properly the registry may register the malfunctioning link, may facilitate further queries of the malfunctioning link, and may provide updates to one or more user portals that the previously malfunctioning link or pointer is no longer malfunctioning. | 07-12-2012 |
20120197985 | SUBSTITUTING CONTENT FOR UNDESIRABLE CONTENT IN A WEB BROWSER - A selection of a menu command that identifies a selected area of a web page as containing undesirable content is detected using a user input device of a client computer system executing a web browser that loads source web content from a group of servers. In response to the detection of the selected menu command, an alternate Internet Protocol (IP) address is substituted for a hostname of a website that provided the undesirable content. The alternate IP address is selected based on a content substitution profile of the client computer system. Using the substituted alternate IP address in response to a content request that identifies the undesirable content, the web page is reloaded with substituted source web content received from a server accessed by the alternate IP address displayed in the selected area of the web page instead of displaying the undesirable content identified in the content request. | 08-02-2012 |
20150032776 | CROSS-CUTTING EVENT CORRELATION - Embodiments of the present invention provide a method, system and computer program product for cross-cutting event correlation in an enterprise computing monitoring and management system. An enterprise computing monitoring and management system can include a hierarchy of nodes, where several of the nodes are each coupled to a corresponding embedded correlation engine and an event bus. The system further can include a root node among the nodes. The root node can be coupled to the event bus and to centralized correlation logic programmed to identify a high correspondence between events from a particular event source among the nodes and a particular set of correlation rules in that correlation engine. The identification of such correspondence can be used to move to the set of correlation rules to an embedded correlation engine closer to the particular event source. | 01-29-2015 |
20150082267 | MERIT BASED INCLUSION OF CHANGES IN A BUILD OF A SOFTWARE SYSTEM - Software configuration management for a software system under development includes receiving a change to the software system under development from a first user, determining a merit score for the first user, wherein the merit score is calculated according to success of prior changes received from the first user, and comparing, using a processor, the merit score for the first user with a merit threshold for the software system under development. The change is accepted for inclusion in a build of the software system under development responsive to determining that the merit score for the first user complies with the merit threshold. | 03-19-2015 |
20150082268 | MERIT BASED INCLUSION OF CHANGES IN A BUILD OF A SOFTWARE SYSTEM - Software configuration management for a software system under development includes receiving a change to the software system under development from a first user, determining a merit score for the first user, wherein the merit score is calculated according to success of prior changes received from the first user, and comparing, using a processor, the merit score for the first user with a merit threshold for the software system under development. The change is accepted for inclusion in a build of the software system under development responsive to determining that the merit score for the first user complies with the merit threshold. | 03-19-2015 |