Patent application number | Description | Published |
20080222085 | Communication Profiles for Integrated Database Messaging System - Systems, methods and media for providing communication profiles for an integrated database messaging system are disclosed. Embodiments of the method may include receiving from a user of the database messaging system a request for one or more profiles and determining one or more profiles associated based on the attributes of each profile request by accessing a profile database. The one or more profiles may include an indication of a user of the database messaging system and an Internet Protocol (IP) address. Embodiments may also include providing the one or more determined profiles to the requesting user. Further embodiments may include receiving an indication of one or more changes to the profile database and modifying the profile database. The user may include a database administrator (DBA) or user of a database. Each profile may contain personal, organizational, contact, group or other types of information. | 09-11-2008 |
20080222264 | Integrated Two-Way Communications Between Database Client Users and Administrators - Systems, methods and media for two-way communication between database client users and administrators are disclosed. Embodiments may include a method for communicating between database client users and administrators. Embodiments may include receiving a message request to send to one or more recipients, the message request including message content and an indication of the one or more recipients to which the message will be sent. Embodiments may also include determining an Internet Protocol (IP) address associated with each of the one or more recipients based on the message request and transmitting a message to each of the determined IP addresses, where the message includes the received message content. Embodiments may also include receiving a second message from one of the determined IP addresses. Further embodiments may include displaying the second message in a display window. Recipients of messages may include database administrators (DBAs) or database client users. | 09-11-2008 |
20080278348 | Determining Asset Location Via Local Triangulation - The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility. | 11-13-2008 |
20090028311 | CHANGING A STATE OF A REMOTE SWITCH BOX WHICH CONNECTS A PHONE TO A NETWORK - A computer implemented method, and apparatus for changing a state of a remote switch box. On a master switch box, a request is received from a user to set a state of the remote switch box to a selected state. A request to change the remote switch box to the selected state is transmitted from the master switch box to the remote switch box. The remote switch box connects a remote phone to a phone line. The master switch box receives a confirmation from the remote switch box of the change to the selected state. The confirmation contains the state of the remote switch box. The state of the remote switch box is displayed on the master switch box. | 01-29-2009 |
20090102721 | Apparatus and Method for Determining Asset Location Via Local Triangulation - The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility. | 04-23-2009 |
20100149558 | USER DEFINED ASSOCIATIONS OF COLORS TO CARTRIDGES FOR COLOR PRINTERS - A printer status interface controller displays an interface at a client system with a first color from among a plurality of colors associated with a first print cartridge position associated, from among a plurality of print cartridge positions of a printer. The printer status interface controller receives a user selection within the interface to specify an association of a second color from among the plurality of colors with the first print cartridge position. Responsive to the user selection to associate the second color with the first print cartridge position, a printer color association controller adjusts a reference to the first color in a print document to print in the second color through a second print cartridge in a second print cartridge position from among the plurality of print cartridge positions. | 06-17-2010 |
20120179746 | Supporting Compliance in a Cloud Environment - Gathering auditable data concerning actions in a cloud computing environment is automated by determining that one or more auditable data items are available associated with a requester and with at least one application program; responsive to determining that data items are available, transmitting a list of the available auditable data items to a requesting cloud client computer; subsequent to transmitting the list, receiving a data request from the cloud client computer for one or more particular auditable data items from the list; preparing the requested particular auditable data items for transmission according to a predetermined format; and transmitting the prepared requested particular auditable data items to the cloud client computer. Optionally, in some embodiments, the requesting cloud client computer may negotiate a data exchange format with the cloud service provider for receipt of the requested auditable information. | 07-12-2012 |
20120330890 | PROPAGATING TABLES WHILE PRESERVING CYCLIC FOREIGN KEY RELATIONSHIPS - The invention meeting the need identified above is the “Enhanced Database Propagation Program” or (EDPP). EDPP uses a cyclic member table that identifies a first source table in a cyclic relationship with a second source table. The first source table, identified in the cyclic member table, propagates first. EDPP replaces all foreign keys with “NULL” in the first target table. After the second source table in the subscription set has propagated to a second target table, EDPP updates first target table with the foreign keys from the first source table. | 12-27-2012 |
20150081827 | INTEGRATED TWO-WAY COMMUNICATIONS BETWEEN DATABASE CLIENT USERS AND ADMINISTRATORS - A method and system for communicating between database client users and administrators. A message request is received from a database administrator (DBA) responsible for managing aspects of a particular database. The message request includes a database name of the particular database, at least two message recipients, and message content. The message request is a request to send the message content only to the at least two message recipients consisting of at least two but not all database client users currently connected to the particular database. An Internet Protocol (IP) address associated with each message recipient is determined, without using an instant messaging address for any of the message recipients. A first message including the message content is simultaneously transmitted to each of the determined IP addresses. A second message, which includes a reply message to the first message, is received from one of the determined IP addresses. | 03-19-2015 |