Patent application number | Description | Published |
20080221820 | System for First Pass Filtering of Anomalies and Providing a Base Confidence Level for Resource Usage Prediction in a Utility Computing Environment - Provided is a system for monitoring resources in a utility computing environment (UCE). Measurements are evaluated to determine whether or not a particular resource requires remedial or other type of action. A sliding measurement window is employed to assemble a number of measurements corresponding to a particular resource. The number of intervals in a sliding measurement window is based upon best practices corresponding to the resource being measured and analyzed. A first threshold-crossing event and subsequent events are stored until the window is full, or closed. When the window is closed, the threshold-crossing measurements are analyzed to determine whether or not there exists an issue with the resource that requires action. Once a window has been closed and analyzed, the first threshold-crossing event and each subsequent event up to a second threshold-crossing event are discarded and the window reopens. | 09-11-2008 |
20080235302 | TRANSPARENT ALLOCATION OF A UNIQUE PER USER/TMP FS - The invention is directed to the transparent allocation of a unique per user /tmp file system. A method in accordance with an embodiment of the present invention includes: manipulating an operating system to provide each user with a private temporary file system; and constraining a process of the user to the user's private temporary file system. | 09-25-2008 |
20080250134 | Architecture for a Centralized Management System - An example of a solution provided here comprises: providing a logical design, including at least one hub containing central management tools, and a plurality of lower tiers containing local management tools; placing components according to the design; and providing, from the hub, one or more management functions. The lower tiers include one or more elements chosen from RIM's, spokes, and POD's. | 10-09-2008 |
20080270141 | VIRTUAL VOCAL DYNAMICS IN WRITTEN EXCHANGE - The illustrative embodiments described herein provide a computer implemented method and computer program product for providing context in an electronic text communication. A biometric gathering input device is associated with a sending data processing system. A first set of metrics is identified based on a sender interacting with the biometric gathering input device. A sending communications process on the sending data processing system is calibrated based on the first set of metrics. During the generation of the electronic text communication, a portion of the first set of metrics is identified based on the sender interacting with the biometric gathering input device to form a second set of metrics. The second set of metrics and the electronic text communication are sent from the sending data processing system to a recipient data processing system. The second set of metrics is represented at the recipient data processing system using criteria selected by a recipient of the electronic text communication. | 10-30-2008 |
20080307086 | Workflow Anywhere: Invocation of Workflows from a Remote Device - A method and program for providing the ability for systems personnel to use a personal wireless device, such as a mobile phone, palm device, or blackberry device, to receive a system alert regarding a developing situation requiring action and to be notified of pre-selected workflows that can resolve the situation prompting the alert. The systems personnel are then able to select a workflow, provide needed parameters, and provide the human approval to execute the workflow. The application packages the information provided by the user into a form usable by the orchestration/provisioning server. The server will perform the requested workflow as if entered on a local console and will respond to the device with a workflow status. | 12-11-2008 |
20080319972 | SHORT PERIOD SEARCH KEYWORD - A search engine provides a registration of short period search terms to provide memorable key words that allow a person to view a specific Web page without having to remember a long and complicated uniform resource locator. A search engine is modified to weight a specific search term to the highest value for a short period of time. A content provider may pay a price to have a memorable search term registered for a period of time. When the search engine receives a search request with the registered search term, the particular page will be placed on top of the search results due to the increased weight. | 12-25-2008 |
20080320574 | SYSTEM, METHOD AND PROGRAM FOR AUTHENTICATION AND ACCESS CONTROL - System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password. In response, the production server authenticates the GroupID with the group password and grants the user access to the file. | 12-25-2008 |
20090013029 | DEVICE, SYSTEM AND METHOD OF OPERATING A PLURALITY OF VIRTUAL LOGICAL SITES - Some demonstrative embodiments of the invention include, for example, devices, systems and methods of operating one or more virtual logical sites. A method may include, for example, running on a server at least one first virtual machine implementing at least part of a first virtual logical site, and at least one second virtual machine implementing at least part of a second virtual logical site interchangeable with the first virtual logical site. Other embodiments are described and claimed. | 01-08-2009 |
20090019123 | Session Management Enhancements for Instant Messaging Applications - An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR. | 01-15-2009 |
20090031331 | Web Client Endpoint Emulator - A web services endpoint emulator for testing and developing web server client program, which generates a service interface and makes the interface available for client consumption. Service interfaces are exposed with configuration options for each service. The configuration options produced by the invention includes pre-configured responses or the ability to prescript service responses from a configuration file, and to prompt a user for input during real time emulation of an endpoint service. | 01-29-2009 |
20090037580 | Method to Identify Transactions and Manage the Capacity to Support the Transaction - A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage. | 02-05-2009 |
20090040236 | Method of and System for Preventing Viewing by Bystanders of Information - A method of and system for preventing viewing by bystanders of information displayed on a display screen displays simultaneously an active image and a second image. The display screen has a first viewing angle and a second viewing angle. The first image is visible from the first viewing angle and invisible from said second viewing angle. The obfuscating image is invisible from the first viewing and visible from the second viewing angle. The system simultaneously manipulates the first and obfuscating images in response to input by a user. | 02-12-2009 |
20090051490 | METHODS AND SYSTEMS TO IMPROVE RFID INVENTORY POLLING ACCURACY - Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories. | 02-26-2009 |
20090069976 | CONTROL APPROPRIATENESS ILLUMINATION FOR CORRECTIVE RESPONSE - A computer implemented method, apparatus, and computer code product for a data processing system provide feedback to an operator of a vehicle indicating the appropriateness of an attempted actuation of a vehicle control. A current operating state of the vehicle is first identified. Responsive to identifying the current operating state, preferred control actions corresponding to the current operating state are identified. Responsive to receiving a notification of an attempted actuation of the vehicle control, the attempted actuation is compared to the preferred control actions. If the attempted actuation is one of the preferred control actions, an indicator is illuminated with a first color. If the attempted actuation is not one of the preferred control actions, the indicator is illuminated with a second color. | 03-12-2009 |
20090077566 | Method and Apparatus for Optimizing Web Services Binding - A method, apparatus, and computer instructions for optimizing Web services binding. A request is received from a client for Web services binding information for a Web service. The current availability of the Web service requested by the client is identified in response to receiving the request to form an identified current availability. An indication of the identified current availability of the Web service is sent to the client in response to identifying the current availability of the Web service requested by the client. The client uses the indication of the identified current availability to selectively use the Web service. | 03-19-2009 |
20090100419 | METHOD FOR DETERMINING PRIORITY FOR INSTALLING A PATCH INTO MULTIPLE PATCH RECIPIENTS OF A NETWORK - Embodiments of the invention provide a computer implemented method and system for installing a patch on at least some of the servers of a network having multiple servers. The method comprises the steps of identifying a plurality of servers of the network that each requires installation of the patch, and assigning two or more priority values to each of the identified servers. The priority values for a given identified server are each associated with a different criterion in a set of criteria. The method further comprises selectively processing the assigned priority values for respective identified servers, in order to determine an initial priority, comprising a first sort order, for installing the patch on each identified server. The first sort order is revised in accordance with information pertaining to prior use of respective identified servers, to provide a second sort order. The patch is installed on each of the identified servers, in an order determined at least in part by the second sort order. As an option, one or more additional sort orders can be provided for use in determining the order for installing the patch. | 04-16-2009 |
20090119403 | Composite Resource Models - A mechanism and model are provided for representing and managing composite resource models. When a resource monitor is deployed for a resource, the resource monitor scans for information that indicates that the resource under monitoring is part of a cluster, grid, or other composite configuration. The resource monitor then determines whether monitoring information for the resource should be reported differently because of the composite configuration. If monitoring information for the resource is to be reported differently, the resource monitor alters the reporting format to reflect the composite resource model. The resource manager may then receive the monitoring information and apply this information to individual resources and aggregates the monitoring information for composite resources. | 05-07-2009 |
20090132702 | Generic Method for Resource Monitoring Configuration in Provisioning Systems - A generic mechanism and model are provided to capture and store configuration profiles for resource monitors such that monitors can be flexibly deployed, configured, modified, and removed using appropriate sets of parameters and values. As an integral part of resource provisioning, this generic mechanism will require only a generic set of workflows and a generic data model to provision monitors. The provisioning system of the present invention captures and stores response parameters and values from monitors created during initial deployment such that these parameters can be used for later modification and removal of these monitors. | 05-21-2009 |
20090138510 | METHOD AND APPARATUS FOR ASSOCIATING HELP DESK TICKET WITH AFFECTED DATA PROCESSING SYSTEM - Computer implemented method, system and computer usable program code for servicing a problem with respect to a data processing system. A report of a problem with respect to a particular data processing system is received at a service facility. A help desk ticket is created for the received report that includes a description of the problem with respect to the particular data processing system. A ticket identifier is associated with the help desk ticket. The help desk ticket and the associated ticket identifier are stored in a database managed by the service facility, and the ticket identifier is also stored at the particular data processing system. The ticket identifier stored at the particular data processing system is accessed to identify the help desk ticket associated with the ticket identifier, and the help desk ticket identifies the problem with respect to the particular data processing system to enable servicing of the problem. | 05-28-2009 |
20090138583 | METHOD AND APPARATUS FOR GENERATING STATISTICS ON INFORMATION TECHNOLOGY SERVICE MANAGEMENT PROBLEMS AMONG ASSETS - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating a set of statistics on information technology service management problems among assets within a network. A data processing system monitors the network for a systems management system message containing information associated with a reported problem of an asset within the network. The systems management system message is generated by the asset associated with the reported problem. Responsive to detecting the systems management system message, the data processing system stores the information associated with the reported problem of the asset contained in the systems management system message to a set of stored data. The data processing system generates the set of statistics on information technology service management problems among the assets within the network using the set of stored data. | 05-28-2009 |
20090138889 | METHOD AND APPARATUS FOR EXPOSING INFORMATION TECHNOLOGY SERVICE MANAGEMENT PROBLEMS TO A SYSTEMS MANAGEMENT SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for exposing information technology service management problems associated with a particular data processing system to a systems management system. A ticket identifier is received by a data processing system. The ticket identifier identifies a reported problem associated with the data processing system. Responsive to receiving the ticket identifier, the data processing system identifies a systems management system application associated with the data processing system. A generated message containing the reported problem associated with the data processing system is sent to the systems management system. | 05-28-2009 |
20090157863 | System and Method of Enforcing Hierarchical Management Policy - A system and method for using hierarchical policy levels for distribution of software in a computer network. In one embodiment, computers of the network are arranged into a hierarchy. A management policy server with access to the network queries the hierarchy to identify computers at or below its own level within the hierarchy. Once a set of computers is identified, software programs, updates or policies are distributed, bypassing human intervention. | 06-18-2009 |
20090183024 | System Management Infrastructure for Corrective Actions to Servers with Shared Resources - A corrective action method or subsystem for providing corrective actions in a for a computing domain shared among multiple customers wherein different domain resources are shared by different customers, and each customer's corrective action preferences are accommodated differently according a repository of customer preferences. A database may be queried when a fault event or out-of-limits condition is detected for a given shared resource to determine which customers share the resource, determine each affected customer's response preferences, and to perform corrective actions according to those response preferences. For example, three customers may share a particular hard drive in a shared computing system. One customer may prefer to receive an email notice when the drive is nearly full, another may prefer to receive additional allocation of disk space elsewhere, and the third may prefer to receive a written report of space utilization. | 07-16-2009 |
20090210938 | Utilizing Previous Password to Determine Authenticity to Enable Speedier User Access - Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource. | 08-20-2009 |
20090254648 | Method and System for Using Presence in a System Management Environment - Method, system and computer program product for communicating information regarding a managed resource in a network data processing system. A method, in a network data processing system, for communicating information regarding a managed resource includes receiving management information regarding at least one managed resource. The received management information is converted into a specified format, and the converted management information is then sent to at least one management application in conjunction with the sending of presence information to the at least one management application. The converted management information may then be extracted from the presence information for use in any desired manner. The invention provides a convenient mechanism for communicating status information and other appropriate information regarding a managed resource to interested parties connected to the network data processing system. | 10-08-2009 |
20090265311 | Intellectual Property Subscribe And Publish Notification Service - Illustrative embodiments provide a computer implemented method, an apparatus in the form of a data processing system, and a computer program product for an intellectual property subscribe and publication notification service. In one illustrative embodiment the computer implemented method comprises obtaining an intellectual property source and creating a list of approved subscribers for the intellectual property source, wherein each subscriber of the list of subscribers indicates elements of interest. The computer implemented method further comprises creating a set of queries comprising the elements of interest associated with the list of approved subscribers and monitoring the intellectual property source for the elements of interest to create identified elements of interest. The computer implemented method then publishing notification of the identified elements of interest to the list of approved subscribers. | 10-22-2009 |
20090281922 | METHOD AND SYSTEM FOR SELECTING CLOTHING ITEMS ACCORDING TO PREDETERMINED CRITERIA - A method and system enables users to select clothing choices for various situations such as: 1) During the purchase of new clothing items; 2) when deciding what to pack for a trip, possibly to a different culture; 3) when deciding what to wear for a particular occasion, or what to pack for a trip. In this invention, a database contains information about a client's wardrobe. Each item in the database is placed in a defined category and has a unique identity. The user can enter certain search requirement that enable the invention to search the clothing database for clothing matches that are consistent with the search requirements. | 11-12-2009 |
20090288034 | Locating and Identifying Controls on a Web Page - An approach is provided that receives Web page data at the user's computer system with the Web page data including graphical user interface (GUI) controls. A process running on the client computer system identifies each of the GUI controls included in the Web page data. A rendered image of the Web page data is displayed in a visible pane on a display device that is connected to the client computer system with some of the GUI controls appearing in the visible pane. A user-controlled highlight is applied to an area on the visible pane proximate to each of the GUI controls that appear in the visible pane in order to highlight the GUI controls. The applied user-controlled highlight includes various visual characteristics that are different from the visual characteristics that are used to display the GUI controls. | 11-19-2009 |
20090315677 | Container Manifest Integrity Maintenance System and Method - A system, method, and medium for tracking the contents of a container in which the items stored in the container are provided with radio frequency identification (“RFID”) tags, and a tracker affixed to the container periodically polls the items in the container to collect identification information. An electronic manifest, also attached to the container, is updated periodically to reflect items which have been added to the container or removed from the container since the last polling. The tracker emulates an RFID tag when polled by an external reader, responding by uploading the entire electronic manifest to the external reader. The external reader and the affixed reader preferably utilize distinct RFID protocols so as to produce a hierarchical manifest data structure with high integrity. | 12-24-2009 |
20100031343 | USER POLICY MANAGEABLE STRENGTH-BASED PASSWORD AGING - Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period. | 02-04-2010 |
20100046392 | Controlling Software Distribution or File Transfer - An example of a solution provided here comprises automatically measuring bandwidth of a network connection; comparing results of the measuring, with bandwidth parameters; preventing a transfer of a file via the network connection, if measured bandwidth is less than a minimum acceptable value; providing to an end user an option of transferring a file via the network connection, if measured bandwidth is not less than a minimum acceptable value, but is less than an optimal value; and automatically transferring a file via the network connection, if measured bandwidth is greater than or equal to an optimal value. | 02-25-2010 |
20100125472 | RELATING CODE WITH INTELLECTUAL PROPERTY ASSETS - A method, system, and computer usable program product for relating code with intellectual property assets are provided in the illustrative embodiments. An intellectual property asset is identified. A portion of code is located from an entire code of a software application, such that the portion of code corresponds to the intellectual property asset. The portion of code is marked with information identifying the intellectual property asset. The portion of the code is executed during the execution of the software application. The execution of the portion of code is recorded, the recording indicating a use of the intellectual property asset. Additionally, a set of analysis control factors may be accepted. The recording may be analyzed according to the set of analysis control factors. A recommendation for an intellectual property asset related business decision to develop, invest in, or maintain certain intellectual property assets may be produced. | 05-20-2010 |
20100141480 | Directing a Movement of Visitors in an Event Venue for Maximizing Revenue - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for directing a movement of visitors in an event venue. In one embodiment, the process generates a visitor profile for each visitor at an event venue. The visitor profile may include, without limitation, a unique identifier and location data. The location data is collected from a set of sensors distributed throughout the event venue. The process then monitors a capacity of visitors at each venue destination using the location data. In response to determining that the capacity of visitors at a first venue destination exceeds a threshold capacity for the first venue destination, the process selects a second venue destination for accommodating visitors of the first venue destination. The process selects the second venue destination based on selection criteria. The process then dispatches a venue employee to the first venue destination to direct one or more visitors at the first venue destination to the second venue destination. | 06-10-2010 |
20100153945 | SHARED RESOURCE SERVICE PROVISIONING USING A VIRTUAL MACHINE MANAGER - A virtual machine manager (VMM) enables provisioning of services to multiple clients via a single data processing system configured as multiple virtual machines. The VMM performs several management functions, including: configuring/assigning each virtual machine (VM) for/to a specific, single client; scheduling the time and order for completing client services via the assigned client VM; instantiating a client VM at a scheduled time and triggering the execution of services tasks required for completing the specific client services on the client VM; monitoring and recording historical information about the actual completion times of services on a client VM; and updating a scheduling order for sequential instantiating of the multiple client VMs and corresponding client services, based on one or more of (i) pre-established time preferences, (ii) priority considerations, and (iii) historical data related to actual completion times of client services at a client VM. | 06-17-2010 |
20100217746 | Dynamic Workflow Documentation System - The dynamic workflow documentation system is a computer implemented process comprising the following steps: The dynamic workflow documentation system starts a workflow manager program, a class loader program in a computer memory and creates an instance of a workflow program in the computer memory. The dynamic workflow documentation system extracts metadata properties from the workflow program and records the metadata properties in the memory. The dynamic workflow documentation system notifies the workflow manager that a new instance of the workflow program has been created and repeats the steps of creating an instance of a workflow component program, extracting metadata properties, recording the metadata properties and notifying the workflow manager for all workflow components associated with the workflow program. Optionally, the dynamic workflow documentation system periodically polls the workflow program and associated workflow component programs and retrieves updated metadata properties which can be analyzed and used produce workflow status information. The status information can then be published as a file. Security and auditing functions of the dynamic workflow documentation system ensure that workflow programs execute according to the workflow requirements. | 08-26-2010 |
20110153753 | E-MAIL AWARENESS ENHANCEMENT - A method for preserving e-mail messages. It is determined, by a processor, whether an event has occurred with respect to an e-mail message, wherein an occurrence of the event results in a consequence activity with respect to the e-mail message. Responsive to determining that the event has occurred, it is determined, by the processor, whether criteria is satisfied, wherein the criteria relates to a status of an e-mail user. Responsive to determining that the criteria is satisfied, the consequence activity is prevented notwithstanding that the event has occurred. | 06-23-2011 |
20110161497 | Method, System and Program Product for Outsourcing Resources in a Grid Computing Environment - A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment. In addition, the dynamic feedback on the new resource request that exceeds a service level agreement can be used to develop a new service level agreement or temporary service offer that addresses the unique resource condition. | 06-30-2011 |
20120060213 | Orderly Change Between New And Old Passwords - A processor stores a current password in a current password storage area, which results in committing the current password as a valid password. In turn, the processor initiates a password change interval that indicates a required point at which to change the current password. The processor also stores a future password in a future password storage area, which activates the future password. Activating the future password allows a user to login using the future password, but is independent of the password change interval (e.g., does not reset the password change interval). The processor subsequently receives a login request from a user that includes a login password, and determines that the login password matches the future password. As a result, the processor authorizes the user in response to determining that the login password matches the future password. | 03-08-2012 |
20120240187 | POLICY BASED AUDITING OF WORKFLOWS - An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. | 09-20-2012 |
20140222791 | AUTHORITY BASED CONTENT FILTERING - A method and associated system for filtering content received from a search of information. Documents are received from the search. The search is based on a search request received from a requester. A subject of each received document is determined. A contributor associated with each document received as a result of the search is determined. Credentials of each contributor are received. For each received document, a determination is made of (i) a credential score for each credential of the contributor with respect to the subject of the document and (ii) a ranking score of the contributor on the subject of the document. The ranking score is determined based on the credential scores. The received documents are filtered, by using the ranking scores, to remove at least one document from the received documents, resulting in a set of remaining documents. The set of remaining documents are returned to the requester. | 08-07-2014 |
20140337273 | UPPER MERGED ONTOLOGY FOR IT ARCHITECTURE - An information technology (IT) architecture upper merged ontology which includes an upper merged ontology that is a representation framework for combined knowledge sources that are used in business and information technology; an upper merged ontology knowledge base containing information derived from an analysis of business and technical services pertaining to the IT architecture application; a plurality of semantic web application programming interfaces (APIs) that allow access to the upper merged ontology as a semantic web; a reasoning and constraint language (RaCL) that is a scripting language having the capabilities of model creation, automated reasoning and search and query operations such that scripts developed in the reasoning and constraint language can execute using the semantic web APIs; and a computer processor for representing and performing execution tasks. | 11-13-2014 |
20150046543 | Real Life to Digital Life Event Correlation - A method and system for correlating events with social media is provided. The method includes retrieving from a social network, social network data associated with users of the social network. The social network data is associated with event data associated with a user of the users. Temporary actions associated with a social network account of the user are enabled and a notification is transmitted to a group of users. In response, confirmation data associated with enabling the temporary actions is received from the group of users and permanent actions associated with the temporary actions are enabled. | 02-12-2015 |