50th week of 2010 patent applcation highlights part 53 |
Patent application number | Title | Published |
20100318529 | METHOD OF ACCESSING A WORK OF ART, A PRODUCT, OR OTHER TANGIBLE OR INTANGIBLE OBJECTS WITHOUT KNOWING THE TITLE OR NAME THEREOF USING FRACTIONAL SAMPLING OF THE WORK OF ART OR OBJECT - A method of identifying a work such as a text, a video, information about what was perceived, or a product without the person interested in the object knowing the title of the object. A fractional sampling device is used by the person to acquire a sample of the work and store the sample in the device. The device is subsequently connected to a search apparatus via a physical wire connection, wireless interface, or the Internet. The sampling stored in the device is then provided to the search apparatus. The search apparatus accesses one or more databases in which is stored substantially the entire contents of the work including identifying indicia about the work. Subsequently the search apparatus matches the sample with information about the work stored in the database and provides information identifying the work, related information, or the work itself to the person. This invention also allows a person to perceive a work at the person preferred location and time. | 2010-12-16 |
20100318530 | Method of Compound Document Comparison - A method and system for comparing compound documents. An original compound document and a modified compound document are analyzed to determine and mark the location of embedded objects. A comparison is performed between an original primary document and the modified primary document, ignoring the embedded objects, the output of which is a comparison output document. The embedded objects are compared by copying the contents of the embedded objects to compatible documents, comparing the embedded object from the original compound document and the embedded object from the modified compound document, the output of which is inserted into the comparison output document using the location markers of the embedded objects. | 2010-12-16 |
20100318531 | SMOOTHING CLICKTHROUGH DATA FOR WEB SEARCH RANKING - Described is a technology for using clickthrough data (e.g., based on data of a query log) in learning a ranking model that may be used in online ranking of search results. Clickthrough data, which is typically sparse (because many documents are often not clicked or rarely clicked), is processed/smoothed into smoothed clickthrough streams. The processing includes determining similar queries for a document with incomplete (insufficient) clickthrough data to provide expanded clickthrough data for that document, and/or by estimating at least one clickthrough feature for a document when that document has missing (e.g., no) clickthrough data. Similar queries may be determined by random walk clustering and/or session-based query analysis. Features extracted from the clickthrough streams may be used to provide a ranking model which may then be used in online ranking of documents that are located with respect to a query. | 2010-12-16 |
20100318532 | UNIFIED INVERTED INDEX FOR VIDEO PASSAGE RETRIEVAL - A method for information retrieval includes extracting from a video document visual data items and textual data items that occur in the document at respective occurrence times. Indexing records, which index both the visual and the textual data items by their respective occurrence times, are constructed and stored in a memory. | 2010-12-16 |
20100318533 | ENRICHED DOCUMENT REPRESENTATIONS USING AGGREGATED ANCHOR TEXT - A system and method for aggregating anchor text over the web graph and using the aggregated anchor text to enrich document representations. For a target page, its internal inlinks, which point to the target page and are within the site containing the target page, are identified first. Then external anchors that point to the internal inlinks from pages outside of the site are identified. Anchor text of the external anchors are collected, weighted, stored, and used to enrich document presentations. The method not only reduces the number of pages with no anchor text, but also adds lines of anchor text to URLs. | 2010-12-16 |
20100318534 | INTELLIGENT RETRIEVAL OF DIGITAL ASSETS - A technique enables intelligent retrieval of digital assets. The technique involves gathering metadata based on a scan of the digital assets. The gathered metadata includes metadata entries, each metadata entry identifying a particular digital asset and a particular set of digital asset properties of that particular digital asset. The technique further involves storing the digital assets in encrypted form within a digital asset repository of the electronic system after gathering the metadata, and updating a metadata database of the electronic system based on the metadata entries, the metadata database being distinct from the digital asset repository. Accordingly, while the digital assets are stored in the digital asset repository in encrypted form, specific digital assets within the digital asset repository are identifiable in response to a database search of the metadata database since the database search is able to use digital asset properties as searching criteria. | 2010-12-16 |
20100318535 | PROVIDING SEARCH RESULTS TO A COMPUTING DEVICE - Systems and methods for providing search results to a mobile computing device are provided herein. One exemplary method includes receiving a search request from the mobile computing device, where the search request includes location data identifying a location of the mobile computing device. If the search request includes an explicit search query, the method includes associating candidate search information derived from the explicit search query with the location identified by the location data of the search request. If the search request includes an explicit search query, the method also includes sending query-based search results to the mobile computing device. If the search request includes an implicit search query, the method includes sending location-based search results to the mobile computing device. The location-based search results are derived from candidate search information associated with the location identified by the location data. | 2010-12-16 |
20100318536 | QUERY TREE NAVIGATION - System, computer implemented method and computer program product for preparing and navigating a query tree including a plurality of query nodes and informational nodes. Each query node is associated with a prompt, branching criteria and keywords. A current query node provides a prompt to a user and a user response is received and analyzed to identify branching criteria and keywords from the user response. The method navigates to another node in the query tree in consideration of the branching criteria received in the user response and a comparison between the keywords received in the user response and the keywords associated with the query nodes. The comparison may validate navigation to a destination node corresponding to the branching criteria or the comparison may indicate incorrect navigation of the query tree. Corrective navigation can be implemented in various ways based upon the keywords received in the user response. | 2010-12-16 |
20100318537 | PROVIDING KNOWLEDGE CONTENT TO USERS - Systems, methods, and computer-storage media for generating and providing knowledge content to users utilizing a web architecture that integrates information across data silos through a common, flexible data storage schema, such as a star or snowflake schema, are provided. Data from a content graph, a user activity graph, a social graph, and temporal data as it relates to each of the content graph, the social graph and the user activity graph, is stored in a knowledge content database utilizing the star schema. In this way, data from each of these formerly disparate sources may be accessed from a common, extensible application platform utilizing ontologies and pivot table functionality, thus providing smarter, more comprehensive knowledge in response to received user queries. | 2010-12-16 |
20100318538 | PREDICTIVE SEARCHING AND ASSOCIATED CACHE MANAGEMENT - A computer system including instructions stored on a computer-readable medium, may include a query manager configured to manage a query corpus including at least one predictive query, and a document manager configured to receive a plurality of documents from at least one document source, and configured to manage a document corpus including at least one document obtained from the at least one document source. The computer system also may include a predictive result manager configured to associate the at least one document with the at least one predictive query to obtain a predictive search result, and configured to update a predictive cache using the predictive search result, and may include a search engine configured to access the predictive cache to associate a received query with the predictive search result, and configured to provide the predictive search result as a search result of the received query, the search result including the at least one document. | 2010-12-16 |
20100318539 | LABELING DATA SAMPLES USING OBJECTIVE QUESTIONS - Described is a technology for obtaining labeled sample data. Labeling guidelines are converted into binary yes/no questions regarding data samples. The questions and data samples are provided to judges who then answer the questions for each sample. The answers are input to a label assignment algorithm that associates a label with each sample based upon the answers. If the guidelines are modified and previous answers to the binary questions are maintained, at least some of the previous answers may be used in re-labeling the samples in view of the modification. | 2010-12-16 |
20100318540 | IDENTIFICATION OF SAMPLE DATA ITEMS FOR RE-JUDGING - Described is a technology for identifying sample data items (e.g., documents corresponding to query-URL pairs) having the greatest likelihood of being mislabeled when previously judged, and selecting those data items for re-judging. In one aspect, lambda gradient scores (information associated with ranked sample data items that indicates a relative direction and how “strongly” to move each data item for lowering a ranking cost) are summed for pairs of sample data items to compute re-judgment scores for each of those sample data items. The re-judgment scores indicate a relative likelihood of mislabeling. Once the selected sample data items are re-judged, a new training set is available, whereby a new ranker may be trained. | 2010-12-16 |
20100318541 | Filter Range Bound Paged Search - A filter range based search control to request a range of data from one or more directory servers. A directory server receives a search request from a client application comprising a search filter control defining a set of requested data, a sort control defining a sorting order of the set of requested data, and a range filter control defining a range of entries in the requested data. Data entries matching a search value defined in the search filter control and sorted according to sort attributes defined in the sort control are obtained from a set of directories associated with the directory server to form a sorted list of matching entries. A subset of data entries in the sorted list that match a range value defined in the range filter control are collected, and a response comprising the collected subset of data entries is then sent to the client application. | 2010-12-16 |
20100318542 | METHOD AND APPARATUS FOR CLASSIFYING CONTENT - Natural-language words are associated with content. The natural-language words are identified from, for example, metadata and/or the actual content itself. Each word identified for the content is associated with the identified genre of the content (from, for example, its tagged metadata). A database is then maintained having a number of occurrences of each word from the multiple content items for each genre. Once the word/genre database is created, subgenres for a particular program/content can be created by once again using statistics from the words identified for that program to rank the most appropriate genres for the words and produce sets of the highest ranked genres. | 2010-12-16 |
20100318543 | INTERACTIVE PHYSICAL DESIGN TUNING - An architecture for providing interactive sessions for physical database design is described, allowing users to readily try different options, identify problems, and obtain physical designs in a flexible way. Embodiments based on a .NET assembly and modifications to a database management system (DBMS) are also described. | 2010-12-16 |
20100318544 | DEVICE AND METHOD FOR SELECTING AT LEAST ONE MEDIA FOR RECOMMENDATION TO A USER - The invention relates to a method and device for selecting at least one media for recommendation to a user. The device comprises an interface to a users database comprising data relative to users medias consumption and data relative to connections between users. The device further comprises a statistical analyzer receiving data relative to users medias consumption and connections between users in inputs and generating a first list of at least one media for output. The device comprises an interface to a medias library comprising parameters indicative of medias content. The device also comprises an analytical analyzer receiving data relative to users medias consumption and parameters indicative of medias content in inputs and generating a second list of at least one media for output. The device also comprises a recommendation engine receiving the first and second lists of media and selecting at least one media for recommendation to the user. | 2010-12-16 |
20100318545 | PERIOD TO DATE FUNCTIONS FOR TIME INTELLIGENCE FUNCTIONALITY - A system for extending a Time Intelligence language to provide support for period-to-date functions and for generating member sets in response to data queries is provided. The system may apply member aggregation functions and queries across a plurality of heterogeneous data sources. Each data source is aligned to a reference dimension and is said to organize data according to at least one level of granularity. In some embodiments, a member aggregation function specifies a period (e.g., year, quarter, month) and retrieves data from a data source starting with the current specified period and ending with the most recently completed period equal to the granularity of the data source. The system may allow a user to further customize a member aggregation function by specifying a granularity, a period offset, or a granularity end offset. Additionally, the system may generate a caption to display in association with the retrieved data. | 2010-12-16 |
20100318546 | SYNOPSIS OF A SEARCH LOG THAT RESPECTS USER PRIVACY - Described is releasing output data representing a search log, in which the data is suitable for most data mining/analysis applications, but is safe to publish by preserving user privacy. The search log is processed such that a query is only included if a sufficient count of that query is present; noise may be added. User contributions that are considered may be limited to a maximum number of queries. The output may indicate how often (possibly plus noise) that each query appeared. Other output may comprise a query-action graph, a query-inaction graph and/or a query-reformulation graph, with nodes representing queries and nodes representing actions, inactions or reformulations (e.g., clicked URLs, skipped URLs, or selected related queries), and edges between nodes representing action, skip or selection counts (possibly plus noise). The output may correspond to the top results/related queries returned from a search. | 2010-12-16 |
20100318547 | PRESERVATION OF DIGITAL CONTENT - Methods for generating a characterizing summary and generating a collection of relevant preservation objects in a preservation system are provided. A characterizing summary is generated by collecting first information about a preservation object; collecting second information about other preservation objects or other metadata; generating a characterizing summary according to the first information and the second information; and adding the characterizing summary to the preservation object. A collection of relevant preservation objects is generated by accessing one or more preservation objects by way of one or more metadata included in a target preservation object constructed for content data; determining whether each of the accessed preservation objects is relevant to the target preservation object; adding each relevant preservation object to a list of relevant preservation objects; and generating the collection of relevant preservation objects according to the list of relevant preservation objects. | 2010-12-16 |
20100318548 | Querying by Concept Classifications in an Electronic Data Record System - Embodiments of the present invention enable processing of concept-based query requests submitted to a query service within a healthcare transaction framework. In embodiments, a terminology service within the healthcare transaction framework manages terminology content (concepts represented by a set of terminologies). In embodiments, search criteria from a data access query request are submitted to the terminology service to extract a set of concepts from the terminology content that are associated with the search criteria. In embodiments, equivalence search criteria include a seed concept, and the terminology service returns a set of equivalent concepts comprising the seed concept. In embodiments, classification search criteria include a classification identifier, and the terminology service returns a set of concepts associated with the classification identifier. In embodiments, the query service generates and submits a data access query comprising predicates associated with the returned set of concepts. | 2010-12-16 |
20100318549 | Querying by Semantically Equivalent Concepts in an Electronic Data Record System - Embodiments of the present invention enable processing of concept-based query requests submitted to a query service within a healthcare transaction framework. In embodiments, a terminology service within the healthcare transaction framework manages terminology content (concepts represented by a set of terminologies). In embodiments, search criteria from a data access query request are submitted to the terminology service to extract a set of concepts from the terminology content that are associated with the search criteria. In embodiments, equivalence search criteria include a seed concept, and the terminology service returns a set of equivalent concepts comprising the seed concept. In embodiments, classification search criteria include a classification identifier, and the terminology service returns a set of concepts associated with the classification identifier. In embodiments, the query service generates and submits a data access query comprising predicates associated with the returned set of concepts. | 2010-12-16 |
20100318550 | IMAGE SEARCHING SYSTEM, IMAGE SEARCHING APPARATUS, AND MEDIUM STORING IMAGE SEARCHING PROGRAM - An image searching system is characterized by including a display unit capable of displaying a plurality of images arranged two-dimensionally, a range determining unit performing a determination of a search target range from an arrangement area of the plurality of images displayed on the display unit using a selected range set in advance, an image refining unit refining search target images by performing the determination of the search target range by the range determining unit a plurality of times until the selected range becomes a minimum selected range while gradually reducing the selected range, an image selecting unit selecting any of images included in the selected range when the selected range becomes the minimum selected range by performing the refining of the search target images by the image refining unit, and a display control unit causing the display unit to display, while maintaining a state of arrangement, images included in the search target range being determined each time the search target range is determined by the range determining unit when refining the search target images by the image refining unit, and causing the display unit to display a selected image when any of the images included in the selected range is selected by the image selecting unit. | 2010-12-16 |
20100318551 | METHOD AND SYSTEM FOR SEARCH STRING ENTRY AND REFINEMENT ON A MOBILE DEVICE - A hardware and/or software facility facilitates search string entry and refinement on a mobile device. A user enters a search string on a mobile device via one or more input methods. The facility searches the user's device and/or one or more remote data areas and returns search results that match the entered search string. Search results include, for example, information, links, files, and other results that correspond to the search string. Before and/or after the search is performed, the facility applies one or more filters that produce refined search results. Filters may relate to location, category, synonyms, data type, social-network, and other groupings—including user-defined groupings—that may refine the search results. Filters may be applied automatically and/or in response to user selection of a filter. | 2010-12-16 |
20100318552 | SYSTEM AND A METHOD FOR PROVIDING INFORMATION TO A USER - A media presenter or e-book synchronizing with a server or central unit, where the server or central unit is adapted to perform multiple searches and provide the results in predetermined folders, and where, upon synchronization, the media presenter provides the received search results in corresponding folders therein. | 2010-12-16 |
20100318553 | PRODUCT FIX-EFFECTIVENESS TRACKING AND NOTIFICATION SYSTEM AND METHOD - Methods and apparatus are provided for tracking the effectiveness of a modification that has been installed into a product in response to an issued modification notice. A product removal database having removal data stored therein that are associated with one or more products is periodically accessed at a user-specified periodicity. One or more user-selected fix-effectiveness algorithms are executed to determine if at least a portion of the periodically accessed removal data matches one or more user-specified keywords that correlate to the modification. If it is determined that at least a portion of the periodically accessed removal data matches the one or more user-specified keywords, then an alert is transmitted to a preset destination. | 2010-12-16 |
20100318554 | CONTENT MESH SEARCHING - Described is a technology by which private content maintained behind a firewall (e.g., in a “mesh”) may be searched, browsed, and accessed via an index that exists outside of the firewall. Searching of the index may include checking permissions of a user against permissions associated with metadata in the index, e.g., per watch folder into which file content is added. When content is selected, e.g., by clicking on a search result, a request is made. An application polls for such requests, and when detected, pushes a copy of the content through the firewall to the requester. The search may be performed over more than one index, with aggregated search results returned. | 2010-12-16 |
20100318555 | INDEXING AND SEARCHING OF ELECTRONIC MESSAGE TRANSMISSION THREAD SETS - A method includes describing the thread configurations of a volume of well-ordered electronic message transmissions (EMT) and utilizing the thread configuration data to conduct selective searches of the EMT volume. An apparatus includes a thread processor and a query manager. The thread processor analyzes the EMT threads and records the thread configuration data. The query manager utilizes the thread configuration data to conduct selective searches of the EMT volume. | 2010-12-16 |
20100318556 | Exporting and Importing Business Objects Based on Metadata - A metadata file can be automatically generated based on a database instance and a user defined maximum depth. The relationships between data objects that constitute a business object may be visualized in a tree. The maximum depth limits the number of levels in the tree to traverse. A metadata file describes the structure of a business object and relationships between sets of data objects that constitute the business object. The structure defined in the metadata file can be used to export instances of the business object from the database. The exported business object instances can be imported to another database. | 2010-12-16 |
20100318557 | Radius Based Building Material Search System - A method and system for conducting building material searches is disclosed. The system may include a radius-based search of local manufacturers through a comprehensive database of product and manufacturer information. | 2010-12-16 |
20100318558 | VISUAL METHOD AND SYSTEM FOR RDF CREATION, MANIPULATION, AGGREGATION, APPLICATION AND SEARCH - The present invention provides a system and method whereby unsophisticated users can create manipulate and use semantic ontologies for storing, searching and retrieving information over the Internet by forming RDF statements using visual identifiers for predicates. | 2010-12-16 |
20100318559 | Information Value-Driven Near Real-Time Decision Support - Information-based decision support may be provided by a query handler configured to receive a query which is applicable against different combinations of a plurality of remote databases and a corresponding plurality of replica databases including at least some replicated data of respective ones of the remote databases, wherein each replica database is synchronized with a corresponding remote database at a plurality of synchronization times and the different combinations include future versions of the replica databases defined by corresponding synchronization times. A query plan generator may be configured to determine information values associated with at least a subset of the different combinations, based on a query value associated with the query and on a diminishment of the query value caused by a corresponding combination, and further configured to generate, based on the information values, a query plan including at least one combination of the different combinations for executing the query therewith. | 2010-12-16 |
20100318560 | SEARCH PROCESSOR AND SEARCH PROCESSING METHOD - A search processor for performing search processes by comparing data registered in a database with a search key includes a search database in which data to be searched for is registered and that outputs the registered data according to an input address. The processor further includes a search segment database in which address segment information and bit segment information are registered. It outputs the registered information, the address segment information indicating address segmentation in the search database and the bit segment information indicating bit-position segmentation in the search database. A search address used in the search database is generated based on the address segment information. The bit position of data registered at that search address is then converted based on the bit segment information, and the converted data is compared with the search key so as to output comparison results. | 2010-12-16 |
20100318561 | Method and System to Search Objects in Published Literature for Information Discovery Tasks - The present invention relates to the identification, extraction, linking, storage and provisioning of data that constitute the captioned components of published or “print ready” literature for computerized information discovery activities including search, browse and data mining. These components, or objects, include the tabular presentation of data (“tables”) and graphics such as “figures”, “images” and “illustrations” typically used to supplement the textual narrative of the publication. | 2010-12-16 |
20100318562 | EFFICIENT DATABASE LOOKUP OPERATIONS - A system, apparatus, method, and computer-readable media are provided for efficient database lookup operations. According to method, procedural checks for generating a response to a database query are converted into a set of database operations. The database operations are performed the first time a query of the database is received to generate a set of possible results for the query. The set of possible results for the query are then stored. A specific answer to the query is generated from the set of possible results. Future database queries are responded to by generating an answer to the query from the stored set of possible results. | 2010-12-16 |
20100318563 | TERMINAL AND METHOD FOR IDENTIFYING CONTENTS - A terminal, server and method for identifying contents are discussed. According to an embodiment, the present invention provides a method for controlling content in a content identifying system, including receiving content related information regarding a content from a terminal; generating function information for calculating a content ID based on the content related information; transmitting the function information to the terminal; receiving a content ID generated based on the function information from the terminal; comparing the received content ID with stored content ID information; and performing at least one operation based on the comparison result. | 2010-12-16 |
20100318564 | IMPLEMENTING AN EPHEMERAL FILE SYSTEM BACKED BY A NFS SERVER - Provided is a method for implementing a file system that includes a combination of read-only and read/write parts. A file system located on a data server maintains an original copy of a data store. An “Ephemeral” file system (EFS) is created on a client computer. The data server is contacted only once for each file accessed and the copy is in an original state each time the system is mounted. Changes made to the file system by one client are not seen by other clients. The EFS maintains the file system state in memory and uses the NFS server as a backing stored for cached file data. File data for files created on the client are backed up by the client system's swapping space. | 2010-12-16 |
20100318565 | Distributed Computing Management - Management of distributed computing systems is required, for example, to carry out activities using shared resources such as computational tasks, in-silico experiments and other tasks. In an embodiment a distributed computing graph represents processes executing in the distributed computing system in order to carry out the activity and this graph is available to entities in the distributed computing system. For example, a user interface at an entity in the distributed computing system enables a user to view a local representation of the distributed computing graph and to control the activity using that local representation which maps dynamically to and from the underlying distributed computing graph. In examples, the local representation of the distributed computing graph enables live control of the activity without the need for compilation. In examples the distributed computing graph is shared through the distributed computing system using peer-to-peer distribution or using a replication mechanism. | 2010-12-16 |
20100318566 | BEHAVIOR HISTORY RETRIEVAL APPARATUS AND BEHAVIOR HISTORY RETRIEVAL METHOD - A meta classification section assigns the degree of accuracy capable of identifying an individual to person feature information containing a face, color, shape, etc., and person passage information and stores the metadata of the person feature information and the person passage information for each degree of accuracy, a discrete retrieval section retrieves the person to be retrieved in the high accuracy metadata stored by the meta classification section, a dependence determination section determines a person having a dependence on the person to be retrieved using a plurality of retrieval results hit in the discrete retrieval and the high accuracy metadata, a query generation section regenerates a retrieval key from the identifier of the person having a dependence and the identifier of the person to be retrieved, and a discrete candidate-to-candidate retrieval section retrieves the person corresponding to the regenerated retrieval key in the low accuracy metadata. | 2010-12-16 |
20100318567 | USE OF DATA PATTERNS FOR RAPID SEARCH OF COMPLEX RULES IN A RULES-BASED SEARCH ENGINE - In various embodiments, systems and methods are provided that can facilitate searching for entities, such as rules, that apply to search criteria. The disclosed systems and methods can reduce some of the performance bottlenecks associated with, for example, rules-based search systems by using metadata. The metadata may be generated to reduce the size of information about a set of entities that is required to be searched. In some embodiments, the metadata may represent one or more tuple elements, such as keys and values of keys in key-value pairs. | 2010-12-16 |
20100318568 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR COMBINING KEYWORDS INTO LOGICAL CLUSTERS THAT SHARE SIMILAR BEHAVIOR WITH RESPECT TO A CONSIDERED DIMENSION - A computer-implemented method and system for combining keywords into logical clusters that share a similar behavior with respect to a considered dimension are disclosed. Various embodiments are operable to order a list of keywords from high activity to low activity, partition the list into at least two sets, a head partition including keywords with an activity level above a predefined threshold, a tail partition including the remainder of the keywords in the list, model the keywords in the head partition based on a set of variables, score the keywords in the head partition based on the modeling, and cluster head partition keywords with tail partition keywords having at least one common variable into at least one keyword cluster. | 2010-12-16 |
20100318569 | POPULATING A CACHE SYSTEM BASED ON PRIVILEGES - A cache system is updated upon determining that a current privilege has not been checked for the session. Updating the cache system includes receiving all data items that are accessible for the current privilege. The cache system stores each received data item in association with a privilege set. The privilege set is enabled to include at least one privilege that is granted for the corresponding data item. The current privilege is stored in the privilege set of each data item when the cache system is updated based on the current privilege. | 2010-12-16 |
20100318570 | PLUGGABLE SESSION CONTEXT - A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context. | 2010-12-16 |
20100318571 | Selective Content Accessibility in a Social Network - A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select how content will be published and control the accessibility of uploaded content using a privacy setting for each content item that the user posts. The privacy setting defines, or identifies, the set of connections who may view the posted content item. The posted content item is placed in a particular communication channel in the social networking service, such as a newsfeed or stream, where the content item can be viewed by those who are permitted to view it according to its associated privacy setting. Varying granularities of privacy settings provide flexibility for content accessibility on a social networking service. | 2010-12-16 |
20100318572 | FUSION GENERAL LEDGER - A database system combines a general ledger and a multi-dimensional database. The general ledger and multi-dimensional database are mapped such that relationships between the general ledger and multi-dimensional database are characterized with metadata dimensions. Using the mapping, data can be received into the general ledger and stored in both the general ledger and multi-dimensional database substantially simultaneously. Further, a synchronization of the data copies changes to the data automatically from the general ledger to the multi-dimensional database. Thus, there is no manual copying of data between the general ledger and the database. Further, the latency between the general ledger and database is minimal ensuring accurate analysis even contemporaneous with the input of the data. | 2010-12-16 |
20100318573 | Method and apparatus for navigation system for selecting icons and application area by hand drawing on map image - A method and apparatus for displaying desired icons on an applicable area on a screen of a navigation system by a character and symbol drawing that is hand-written by a user on the screen. The method includes the steps of: evaluating a character & symbol drawing that is hand-written by the user to determine a category of the icons intended by the user; determining an applicable area on the map image for applying an icon display operation based on the character & symbol drawing; checking a prescribed data table based on the category of the icons and the applicable area selected by the character & symbol; and changing the manner of displaying the icons with respect to the category and applicable area determined by the foregoing process. | 2010-12-16 |
20100318574 | GENERATING REFERENCES TO REUSABLE CODE IN A SCHEMA - Provided are a method, system, and computer program product to generate references to reusable code in a schema. A program is coded in a first programming language having data structures, wherein at least one of the data structures includes a reference to reusable code. A model file is generated providing a source name identifying the reusable code, elements and attributes in a second programming language for the reference to the reusable code in the program. A generator is invoked with a reference to the model file. The invoked generator processes the data structure coded in the first programming language to generate a data structure schema in the computer readable medium in a second programming language describing elements and attributes of the data structure coded in the first programming language. A determination is made of instances of the source name indicated in the model file in the data structure. For the determined instances of the source name in the data structure, a reference in the data structure schema to the reusable code identified by the source name is generated, wherein the reference generated in the data structure schema includes the element and attribute information indicated in the model file. | 2010-12-16 |
20100318575 | STORAGE OR REMOVAL ACTIONS BASED ON PRIORITY - Techniques for providing content management services are described. Managing content services includes determining a value of content and determining storage actions of the content based on the value. The value of the content is determined by weighting factors, such as access frequency, a rating, a size of the content, a type of the content, and a security level of the content. Based on the value of the content, one or more storage actions may be determined for the content to optimize storage. The storage actions may include identifying a version of the content to be saved, compressing the content, determining a back up of the content to store, identifying a location to store the content, performing erasure encoding of the content, and/or removing the content. | 2010-12-16 |
20100318576 | APPARATUS AND METHOD FOR PROVIDING GOAL PREDICTIVE INTERFACE - A predictive goal interface providing apparatus and a method thereof are provided. The predictive goal interface providing apparatus may recognize a current user context by analyzing data sensed from a user environment condition, may analyze user input data received from the user, may analyze a predictive goal based on the recognized current user context, and may provide a predictive goal interface based on the analyzed predictive goal. | 2010-12-16 |
20100318577 | OPERATION OF P2P TELECOMMUNICATIONS NETWORKS - A method of operating a P2PSIP network is described. A resource record is created for a user in the network. A reachability script, which expresses a reachability profile of the user's preferences, is inserted into the resource record. The resource record is uploaded into the network. When an attempt is made to initiate a session with a user, the reachability script is executed so that the correct node may be contacted. | 2010-12-16 |
20100318578 | SYSTEM AND METHOD FOR IDENTIFYING AND PAIRING DEVICES - A computer system and method for identifying and pairing devices. The system includes a plurality of remote user interface computers, each having a display device and a user input device and each connected to a first network via a first respective data communication link. The system also includes a plurality of medical devices each having a medical device user interface and a second data communication link adapted to exchange data with the remote user interface computers. The system also includes a database adapted to communicate with the remote user interface computers via a connection to the first network or via a direct connection to one of the remote user interface computers, the database being adapted to store patient medical information including a treatment prescription that includes use of one of the medical devices. | 2010-12-16 |
20100318579 | Control Device for Storage System Capable of Acting as a Constituent Element of Virtualization Storage System - A management target constituting the target of processing executed by a first storage system in accordance with a request transmitted from a higher-level device is managed by first and second management identifiers. A request designating the first management identifier is received from the higher-level device, and a first management identifier designated by the request is converted into a corresponding second management identifier. | 2010-12-16 |
20100318580 | METHOD FOR ATTACHING GEOGRAPHICAL TAG TO DIGITAL DATA AND METHOD FOR PROVIDING GEOGRAPHICAL NAME INFORMATION FOR GEOTAGGING - Provided are a method for attaching a geographical tag to digital data and a method for providing geographical name information for geotagging. When a digital device periodically provides its position information, the server creates a position database. When the digital device requests geographical name information associated with the digital data, the server estimates the position of the digital device at a time when the digital data was created and transmits geographical name information corresponding to the estimated position to the digital device. The digital device attaches the geographical name information to the digital data. | 2010-12-16 |
20100318581 | INFORMATION LIFE-CYCLE MANAGEMENT SYSTEM, INFORMATION MANAGEMENT SERVER APPARATUS, ELECTRONIC MEDIA CONTROL APPARATUS, AND STORAGE MEDIUM - In one embodiment of the present invention, the information management server apparatus includes an information management relation DB which stores the issued management ID and forming time and date information, user information, a medium type, a use limitation policy, and information management server information in a header portion of the copied management file in association with each other with respect to a management ID of a management file in management file copying request information. The electronic medium control apparatus requests an electronic copying of the management file. The management file is managed in the information management relation DB. | 2010-12-16 |
20100318582 | OPERATION SUPPORT PROGRAM - An operation support program is stored in a storage medium. The operation support program includes a support database or a plurality of support program components for supporting a plurality of tasks that are different from one another and are carried out as a result of execution of a plurality of device control programs that are different from one another. The operation support program causes a computer to function as constituent sections including: an update data acquiring section; an updating section; and a graphical user interface configuring section. | 2010-12-16 |
20100318583 | DATA-VISUALIZATION SYSTEM AND METHOD - A data visualization system and method are provided herein. | 2010-12-16 |
20100318584 | Distributed Cache Availability During Garbage Collection - Techniques are described herein for managing access to a distributed cache during garbage collection. When garbage collection is to be performed with respect to a node, the node may send a request to a data manager requesting to have an instance of data module(s) included in the node that are in a primary state placed in a secondary state. The data manager may change the state of the data module(s) to the secondary state. The data manager may change the state of another instance of the data module(s) that is included in another node to the primary state. When the garbage collection is complete with respect to the node, the node may send another request to the data manager requesting that the data module(s) that were placed in the secondary state be returned to the primary state. The data manager may return those data module(s) to the primary state. | 2010-12-16 |
20100318585 | METHOD FOR INSTALLING FAT FILE SYSTEM - A method for a server installing a FAT file system on at least a client computer, the method includes the following steps. The subarea basic parameters of original files and data blocks stored in the server are read by a reading module. The subarea basic parameters of original files and data blocks are received and packed to an image file by the execution module. The FAT files in sub-directories are searched by the execution module and packed to the image file. The image file is received and transmitted to a file system installing module by the receiving module. The subarea basic parameters of original files and data blocks are separated from the image file and the basic data and data blocks are calculated by the file system installing module for storing them in memory and hard disc of the client computer. | 2010-12-16 |
20100318586 | Managing metadata for occurrences of a recording - A method and a system are provided for managing metadata for occurrences of a recording. In one example, the system receives a recording. The recording includes computer readable media data. The system generates an internal identifier of the recording. The internal identifier is a signature that uniquely identifies the recording. The system then adds the internal identifier to metadata that are associated with at least one occurrence of the recording. The metadata are data that describe the recording. | 2010-12-16 |
20100318587 | MEDIA IDENTIFICATION SYSTEM WITH FINGERPRINT DATABASE BALANCED ACCORDING TO SEARCH LOADS - A media identification system generates reference fingerprints for known media samples and stores the reference fingerprints in a reference database. The media identification system uses the reference fingerprints to match a fingerprint generated from an unknown media sample to identify that unknown sample. When storing new reference fingerprints in the reference database, partitions of the database are selected to balance the search loads on the database when it is used by the media identification system. For example, the selected partitions may be determined based at least in part on the access rates of the partitions by the media identification system. New reference fingerprints will tend to be placed in partitions that have relatively lower access rates that the other partitions, which will tend to balance the search loads on the partitions by the media identification system. | 2010-12-16 |
20100318588 | Spatial-Temporal Event Correlation for Location-Based Services - A method for tracking the context around moving objects without some of the disadvantages of the prior art is disclosed. This is done by correlating the spatial information of what is around an object with the temporal (or time) information of an object's movements. | 2010-12-16 |
20100318589 | EDUCATIONAL ENTITY ARCHITECTURE AND OBJECT MODEL - Described is a technology in which a set of objects represent educational entities of an educational model, with relationships between objects. For example, a course object instance may have a relationship with a task instance and a user instance (such as representing a student). Other objects may include user credentials objects, group objects, degree program objects, course plan objects, institution objects, school objects, and/or department objects. The set of objects may be pre-defined and maintained in a persistent storage; this pre-defined set may be extended with an extended object that has relationships with pre-defined objects. The educational entities of an object model may be maintained in rows of a table, with each row having a field that identifies which entity is represented by that row. The table is accessed to determine relationships between an instantiated object for an entity and at least one other instantiated object for another entity. | 2010-12-16 |
20100318590 | FILE SYSTEM LOCATION VERIFICATION USING A SENTINEL - A new file system is mounted to a mount point of an existing file system implemented in a computational system. A sentinel indicator is stored in the mount point. Prior to initiating an input/output (I/O) operation by a program, a determination is made by the program as to whether the sentinel indicator exists. In response to determining by the program that the sentinel indicator exists, the I/O operation is performed by the program. In certain alternative embodiments, in response to determining by the program that the sentinel indicator exists, the I/O operation is not performed by the program. | 2010-12-16 |
20100318591 | INCLUSIVE OR BIT MATRIX TO COMPARE MULTIPLE CORRESPONDING SUBFIELDS - A computer system is operable to identify subfields that differ in two data elements using a bit matrix compare function between a first matrix filled with pattern elements and a reference pattern. | 2010-12-16 |
20100318592 | Multiplicative Division Circuit With Reduced Area - The technology is a division circuit with decreased circuit area. An embodiment includes an integrated circuit implementing multiplicative division of a dividend input and a divisor input. The integrated circuit includes a lookup table circuit and multiplier circuits. The lookup table circuit providing an approximation of a reciprocal of a divisor input. The multiplier circuits receive the approximation and refine a quotient output of the dividend input and a divisor input. At least one of the multiplier circuits is a squaring circuit implementing multiplication with a reduced number of intermediate partial products. The reduced number of intermediate partial products prevent the squaring circuit from multiplication of any two unequal numbers and limiting the squaring circuit to multiplication of a same number by the same number. | 2010-12-16 |
20100318593 | Method for Using a Graphics Processing Unit for Accelerated Iterative and Direct Solutions to Systems of Linear Equations - Methods for increasing the processing speed of computational electromagnetic methods, such as the Method of Moments (MoM), may involve using efficient mapping of algorithms onto a Graphics Processing Unit (GPU) architecture. Various methods may provide speed/complexity improvements to either or both of: (1) direct solution via Lower-Upper (LU) factorization; and (2) iterative methods (e.g., Generalized Minimal Residual (GMRES) method). | 2010-12-16 |
20100318594 | COMPUTING SERVICE SYSTEM AND METHOD FOR EMPLOYING COMPUTING SERVICE - A method is used for employing computing services via a network. The method includes the following steps. A client searches the network and finds out at least two computing services which can be used by the remote connecting module. The at least two computing services includes a first computing service and a second computing service. The client evaluates capabilities of the first computing service and the second computing service respectively. The client checks if the first computing service and the second computing service can finish a task cooperatively. The client composes a task distribution flow according to the capability of the first computing service and the capability of the second computing service. The client distributes the task to the first computing service and the second computing service according to the task distribution flow. The client receives a finished task from the first computing service and the second computing service. | 2010-12-16 |
20100318595 | System and method for conditionally transmitting one or more locum tenentes - Methods and systems are provided for receiving a conditional directive to associate one or more identified entities with one or more representative locum tenentes, and transmitting the one or more representative locum tenentes in lieu of the one or more identified entities in accordance with the conditional directive. | 2010-12-16 |
20100318596 | SYSTEMS AND METHODS FOR PROVIDING READILY UPDATABLE MEDIA CONTENT - A networked system facilitating the distribution of readily-updatable headline media content generated by the advertising client (or agent of the client) of the media content provider. The networked system includes a first server device, a second server device, one or more client devices, and a data communications network, facilitating data communications amongst the devices. The second server device provides an updatable media content service to both the first server device and a client device. The service allows a media content selection of the client device to be automatically presented within a media content module (on the first server device with little or no interaction between the first server device and the client. | 2010-12-16 |
20100318597 | Generating hints for more optimal processing of requests for information within an environment in which resources are abstracted using a model - An information technology (IT) environment includes IT managed resources in which the resources are abstracted using a model. In response to determining that a request for information received from a client is non-optimal in terms of processing the request, a first hint can be constructed that indicates how future requests are to be formulated by the client so that they are more optimal in terms of processing the future requests. In response to determining that the information is internally structured non-optimally in terms of processing the request, a second hint can be constructed that indicates how the information is to be internally structured more optimally in terms of processing future requests. In response to determining that processing the request will be non-optimal, a third hint can be constructed relating to a characteristic that results in non-optimal processing of the request, and logged within a hint log for offline analysis. | 2010-12-16 |
20100318598 | METHOD FOR REMOTELY CONTROLLING TERMINAL DEVICE - Provided are a remotely controllable communication terminal and a method for processing a request thereof. The remotely controllable communication terminal comprises a user input unit, a storage unit, a communication unit, and a control unit. The user input unit receives a user input. The storage unit stores software called by Application Programming Interfaces (APIs) corresponding to a plurality of functions, respectively. The communication unit sends a file comprising a list of the APIs to a client terminal, receives one of the APIs from the client terminal, and then sends an execution result to the client terminal. The control unit receives the API and performing a function corresponding to the API. | 2010-12-16 |
20100318599 | METHOD FOR REMOTELY CONTROLLING TERMINAL DEVICE - Provided are a communication terminal operable as a server and a method for processing a request therein. The communication terminal comprises a user input unit, a storage unit, a communication unit, and a control unit. The user input unit receives a user input. The storage unit stores software storing software necessary to process a request from a client terminal. The communication unit receives the request from the client terminal connected to a relay server, and sends data through the relay server in response to the request. The control unit receives the request from the client terminal, processes the request, and controls the communication unit according to the user input or the software stored in the storage unit. Here, the communication terminal is connected to the client server via a gateway server converting a private IP address into a certified IP address and the relay server having a common IP address and forwarding data. | 2010-12-16 |
20100318600 | METHODS AND APPARATUS TO FACILITATE CLIENT CONTROLLED SESSIONLESS ADAPTATION - A disclosed example method for managing media content includes accessing metadata information for an available media and retrieving, from the accessed metadata, at least a uniform resource locator (URL) and one or more byte range, where one or more portions of the available media being addressable by the one or more byte range and the URL combination. The example method also includes sending a first request requesting a first at least one portion of the available media based on retrieved metadata. | 2010-12-16 |
20100318601 | WIDGET ACTIVATION AND COMMUNICATION METHOD - A method and apparatus for activating a group widget by a widget client are provided. The method includes receiving widgets from at least one surrounding widget server, analyzing the received widgets and grouping the widgets according to the result of the analysis, generating grouped widgets as a group widget, if an event is received from a user, converting a received event into an event related to a configuration widget of a group widget, transmitting the converted event to a corresponding widget server, and receiving a processing result from the widget server which received the transmitted event. | 2010-12-16 |
20100318602 | LOAD BALANCING AND ADMISSION SCHEDULING IN PULL-BASED PARALLEL VIDEO SERVERS - A pull-based parallel video server system and method of implementation useful in an on-demand video system includes a plurality of slave admission schedulers operating in parallel with a master admission scheduler to back up the master admission scheduler that controls access to an array of pull-based video servers according to a protocol that accounts for jitter and loss of packets, as well as network delays. A transport protocol is provided that improves video data throughput under such conditions. To determine the architecture and functional requirements of the redundant admission schedulers, an analytical tool in the form of a performance model has been developed that incorporates network delays, delay jitters and packet losses on the communication links between the clients, schedulers and servers. | 2010-12-16 |
20100318603 | MONITORING APPLICATION FOR AUTOMATICALLY REQUESTING CONTENT - Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer. | 2010-12-16 |
20100318604 | USING A VARIABLE IDENTITY PIPE FOR CONSTRAINED DELEGATION AND CONNECTION POOLING - Example embodiments provide for a system configured to provide constrained delegation and connection pooling for a back-end server by providing a variable identity pipe between it and a front-end server. A client will authenticate to the front-end process using credentials that are typically non-delegable by default, e.g., a token, certificate, or the like. The front-end is configured to extract client identity information and use this information to request changing an identity associated with the variable identity pipe. In addition, requests for actions on resources received from the client can be transformed into remote procedural calls and used by the back-end server to process the requests. A response is then sent back over the variable identity pipe to the client via the front-end server. The variable identity pipe is left open to allow other requests from other clients to be sent over the variable identity pipe in a similar manner. | 2010-12-16 |
20100318605 | APPROACH FOR MANAGING STATE INFORMATION BY A GROUP OF SERVERS THAT SERVICES A GROUP OF CLIENTS - An approach for managing state information by a group of servers that services a group of clients is disclosed. One server is designated as the primary server and is responsible for generating state information to be used by both the servers and the clients. The remaining servers are designated as secondary servers that help to manage the group, but which do not generate the state information. When the primary server fails or is not available due to a network partition event, one of the secondary servers changes role to become the primary server. With a network partition event, each partition can have a primary server, and when the network partition heals, one of the primary servers changes role back to being a secondary server. As a result, the group of servers maintains a consistent set of state information without being vulnerable to the single failure of a server. | 2010-12-16 |
20100318606 | ADAPTIVE STREAMING OF CONFERENCE MEDIA AND DATA - A distributed system for distributing conferencing data such as video, audio, and other conference data. The distributed system includes a conference data dispatch system, multiple conference participant computing systems, and a network distribution path through which conference data may be distributed from the conference data dispatch system to the various conference participant computing systems. The conference data is segmented. Each segment is encoded to be suitable to a particular class of participant computing systems. The encoded segments may be cached in an intermediary computing system to thereby avoid a strict unicast model for distributing conference data. | 2010-12-16 |
20100318607 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - A digital document is generated based on document content information obtained by reading a paper document, and instruction content information for document generation. Explanatory information of the paper document is generated based on the instruction content information. Feed data as data used to notify an external apparatus of generation of the digital document is generated with reference to the explanatory information. The feed data is transmitted to the external apparatus in response to a request from the external apparatus. | 2010-12-16 |
20100318608 | SYSTEMS AND METHODS FOR EFFICIENT LIVE APPLICATION MIGRATION WITHIN BANDWIDTH CONSTRAINED NETWORKS - A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order. | 2010-12-16 |
20100318609 | BRIDGING ENTERPRISE NETWORKS INTO CLOUD - An enterprise namespace may be extended into a cloud of networked resources. A portion of the cloud may be dynamically partitioned, and the extension of the enterprise namespace established within the portion. Cloud resources thus remain as easily accessible to enterprise users as those which are physically located on the enterprise network. Thus, components such as applications, virtual machine instantiations, application states, server states, etc., may be easily migrated between the enterprise network and the cloud. | 2010-12-16 |
20100318610 | METHOD AND SYSTEM FOR A WEAK MEMBERSHIP TIE-BREAK - In general, the invention relates to a method for managing a two-node cluster. The method includes determining, by a first server node, that a second server node is disconnected from the two-node cluster when a first heartbeat response is not received from the second server node and sending a first echo request from the first server node to a first external system, where the first external system is specified on each server node of the two-node cluster. The method further includes receiving a first echo response for the first echo request from the first external system at the first server node and, in response to receiving the first echo response, providing, by the first server node, services of the two-node cluster independent of the second server node. | 2010-12-16 |
20100318611 | METHODS AND SYSTEMS FOR TRACKING SHARED CONTENT - Tracking content shared over a network is described. Content with a mailing identifier and a recipient identifier can be transmitted to a recipient. The mailing identifier and the content can be associated with the recipient identifier. A request from the recipient to provide an application with access to the content can be received. The request can include the mailing identifier and the recipient identifier. A web page can be generated. The web page can include the content and can be associated with a second recipient identifier and a link. The request and the second recipient identifier can be associated with the recipient identifier using a forward identifier. A request to access the web page by a recipient friend using the link and the application can be received. The request to access can be associated with the recipient identifier. Reports can be generated and outputted. | 2010-12-16 |
20100318612 | Apparatus and Method for Email Storage - Embodiments of the present invention provide an apparatus for storing emails, comprising a neural network arranged to receive information associated with an email, to determine a storage location of the email according to one or more of the attributes of the email and to output information identifying the determined storage location. | 2010-12-16 |
20100318613 | SOCIAL GRAPHING FOR DATA HANDLING AND DELIVERY - Architecture that enables data handling according to types of social relationships. A social graph is used to categorize the types of the social relationships of the tagged messaging users. The social graph can include social relationship categories for friends, family, coworkers, and blocked individuals of the recipient, for example. The social graph can also include metadata related to the tagged users. The metadata defines the social relationship of the tagged users to the recipient. Delivery of messages to the recipient from the tagged messaging users is managed based on the social graph. Delivery management can include blocking messages, allowing the messages through, or delivering the messages with high or low priority, for example. Email messages can be delivered to respective email locations based on the social graph. User information can be imported and/or mined from external sources to augment the social graph. | 2010-12-16 |
20100318614 | Displaying User Profile and Reputation with a Communication Message - A method of coordinating communication between a sender entity sending a communication message and a recipient entity receiving the communication message over a communication network, wherein the method comprises registering the sender entity based on registration data indicative of an identity of the sender entity and comprising assigned user profile data of the sender entity, determining a reputation of the sender entity based on the identity, and transmitting the user profile data and the reputation to the recipient entity for display of the user profile data and the reputation together with the communication message, the transmitting being triggered in response to a request of the recipient entity including the identity. | 2010-12-16 |
20100318615 | METHOD, DEVICES AND SYSTEM HAVING OUT OF OFFICE BASED PRESENCE - A method, devices and system having out of office based presence are provided. In accordance with one embodiment, there is provided a method of sharing presence information, comprising: receiving input to enable an out of office utility for a first email account; notifying a messaging server managing the first email account that the out of office utility has been enabled; and providing to one or more recipients a presence status data packet indicating a presence status of “out of office” for a user associated with the first email account in response the enabling of the out of office utility. | 2010-12-16 |
20100318616 | MESSAGE REDIRECTION WITHIN A MESSAGING INFRASTRUCTURE - The present invention extends to methods, systems, and computer program products for redirecting client messages between hosts within a messaging infrastructure. When a host receives a client message, it can refer to lock information in a shared database to determine if it is the correct host to receive the client message. The lock information includes a redirect endpoint. The redirect endpoint identifies an endpoint where client messages can be sent for delivery to the appropriate workflow instance. The redirect endpoint can be included in a redirect fault message, that is returd to a host when a host attempts to process a client message that is already locked to another workflow instance. Using the redirect endpoint, a host receiving a redirect fault message can use the redirect endpoint to send a client message to the correct host. | 2010-12-16 |
20100318617 | Local Loop For Mobile Peer To Peer Messaging - Techniques described herein describe a proxy used in an instant messaging system. The proxy, upon receiving an instant message (IM) from a first mobile device and addressed to a second mobile device, dynamically determines whether, and for how long to store the IM on a local proxy. Otherwise the IM is forwarded to a server. | 2010-12-16 |
20100318618 | DEVELOPMENT TOOLS FOR TRANSITION-INDEPENDENT WEB FEATURES - Computer-storage media, systems, and methods for facilitating development of web pages with cross-communicating tags are provided. The libraries and controls do not require a page transition or refresh operation to update information or instantiate features because the tags subscribe to a server for the information supplied to them. The update information can be requested by a first set of tags or pushed by a second set of tags. A package available online to developers includes development components for execution as part of a web page. These applications utilize APIs and a set of tags that are at least a portion of a markup language library. The tags are for initiating and executing web features, including instant messaging features. There is a developer interface to code the web page with the web application. | 2010-12-16 |
20100318619 | Publish/Subscribe Mashups For Social Networks - Described herein is a mashing technology that facilitates mashup creation over a plurality of publish/subscribe social network data stream. These mashing techniques that are tailored to managing content from disparate social networks. As described herein, these techniques include creating and using a set of operations that facilitate the creation of “mashups” over multiple publish/subscribe social network data streams. | 2010-12-16 |
20100318620 | Instant Messaging Monitoring and Alerts - Systems, methods, and articles of manufacture embodied as computer program products for facilitating the avoiding of sending a message to an unintended recipient. In some embodiments of the invention, in an instant messaging (IM) environment, the relatedness of a first entry in a first IM session to previous entries in the first IM session is determined. In response to the entry not meeting a first pre-determined relatedness threshold, an alert is issued. In one embodiment, the relatedness of the first entry to previous entries in a second IM session is determined, in response to the entry meeting a second pre-determined relatedness threshold, an alert is issued. In one implementation, relatedness is determined based on a matching of keywords between the first entry and the previous entries. In another implementation, relatedness is determined based on a matching of topics associated with one or more IM sessions, which topics can be associated with keywords. | 2010-12-16 |
20100318621 | MOBILE TERMINAL - A transmission side terminal | 2010-12-16 |
20100318622 | Identifying Users Sharing Common Characteristics - Displaying electronic information in an instant-messaging application includes accessing a first electronic message providing information describing a first user that has an identifier included in a set of identifiers of users of an instant messaging application. A second electronic message providing information describing a second user that has an identifier included in the set of identifiers of users of an instant messaging application is accessed. Content contained within the first and second messages is analyzed to determine that at least a portion of content is common to the first and second electronic messages. Based upon the content analysis, an indication that the first and second messages include common content is provided to the user. Alternatively or additionally, an indication that two users are in physical proximity to a geographic location may be provided in response to detecting that the two users are within a threshold distance from the geographic location. | 2010-12-16 |
20100318623 | Method of Controlling Access to Network Resources Using Information in Electronic Mail Messages - A method and apparatus for controlling access to network resources referenced in electronic mail messages comprises the computer-implemented steps of receiving an electronic mail message that comprises one or more hyperlinks; determining sender information that identifies a sender of the electronic mail message; creating and storing a record that associates the sender information with each of the one or more hyperlinks; receiving a request to access a specified hyperlink among the one or more hyperlinks; retrieving, based on the specified hyperlink, the record; retrieving, based on the sender information associated with the specified hyperlink, sender reputation information associated with the sender; determining, based on the sender reputation information, a particular action among a plurality of allowed actions; and issuing a network request to access the specified hyperlink only when the particular action is allowing user access to the specified hyperlink. | 2010-12-16 |
20100318624 | SYSTEM AND METHOD FOR DEFERRED MESSAGE REMINDERS AND EXPIRY EXTENSION - Disclosed is a method for transmitting reminders for deferred message, the method includes requesting, by client, to set reminders for deferred messages to a application sever (AS); setting, by the application sever, reminders comprising information of when to remind, whether to repeat reminder or not, and/or how many times to repeat; monitoring, by the application sever, time of the set reminders in order to notify the Client; and notifying, by the application sever, the reminders to the client once a timer triggers to send a notification. | 2010-12-16 |
20100318625 | METHOD AND APPARATUS FOR STORAGE-SERVICE-PROVIDER-AWARE STORAGE SYSTEM - A storage system includes a virtual volume configured on a storage controller and mapping to a physical storage capacity maintained at a remote location by a storage service provider (SSP). The storage controller receives an I/O command in a block-based protocol specifying a logical block address (LBA). The storage controller correlates the LBA with a file name of a file stored by the SSP, translates the I/O command to an IP-supported protocol, and forwards the translated I/O command with the file name to the SSP for processing. In the case of a write command, the SSP stores the write data using the specified file name. In the case of a read command, the SSP enables download of data from the specified file name. In an alternative embodiment, a NAS head may replace the storage controller for correlating the LBA with a file name and translating the I/O command. | 2010-12-16 |
20100318626 | EXTENDED FAST MEMORY ACCESS IN A MULTIPROCESSOR COMPUTER SYSTEM - A multiprocessor computer system comprises a first node operable to access memory local to a remote node by receiving a virtual memory address from a requesting entity in node logic in the first node. The first node creates a network address from the virtual address received in the node logic, where the network address is in a larger address space than the virtual memory address, and sends a fast memory access request from the first node to a network node identified in the network address. | 2010-12-16 |
20100318627 | METHOD FOR INTEGRATING PLUG-IN SECURITY PANEL MODULE WITH NETWORK INTERFACE MIDDLEWARE - A security system is provided. The security system includes a security processor having a plurality of inputs that receive signals from security sensors in a secured area and at least one data output path that couples the received signals from the security sensors to a central monitoring station and a network interface device coupled to the security processor that couples signals between the security processor and central monitoring station through a network connection, said network interface selected from the group consisting of a television set-top box, digital video recorder, DSL modem, fiber-optic modem, VSAT satellite transceiver and personal computer, and said network connection selected from the group consisting of a public or proprietary network connection, an Internet connection, a PSTN connection, and a cable TV distribution system connection. | 2010-12-16 |
20100318628 | NETWORK-BASED GEO-LOCATION IDENTIFICATION OF AN END-USER DEVICE - A device receives a connection from a user device, and provides, to a database, connection information associated with the user device. The device receives, from the database, user device information based on the connection information, where the user device information includes a location associated with the user device. The device also receives a trigger instructing the device to provide the user device information to a content provider device, and provides the user device information to the content provider device when the trigger is received. | 2010-12-16 |