Patent application number | Description | Published |
20090254616 | Simultaneous Instant Messaging In Single Window - Providing integrated multi-session instant messaging in a single instant messaging window. A user interface has an instant messaging window for displaying a plurality of conversation panes representative of concurrent instant messaging sessions between a local user and a plurality of remote users. Each conversation pane represents one of the messaging sessions. A plurality of message components correspond to the conversations panes so that each message component corresponds to one conversation pane. Each message component is arranged in the corresponding conversation pane and displays text from an instant message. The conversation display area displays at least two of the conversation panes linearly along the height of the window so that the message components arranged in the at least two conversation panes are simultaneously viewable. | 10-08-2009 |
20110185287 | STATE PERSISTENCE AND BACKGROUND INITIALIZATION FOR POST-BACK WEB APPLICATIONS - A system is disclosed for reducing the time required to generate web pages on post-back of collaborative web applications. Content from web pages of the collaborative web applications may be displayed in respective foreground and background IFRAMES over a display. Upon post-back to load content from a new web page in the foreground IFRAME, the content from the background IFRAME persists, thus saving the round trip otherwise required to update content from the background IFRAME. Initialization and update of the content in the background IFRAME may be performed when interaction with the content in the foreground IFRAME is idle. | 07-28-2011 |
20120254321 | PROVIDING ADDITIONAL EMAIL CONTENT IN AN EMAIL CLIENT - One or more techniques and/or systems are disclosed for providing additional content in an email. An email service can receive the email at an email server. Prior to the email being sent to an email client, metadata for a parameter used to retrieve the additional content is identified and collected. The collected metadata is sent to the email client used by the intended recipient of the email (e.g., on a smart phone). When the user attempts to access the email, the email server can respond by sending script code to the email client, which, in combination with locally stored metadata retrieved from the email, provides the additional content in the email. In this manner, an email regarding a package, for example, can include not only a tracking number but also a status of the delivery of the package, where the status may be different/updated each time the email is accessed. | 10-04-2012 |
20120278397 | APPLYING ACTIONS TO ITEM SETS WITHIN A CONSTRAINT - Items of an item set may be stored by an item server (e.g., mail messages comprising a mailbox stored by a mail server) that supports the application of actions, but only within a constraint (e.g., a maximum duration or computational resources consumed by the action). The application of complex actions to large item sets may exceed the constraint if performed in one request. Moreover, the request may be made by a user interface of a user device, but the user interface may stall while interoperating with the item server to perform the action. Instead, a background process may issue a sequence of requests applying the action to respective batches of items within the constraint. This architecture may enable the user interface to remain responsive to the user while the action is performed, and even to be terminated without jeopardizing the completion of the action upon the item set. | 11-01-2012 |
20130138957 | MIGRATING AUTHENTICATED CONTENT TOWARDS CONTENT CONSUMER - Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service. | 05-30-2013 |
20140317289 | DYNAMICALLY AFFINITIZING USERS TO A VERSION OF A WEBSITE - Systems and methods for providing user's access to a particular version of an electronic resource (e.g., a website, web resource or the like) where versions of such electronic resources are stored across a set of servers are disclosed. In one embodiment, user's requests may be received—either requesting a particular version or as an unversioned request. A version control module (for example, a load balancer) may receive these requests and assign the user's request to a first server according to different metrics, e.g., regarding version control rules and/or effective load balancing considerations. If the initial server assigned is not able to handle the user's request, the user's request may be proxied to another server, according to different metrics. If there is no server that may handle the user's request (after a certain number of proxied requests), the request may be returned to the user as not handled. | 10-23-2014 |
20140380050 | MIGRATING AUTHENTICATED CONTENT TOWARDS CONTENT CONSUMER - Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service. | 12-25-2014 |
20150074210 | APPLYING ACTIONS TO ITEM SETS WITHIN A CONSTRAINT - Items of an item set may be stored by an item server (e.g., mail messages comprising a mailbox stored by a mail server) that supports the application of actions, but only within a constraint (e.g., a maximum duration or computational resources consumed by the action). The application of complex actions to large item sets may exceed the constraint if performed in one request. Moreover, the request may be made by a user interface of a user device, but the user interface may stall while interoperating with the item server to perform the action. Instead, a background process may issue a sequence of requests applying the action to respective batches of items within the constraint. This architecture may enable the user interface to remain responsive to the user while the action is performed, and even to be terminated without jeopardizing the completion of the action upon the item set. | 03-12-2015 |