Patent application number | Description | Published |
20090259932 | USER-SELECTABLE HIDE OPTION FOR A USER INTERFACE, WHICH IS NOT PERSISTED, AND WHICH IS NOT DEPENDENT UPON INTRA-DOCUMENT CONTROLS - A stored document of a persistent data store can include digitally encoded content. A version of the stored document can be created that is placed in a non-persistent memory. This version can be referred to as a rendered document. Content from the rendered document can be presented in a user interface. A user selection of a user defined portion of the presented content can be received. Additionally, a user issued command to hide the selected portion of the presented content can be received. The rendered document can be responsively changed to omit the user defined portion of the presented content when outputting the presented content to at least one output device. The changing of the rendered document to omit the user defined portion is unable to affect the stored document in any fashion. | 10-15-2009 |
20090259942 | VARYING AN AUDIO CHARACTERISTIC OF AN AUDIBLE NOTICE BASED UPON A PLACEMENT IN A WINDOW STACK OF THE APPLICATION INSTANCE ISSUING THE NOTICE - An application instance can be identified that is associated with an audible notice, which is to be presented. A placement of the application instance in a window stack can be determined. An audio characteristic (e.g., volume, pitch, speed, repetition, audio channel, etc.) of the audible notice can be adjusted based upon the determined placement in the window stack. Different placements in the windows stack can result in different adjustments. The adjusted audio notice can then be presented. | 10-15-2009 |
20110099481 | ANCHORING A REMOTE ENTITY IN A LOCAL DISPLAY - A remote desktop application displays a remote graphical interface on a local computer screen. A remote entity, for example, a taskbar, is anchored along an edge of the remote graphical interface on the local computer screen. The anchored taskbar and the remote interface are displayed on the local computer screen such that the remote entity is in a viewable position on the local computer screen. The anchoring can be turned on and off in response to a user selection of a control. The control can be provided to position the remote entity along a bottom, top, left, or right edge in response to a user selection. | 04-28-2011 |
20110145339 | RECLAIMING LOST INTERNET CUSTOMERS - A system and method of reclaiming lost Internet customers may involve detecting an outage condition associated with a host of an electronic commerce (e-commerce) web site. Customer data can be extracted from packets destined for the host, wherein the packets could be associated with transactions between customers and the web site. The extracted customer data may be stored and, upon detecting a resolution of the outage condition, a customer database can be searched based on the extracted customer data in order to identify customer contact information. A customer reclamation message may then be sent to the customer, wherein the message can incentivize the customer to return to the web site and request completion of the transaction. | 06-16-2011 |
20120173608 | AUTOMATED DATA UPDATING IN DISTRIBUTED NOTICES - Embodiments of the present invention provide a method, system and computer program product for automated data updating of notices in a calendaring and scheduling (C&S) system. In an embodiment of the invention, a method for automated data updating of notices in a C&S system can be provided. The method can include composing a C&S document in a C&S system executing in memory by at least one processor of a computer. The method further can include noticing different users addressed for the C&S document and adding to the C&S document a reference to variable data stored separately from the C&S document. The method yet further can include detecting a change in the variable data. Finally, the method can include transmitting notice to the different users of the change in variable data. In one aspect of the embodiment, transmitting notice to the different users of the change in variable data can include flagging the C&S document as having changed. | 07-05-2012 |
20120209816 | Collaborative Information Source Recovery - Systems and methods of recovering a shared information source can involve identifying a first user of a shared information source in response to detection of a data loss with respect to the shared information source. One or more additional users of the shared information source may be identified based on data associated with the first user. Additionally, the shared information source can be recovered based at least in part on data associated with the one or more additional users. | 08-16-2012 |
20130219067 | ACTIVATING LOCATION-BASED RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for invocation and de-allocation of networked-based resources (e.g., cloud-based resources) based on users' geographic movements. Specifically, in a typical embodiment, a set (one or more) of user preferences are received. Such preferences can include: a set of geographic points of interest, a set of users, associations of a set of resources (e.g., services, applications, etc.) of the set of users with the set of geographic points of interest, and/or contexts associated with the set of geographic points of interest. A listening service may then be implemented for the set of resources to determine a location of the set of users. Based on the location and the associations of the set of resources with the set of geographic points of interest, at least one of the set of resources may then be activated. | 08-22-2013 |
20130251124 | CONTINUAL INDICATOR OF PRESENCE OF A CALL PARTICIPANT - Examples include a system, method and program for notifying presence of a phone call participant. In an example, a computer receives a request from a first calling device to connect with one or more second calling devices through a network. The computer provides a presence notification on the first calling devices wherein the presence notification provides a repeating indicator which represents that the one or more second calling devices are connected. The computer determines that the one or more second calling devices has disconnected and in response the computer ceases the presence notification on the first calling device. | 09-26-2013 |
20130272508 | Voice Input State Identification - A method for indicating voice input state for a call on a communications device. A processor unit identifies the state of voice input for the call. In response to the state of the voice input being a mute state, the processor unit identifies a mute setting for the mute state based on a user profile. Thereafter, first audio data specified by the mute setting is played with audio data from the call on the communications device. In response to the state of the voice input being an unmute state, the processor unit identifies an unmute setting for the unmute state based on the user profile. Thereafter, second audio data specified by the unmute setting is played with the audio data from the call on the communications device. | 10-17-2013 |
20130283086 | MONITORING AND RESOLVING DEADLOCKS, CONTENTION, RUNAWAY CPU AND OTHER VIRTUAL MACHINE PRODUCTION ISSUES - Resolving virtual machine (VM) issues, by executing VM and operating system (OS) diagnostic monitors, including, monitoring a set of VM and OS health status metrics of a system at a first level, analyzing data of the monitored health status metrics to determine that an instability has occurred when the data exceeds defined bounds for the health status metrics, responding to the instability by monitoring additional VM and OS health status metrics, whereby a level of monitoring of the system is increased from the first level to a second level, greater than the first level, identifying the instability, repairing the system by taking corrective action based on the identified instability; and removing at least one of the set of monitoring and profiling tools to reduce the level of monitoring to a third level once the instability has been resolved, wherein the third level is less than the second level. | 10-24-2013 |
20130283090 | MONITORING AND RESOLVING DEADLOCKS, CONTENTION, RUNAWAY CPU AND OTHER VIRTUAL MACHINE PRODUCTION ISSUES - Resolving virtual machine (VM) issues, by executing VM and operating system (OS) diagnostic monitors, including, monitoring a set of VM and OS health status metrics of a system at a first level, analyzing data of the monitored health status metrics to determine that an instability has occurred when the data exceeds defined bounds for the health status metrics, responding to the instability by monitoring additional VM and OS health status metrics, whereby a level of monitoring of the system is increased from the first level to a second level, greater than the first level, identifying the instability, repairing the system by taking corrective action based on the identified instability; and removing at least one of the set of monitoring and profiling tools to reduce the level of monitoring to a third level once the instability has been resolved, wherein the third level is less than the second level. | 10-24-2013 |
20140007104 | Auto Detecting Shared Libraries and Creating A Virtual Scope Repository | 01-02-2014 |
20140007125 | Auto Detecting Shared Libraries and Creating A Virtual Scope Repository | 01-02-2014 |
20140019902 | PROGRESS BARS FOR MEDIA CONTENT - Some example embodiments include a method for presenting media content. The method includes decoding the media content having a number of time segments to access metadata that defines a number of selectable characteristics for semantic content in the media content. The method includes presenting to a viewer of media content the number of selectable characteristics for the semantic content. The method includes receiving, from the viewer, a selectable characteristic of the number of selectable characteristics. The method includes presenting, along with the media content, a progress bar for the media content that defines, through the number of time segments, temporal positions in the media content where the selectable characteristic is within the media content. The presenting of the progress bar includes presenting a graphic in the progress bar that is different for different values for a same selectable characteristic of the at least one selectable characteristic. | 01-16-2014 |
20140075309 | CONSIDERING USER NEEDS WHEN PRESENTING CONTEXT-SENSITIVE INFORMATION - Methods and systems of summarizing media content may provide for receiving a request for a presentation of media content to a user, and determining a media consumption context associated with the user and the media content, wherein the media consumption context includes an amount of time between media consumption sessions. Additionally, a level of detail for a summary of the media content may be determined based on the media consumption context. In one example, the media consumption context further includes one or more of an amount of media consumed in a most recent media consumption session, an information retention capacity of the user, a complexity of the media content, a granularity input from the user, and a user preference setting. | 03-13-2014 |
20140075312 | CONSIDERING USER NEEDS WHEN PRESENTING CONTEXT-SENSITIVE INFORMATION - Methods and systems of summarizing media content may provide for receiving a request for a presentation of media content to a user, and determining a media consumption context associated with the user and the media content, wherein the media consumption context includes an amount of time between media consumption sessions. Additionally, a level of detail for a summary of the media content may be determined based on the media consumption context. In one example, the media consumption context further includes one or more of an amount of media consumed in a most recent media consumption session, an information retention capacity of the user, a complexity of the media content, a granularity input from the user, and a user preference setting. | 03-13-2014 |
20140082485 | SYNCHRONIZATION OF CONTEXTUAL TEMPLATES IN A CUSTOMIZED WEB CONFERENCE PRESENTATION - In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a conference presentation. The computer system receives a request to access presentation templates based on parameters of a presenter, wherein the presentation templates including parameters identifying one or more of template texture, template font, template name of the presenter or template photo of the presenter of the conference presentation. In addition, the computer system determines an identity of the presenter during the conference presentation and matching the identity of the presenter against the parameter of the presenter. Moreover, the computer system extracts the presentation templates in the repository based on the match. The computer system further applies the extracted presentation template to presentation contents of the presentation program. In one aspect, the extracted presentation template alters visual characteristics of the presentation content based on the applied presentation template. | 03-20-2014 |
20140164372 | RESOLUTION OF CONTACT NAMES - Mechanisms are provided to permit a first person (e.g., Tom) to be in a communication session (e.g., a chat session) with a second person (e.g., George) and to select a contact's name (e.g., Harry), and immediately set up another communication (e.g., a chat session) with the selected contact (e.g., Harry). Since there may be multiple contacts having the same name as the selected contact, e.g., “Harry”, mechanisms are provided to communicate with a desired person (e.g., “Harry Smith” and not “Harry Jones”). The mechanisms may make such a determination based on “Harry Smith” being the more likely person that Tom, the first person, desires to communicate with (e.g., based on a context of Tom and/or Harry Smith). | 06-12-2014 |
20140185785 | COLLABORATIVE VOLUME MANAGEMENT - Exemplary embodiments provide collaborative call management wherein during a multi-participant audio communication, volume adjustments made on participant devices for a specific speaker are detected and passed to a conference server to generate collaborative volume feedback; and using the collaborative volume feedback to adjust a volume level of the specific speaker for all participants of the audio communication. | 07-03-2014 |
20140189545 | DETERMINING CONTENT RENDERING CAPABILITIES FOR WEB BROWSER OPTIMIZATION - In a method for determining content rendering capabilities of one or more web browsers, a computer receives an indication of an event affecting one or more content rendering capabilities of a first web browser of one or more web browsers. The computer, in response to receiving the indication of the event affecting the one or more content rendering capabilities of the first web browser, determines the one or more content rendering capabilities of the first web browser. The computer updates a data file responsive to the determination of the one or more content rendering capabilities of the first web browser. | 07-03-2014 |
20140208213 | SYNCHRONIZATION OF CONTEXTUAL TEMPLATES IN A CUSTOMIZED WEB CONFERENCE PRESENTATION - In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a conference presentation. The computer system receives a request to access presentation templates based on parameters of a presenter, wherein the presentation templates including parameters identifying one or more of template texture, template font, template name of the presenter or template photo of the presenter of the conference presentation. In addition, the computer system determines an identity of the presenter during the conference presentation and matching the identity of the presenter against the parameter of the presenter. Moreover, the computer system extracts the presentation templates in the repository based on the match. The computer system further applies the extracted presentation template to presentation contents of the presentation program. In one aspect, the extracted presentation template alters visual characteristics of the presentation content based on the applied presentation template. | 07-24-2014 |
20140278675 | NEGOTIATED MEETING SCHEDULING WITH ONE OR MORE REQUIRED ATTENDEES - Various embodiments provide for negotiated scheduling of a meeting with one or more required meeting attendees before sending out invitations(s) to one or more optional meeting attendees. In one specific example, mechanisms are provided for iterative scheduling which includes proposed times and counter proposals to/from the required meeting attendee(s). In another specific example, mechanisms are provided for sending a meeting invitation to each optional meeting attendee once an agreement is reached among required meeting attendee(s) regarding the time of the meeting. | 09-18-2014 |
20140283132 | COMPUTING APPLICATION SECURITY AND DATA SETTINGS OVERRIDES - Provided are techniques for receiving a first request from a first application for a particular data element; making a determination, with respect to the first request, of whether or not to provide access to the particular data element to the first application; and in response to a determination to provide access to the first application, providing the first application with access to the particular data element; and in response to a determination not to provide access to the first application, providing the first application access to a first dummy data element. | 09-18-2014 |
20140325022 | MAXIMIZING THROUGHPUT OF STREAMING MEDIA BY SIMULTANEOUSLY CONNECTING TO STREAMING MEDIA SERVER OVER MULTIPLE INDEPENDENT NETWORK CONNECTIONS - A method, system and computer program product for maximizing throughout of streaming media. The client device simultaneously establishes multiple independent network connections with a server (e.g., streaming video server) to access various segments of a file (e.g., video file). The client device requests a different segment of the file to be downloaded from the server across each of these network connections based on the throughput of each network connection. The received segments of the file are buffered and combined to provide continuous uninterrupted access to the received segments of the file. In this manner, the user will be able to view the contents of the file without any interruptions or pauses while at the same time without requiring any coordination between the client device and the server and without any degradation in the quality of the viewed content of the file. | 10-30-2014 |
20140325024 | MAXIMIZING THROUGHPUT OF STREAMING MEDIA BY SIMULTANEOUSLY CONNECTING TO STREAMING MEDIA SERVER OVER MULTIPLE INDEPENDENT NETWORK CONNECTIONS - A method, system and computer program product for maximizing throughout of streaming media. The client device simultaneously establishes multiple independent network connections with a server (e.g., streaming video server) to access various segments of a file (e.g., video file). The client device requests a different segment of the file to be downloaded from the server across each of these network connections based on the throughput of each network connection. The received segments of the file are buffered and combined to provide continuous uninterrupted access to the received segments of the file. In this manner, the user will be able to view the contents of the file without any interruptions or pauses while at the same time without requiring any coordination between the client device and the server and without any degradation in the quality of the viewed content of the file. | 10-30-2014 |
20140337782 | REPRESENTATION AND CONTROL OF THE SCOPE OF IMPACT IN INHERITED SETTINGS - A value inheritance widget system includes a display device including a user interface, and a value impact engine coupled to the display device. The value impact engine is configured to display at least one widget on a user interface. The widget includes a value. The value comprises an inherited value. The value impact engine is further configured to display information of a scope of inheritance of the value before user interaction with the widget. The information of the scope of inheritance of the value includes a number of inheritance levels of the value and a number of objects impacted by a change to the value. The value impact engine is further configured to receive a user input changing the value of the widget and change the value of the widget and the objects in response to receiving the user input. | 11-13-2014 |
20140351721 | MODIFICATION OF WINDOWS ACROSS MULTIPLE DISPLAYS - In a method for redrawing a two web page windows that are being moved from a first display screen to a second display screen, an indication is received that each respective web page window is being moved from a first display to a second display. A processor identifies different scaling factors corresponding to uniform resource locators (URLs) of each respective web page window for scaling the web page windows for display on the second display screen. The processor causes the first web page window to be scaled according to the first scaling factor and the second web page window to be scaled according to the second, different scaling factor, wherein each web page window is scaled differently relative to the other on the second display screen than on the first display screen. | 11-27-2014 |
20140351730 | Treemap Perspective Manipulation - Dynamic display of hierarchical data in the form of a treemap. A first instance of an object representation is selected in a first visualization of a hierarchy encoded by containment. A second instance of the object representation is designated, wherein each instance is a tier for object occupation. An object within the hierarchy is displayed as a shape comprising at least two opposing surfaces, and the object is selected through the opposing surfaces. The hierarchy is dynamically re-ordered in response to the selection and designation, and the second representation of the hierarchy is displayed based on the dynamic re-ordering. | 11-27-2014 |
20140351731 | Treemap Perspective Manipulation - Dynamic display of hierarchical data in the form of a treemap. A first instance of an object representation is selected in a first visualization of a hierarchy encoded by containment. A second instance of the object representation is designated, wherein each instance is a tier for object occupation. An object within the hierarchy is displayed as a shape comprising at least two opposing surfaces, and the object is selected through the opposing surfaces. The hierarchy is dynamically re-ordered in response to the selection and designation, and the second representation of the hierarchy is displayed based on the dynamic re-ordering. | 11-27-2014 |
20140365833 | CAPTURING TRACE INFORMATION USING ANNOTATED TRACE OUTPUT - A computer receives a first trace output, generated during a first execution of a first program, that is annotated with an indication of a first pattern of logged events and one or more second programs that identify additional logged events. The computer identifies the first pattern of logged events in a second trace output, which is generated during a second execution of the first program. The computer executes the one or more second programs to identify one or more additional logged events that are discoverable during the second execution of the first program, wherein the one or more additional logged events are not included in the first trace output. The computer determines that the end first pattern of logged events in the second trace output has been reached. The computer ceases execution of the one or more second programs. | 12-11-2014 |
20140366127 | TOUCHSCREEN SECURITY USER INPUT INTERFACE - A touchscreen security interface for guiding a user in entering a “pattern-based password” (for example, a password based on one or more gestures of a fingertip or stylus). The touchscreen security interface can alternatively be displayed at multiple angular orientations which can make the password entry process more secure with respect to phenomena like grease attacks and shoulder surfing. The touchscreen security device may take the form of a rotatable keypad, rotatable between four different angular orientations occurring at 90 degree angular intervals. | 12-11-2014 |
20140372846 | READER-CONFIGURABLE AUGMENTATION OF DOCUMENT CONTENT - Document content is parsed using a reader-defined content creation profile. The document content includes information and information layout specified by an author of the document content. The reader-defined content creation profile specifies document content creation preferences specified by a reader and applicable to augment the document content. A group of individual items of information usable to create augmented document content is identified, as specified by the reader-defined content creation profile, within the parsed document content. A new item of augmented document content is created, as specified by the reader-defined content creation profile, using at least a portion of the identified group of individual items of information. At least the created new item of augmented document content is rendered at a display location specified by the reader-defined content creation profile. | 12-18-2014 |
20150020183 | REPRESENTATION AND CONTROL OF THE SCOPE OF IMPACT IN INHERITED SETTINGS - A method for representing and controlling an impact and scope of a widget value includes displaying at least one widget on a user interface. The widget includes a value. The value includes an inherited value. The method also includes displaying information of a scope of inheritance of the value before user interaction with the widget. The information of the scope of inheritance of the value includes a number of inheritance levels of the value and a number of objects impacted by a change to the value. The method also includes receiving a user input changing the value of the widget. The method also includes changing the value of the widget and the objects in response to receiving the user input. | 01-15-2015 |
20150074509 | TRANSFORMING A WEBSITE FOR DYNAMIC WEB CONTENT MANAGEMENT - Transforming a website for dynamic web content management includes identifying aspects of a static website that are to be under dynamic web content management, organizing the aspects of the static website in preparation for storing the aspects, and storing the aspects of the static website with a specific identifier. | 03-12-2015 |
20150074510 | TRANSFORMING A WEBSITE FOR DYNAMIC WEB CONTENT MANAGEMENT - Transforming a website for dynamic web content management includes identifying aspects of a static website that are to be under dynamic web content management, organizing the aspects of the static website in preparation for storing the aspects, and storing the aspects of the static website with a specific identifier. | 03-12-2015 |
20150082159 | TEXT RESIZING WITHIN AN EMBEDDED IMAGE - A computer receives user preferences. The computer receives a document, wherein the document includes an image. The computer determines that the image contains embedded text. The computer determines that the embedded text does not satisfy the received user preferences. The computer modifies the embedded text to satisfy user preferences. | 03-19-2015 |