Patent application number | Description | Published |
20120239899 | Leasing Fragmented Storage Between Processes - A mechanism is provided for leasing fragmented storage between processes. The mechanism comprises a fragmented memory manager associated with instances of virtual memory managers to provide a pool of memory that may lease from the owners of the memory and in turn sub-let the memory for use by other processes or owners. The mechanism allows programs to operate under normal conditions until fragmentation sets. A different memory manager leases those fragmented memory blocks from processes to create a virtually contiguous block of memory that it can sub-lease to processes in need of temporary expansion beyond the memory available for the processes under normal circumstances. | 09-20-2012 |
20130191891 | AUTOMATIC PROVISIONING OF RESOURCES FOR MEETING COLLABORATION - A method may comprise maintaining by a computer system connected to a network an indication of availability dates and times of one or more output devices connected to the network. The computer system may receive an output device invitation indicating an output device to reserve for a meeting conducted over a conferencing system and determine whether the output device is available for reservation during a date and time period of the meeting. The computer system may be communicating over the network to the output device activation information indicating that the output device is to become active at a predetermined date and time related to the date and time period of the meeting and login information including a credential for the output device to use for logging into the conferencing system for the meeting. | 07-25-2013 |
20130191896 | AUTOMATIC PROVISIONING OF RESOURCES FOR MEETING COLLABORATION - A system for provisioning an output device, may include a processor; a memory; and a records display program. The records display program may be executed by the processor to maintain an indication of availability dates and times of one or more output devices connected to the network; to receive an output device invitation indicating a first output device to reserve at a meeting conducted over a conferencing system; to determine whether the first output device is available for reservation during a date and time period of the meeting; and to communicate to the first output device activation information indicating that the first output device is to become active at a first predetermined date and time related to the date and time period of the meeting and login information including a first credential for the first output device to use for logging into the conferencing system for the meeting. | 07-25-2013 |
20140006495 | AUTHORIZING ACCESS TO A WEB CONFERENCE FOR A SPECIFIED DURATION OF TIME | 01-02-2014 |
20140215632 | PREVENTING THE DETECTION AND THEFT OF USER ENTRY ALPHANUMERIC SECURITY CODES ON COMPUTER TOUCH SCREEN KEYPADS - Preventing, discernible patterns of surface marks resulting from the repetitive entry of security codes to computer device touch screen alphanumeric keypads. There is predetermined the number of security code entries after which the positions of the representative keys in the keypad array should be reconfigured. This predetermined number should be the number of security code entries estimated to produce a pattern of distinguishable display surface marks coincident with a users repetitive entry alphanumeric character security code. The number of security code entries is counted. When the count of the predetermined number of security code entries has been reached, the representative keys in the displayed keypad array are reconfigured. This implementation is equally effective against thieves who are visually stealing the security codes over the user's shoulder. | 07-31-2014 |
20150030148 | Key Code for a Conference Operation - Methods, products, apparatuses, and systems may facilitate a conference operation. The conference operation may include conference chaining, conference switching, conference modification, conference announcement, and so on. A collection of authentication data for a plurality of distinct conferences may be performed to chain the conferences. Switching among the distinct conference may be performed in response to a switch key code. The switch key code may include a general key code applicable to each of the conferences and/or a specific key code application to a specific conference. | 01-29-2015 |
20150095087 | Calendar Integration In A Collaborative Environment - Integration of a virtual collaborative environment with an electronic meeting calendar. The virtual collaborative environment functions in a shared pool of resources to provide a virtual medium for multiple entities to work together. The electronic meeting calendar and scheduling integrates with the collaboration. Three separate and distinct factors are accounted for with the scheduling, including establishing a meeting, the duration of the meeting, and the attendees. Each of these factors is considered based upon content uploaded to the collaborative environment. | 04-02-2015 |
20150178062 | AUTOMATED COMPUTER APPLICATION UPDATE ANALYSIS - A comparison tool compares metadata that describes an original workflow and metadata that describes a customized workflow. The original workflow and the computer application provide original functionality. The customized workflow is a modified version of the original workflow. The customized workflow and the computer application provide customized functionality. Analysis results, such as a report, are generated that represent the customized functionality. The comparison tool may further compare the original workflow metadata and customized workflow metadata with metadata that describes an updated original workflow. The updated original workflow and an updated version of the computer application provide updated functionality. Analysis results may be generated that represent the customized functionality merged with updated functionality, and a merged workflow may be created. A workflow editor may generate the metadata by associating step-specific metadata, such as origin metadata, type-of-step metadata, and dependency metadata, with individual workflow steps in the workflows. | 06-25-2015 |