Patent application number | Description | Published |
20130346525 | PRIORITIZING ELECTRONIC MESSAGES BASED ON COMMUNITY VALUES - Embodiments of the present invention provide a system, method, and program product to prioritize a plurality of electronic messages. In an exemplary embodiment, a computer receives at least one vote, from at least one first user of a plurality of user, for each of the plurality of electronic messages. The at least one vote indicates which of the plurality of user is required to respond to each of the plurality of electronic messages. In the exemplary embodiment, the computer creates a community value for each of the plurality of electronic messages based, at least in part, on the at least one vote. The computer prioritizes the plurality of electronic messages based, at least in part, on the community value. In the exemplary embodiment, the at least one vote is received from at least one of a sender or an addressee of the plurality of electronic messages. | 12-26-2013 |
20150120685 | VERSION CONTROL WITH ACCEPT ONLY DESIGNATIONS - Version control for a document can include receiving from a user a request to commit one or more revisions to a master document in a document repository. The one or more revisions can be included in a local copy of the master document. A processor can determine whether an accept only designation is assigned to at least a portion of the local copy. In response to a determination that an accept only designation is assigned to at least a portion of the local copy, the respective revisions assigned an accept only designation can be disallowed from incorporation into the master document. Revisions made to the master document can be sent to the user for incorporation into the user's local copy of the master document. Such sending is not prevented by the assignment of an accept only designation to at least a portion of the local copy of the master document. | 04-30-2015 |
20150178722 | TEMPORARY PASSCODE GENERATION FOR CREDIT CARD TRANSACTIONS - Embodiments of the present invention disclose a method, computer program product, and system for verifying the identity of a card user. A computer sends one or more temporary passcodes to a user device. The computer sends a prompt to a point of sale device, wherein the prompt requests a predefined, identifying input. The computer receives the temporary passcode, the computer verifies that the received temporary passcode is substantially similar to at least one of the one or more passcodes sent to the user device. | 06-25-2015 |
20150186124 | MERGING WEIGHTED RECOMMENDATIONS FOR INSTALLATION AND CONFIGURATION OF SOFTWARE PRODUCTS - A method for installation and configuration of selectable components of a software product. An installation user interface allows a user to identify and select a plurality of install and configuration templates from multiple sources for recommended installation of selectable software components. Responsive to a user selecting multiple install and configuration templates, the user is enabled to apply a relative weight for each of the selected install and configuration templates, wherein the relative weight is applied to each selectable software component included in the weighted template. The weighted software components from each of the install and configuration templates are merged to determine a weighted value for each selectable component. Weighted software components having a weighted value that exceed a predetermined threshold value are determined. Each selectable component having a weighted value exceeding the predetermined threshold value is installed and configured including the components to install, the install path, and other configuration options. | 07-02-2015 |
20150186127 | METHOD FOR USING SHARED INSTALLATION SESSION ENVIRONMENT TO DUPLICATE INSTALLS - A method for utilizing a partial active installation session on a first computer system for an active installation session of a program product on a second computer system. Active installation of the program product having a plurality of components is initiated on the first computer system. A plurality of deployed components installed during the partial active installation session is duplicated. The deployed software components are archived into a new installation package. The new installation package is copied and deployed to the second computer system. Installation of the active product installation is completed on the second system. | 07-02-2015 |
20150195253 | RETRIEVING BOTH SENSITIVE AND NON-SENSITIVE CONTENT IN A SECURE MANNER - A method, system and computer program product for retrieving both sensitive and non-sensitive content in a secure manner. After a proxy server establishes a secure connection between a client device and a web server, the client device receives the requested sensitive content, which includes an index file that contains a hash value that was generated by the web server. The web browser of the client device further issues a request to the proxy server to establish a non-secure connection to retrieve non-sensitive static content from the web server. After receiving the requested content, the web browser of the client device generates a hash value over the received content. If this generated hash value is equal to the hash value contained in the index file, then the web browser accepts the received non-sensitive static content. In this manner, both sensitive and non-sensitive content can be retrieved in a secure manner. | 07-09-2015 |
20160110187 | PARALLEL DEVELOPMENT OF DIVERGED SOURCE STREAMS - Methods and systems may provide for tracking, on a position-by-position basis in a diverged code history associated with a diverged source stream, an origin source stream and an original position of code contained within the diverged source stream. Additionally, a modification may be detected with respect to a first portion of the code contained within the diverged source stream at a first position. In such a case, the modification and the first position may be automatically documented in the diverged code history. | 04-21-2016 |
20160110189 | PARALLEL DEVELOPMENT OF DIVERGED SOURCE STREAMS - Methods and systems may provide for tracking, on a position-by-position basis in a diverged code history associated with a diverged source stream, an origin source stream and an original position of code contained within the diverged source stream. Additionally, a modification may be detected with respect to a first portion of the code contained within the diverged source stream at a first position. In such a case, the modification and the first position may be automatically documented in the diverged code history. | 04-21-2016 |