Patent application number | Description | Published |
20100141431 | VEHICLE METHOD, SYSTEM, AND PROGRAM PRODUCT FOR MANAGING ELECTRICAL DEVICE POWER STATE - A system, method, and program product that manages the power state of a portable electrical device located within a monitored region about a vehicle. Information about the portable electrical device such as the power state of the portable electrical device is obtained and used to identify an action for the portable electrical device. Suitable actions include, but are not limited to, transitioning the power state of the portable electrical device and/or providing a notification about the portable electrical device. Other information such as the state of the ignition of the vehicle and/or the proximity of the driver and/or a passenger(s) with respect to the vehicle may additionally or alternatively be used to determine the action. | 06-10-2010 |
20100145563 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR CONTROLLING VEHICLE OPERATIONS BASED ON OBJECT PRESENCE - A system, method, and program product controls an operation of a vehicle based on the presence of one or more foreign objects within one or more monitored zones about the vehicle. One or more transceivers receive information about the one or more foreign objects. Based on the received information and the one or more corresponding zones, one or more controllers identify a response, which may include notifying the user about the foreign object and/or generating a signal that inhibits the ignition from turning on. The system, method, and program product also control an operation of a vehicle based on the absence of an object of the vehicle. Likewise, the one or more controllers identify a response, which may include notifying the user about the missing object and/or generating a signal that inhibits the ignition from turning on. | 06-10-2010 |
20100145609 | ENERGY AND EMISSION RESPONSIVE ROUTING FOR VEHICLES - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for vehicle route planning as a function of vehicle type. A plurality of different routes for travel by a vehicle from a trip origin to a destination is determined, and the vehicle identified as either an internal combustion engine vehicle type or a hybrid vehicle type. A programmable device is caused to recommend a route of the determined plurality of routes to an operator of the identified vehicle as a function of the identified vehicle type, wherein a route recommended to the identified internal combustion engine vehicle type is different from a route recommended to the identified hybrid vehicle type. In some examples, identifying the vehicle as configured to generate operative energy through a regenerative braking energy component results in recommending a route will cause more breaking over a faster route. | 06-10-2010 |
20100161146 | VARIABLE ENERGY PRICING IN SHORTAGE CONDITIONS - This disclosure enables energy providers and users to establish variable pricing or maximum thresholds for individual components (aka appliances) or groups of components. The consumer (individual or business) defines a usage policy for each device or component which defines limits the consumer is willing to pay in a supply shortage. The usage policy also defines safety parameters as well as energy limiting capabilities of the appliance or component. Energy suppliers use this usage policy to determine which devices get managed or powered off in a shortage situation. With the detailed consumer supply and demand data available from this invention, energy providers may use economic analysis to better understand customer price sensitivity. This information will enable the provider to run simulations of different energy shortage scenarios. | 06-24-2010 |
20100161456 | SHARING VIRTUAL SPACE IN A VIRTUAL UNIVERSE - An approach that provides sharing of the same virtual space by a plurality of avatars in a virtual universe by grouping the avatars belonging the virtual space and isolating each group. In one embodiment, there is an isolating tool, including a grouping component configured to group each of the plurality of avatars belonging to defined virtual space according to predefined grouping criteria. The isolating tool further includes an isolating component configured to isolate each group within each of the plurality of virtual spaces based on the grouping. | 06-24-2010 |
20100161788 | MONITORING USER DEMOGRAPHICS WITHIN A VIRTUAL UNIVERSE - An invention that provides discovery and transfer of assets in a virtual universe is provided. In one embodiment, there is an asset transfer utility, including an inventory component configured to display to a user within a virtual universe an inventory containing a plurality of assets owned by other users within the virtual universe, each of the plurality of assets listed anonymously. A search component is configured to search the inventory containing the plurality of assets. A selection component is configured to select a set of assets from the plurality of assets based on the search. A transfer component is configured to transfer the set of assets between the user and an owner of each of the set of assets. | 06-24-2010 |
20100169227 | ENERGY MANAGEMENT AND QUALITY OF SERVICE (QoS) - Under the present invention, users are provided with the capability to select how energy will be throttled in shortage conditions. For example, users can promise to throttle or cut energy to devices that they consider noncritical (e.g. television, toaster, stereo) in exchange for a promise that the energy company will continue to give them enough to run more essential devices (e.g. lights, well pump, etc.). As users agree to lower usage in response to a energy shortage, they are provided a higher QoS rating than users who do not offer to lower usage. As a shortage worsens, conserving users will be allocated energy before non-conserving users. Enforcement and fulfillment of obligations established in agreements may be automated to ensure compliance. | 07-01-2010 |
20110106865 | DYNAMIC EDITING OF DATA REPRESENTATIONS USING CASCADING WEIGHTS - A method and system for representing data includes providing a data representation according to defined variables and a functional relationship between the defined variables and receiving an assigned weight assigned to a defined variable. The method includes receiving a modification of a selected defined variable, and providing a further data representation according to a recalculation of an unselected defined variable, based upon the functional relationship, the assigned weight and the modified variable. Assigned weights and a plurality of modifications of the weighted variable are received. A further data representation is provided according to a further recalculation of the weighted variable based upon a weight selected from the assigned weights according to a previous modification of the weighted variable. The recalculating is performed according to a number of modifications performed since the previous modification of the weighted variable and according to a period of time since the previous modification of the weighted variable. | 05-05-2011 |
20110208419 | ROUTE OPTIMIZATION - In general, the present invention relates to route optimization/prediction. In one embodiment, the present invention provides visibility to future predicted traffic situations, based on all reserved routes in a system at a given point in time. This allows city planners, for example, to know where traffic will be to adjust traffic flow accordingly. Additional value comes into play by being able to calculate and publish aggregated savings from using this system, such as driver time, mileage, and gas. This information may be added to a database and made available to individuals via their GPS. In a typical implementation, a request for a route is received from a requester. Based on the request, an optimized route and a potential position of the requester within the optimized route are determined and then proposed to the requester. The requester can then select an option from the proposal. | 08-25-2011 |
20110208733 | GRAPHICALLY SEARCHING AND DISPLAYING DATA - Embodiments of the present invention provide a multifaceted tool (e.g., graphical representation/object) for searching and displaying data (e.g., search results). Specifically, aspects of the present invention build on “seed” terms to find and display related words, presenting them in a graduated manner by closeness to the seed. The tool allows a user to select variable weights which indicate the desired degree of closeness to the seed word/idea, or it may be randomly generated. Additionally, this tool may be used to create brainstorm teams with a desired level of variance from a target subject. In a typical embodiment, the a search or seed term and corresponding results are displayed in a hub and spoke-like graphical representation whereby the seed term is positioned in a center window of the graphic, and results are displayed in branches that extend radially from the center. Each branch can correspond to a different information source from which the corresponding results were obtained. | 08-25-2011 |
20110218833 | SERVICE CLASS PRIORITIZATION WITHIN A CONTROLLABLE TRANSIT SYSTEM - An embodiment of the invention provides for multiple service classes within a controllable transit system (e.g., a PRT system), by route allocation according to service class priority. Routes are optimized for vehicles needing or entitled to the highest service level, then remaining capacity is used to optimize routes for the next lower service class. Such optimization can be extended indefinitely, through “N” service classes of service. In addition, an embodiment of the invention allows the cataloging of PRT capacity and vehicle types/roles/emissions, as well as related business models. The system provided hereunder provides a means of ensuring that various service classes of system users can be given treatment according to the service class in which they reside. Such prioritization leads to a more flexible system, with higher user satisfaction and a greater number of available business models (e.g., “pay for service class”) permissible within the transit system. | 09-08-2011 |
20110218834 | RECONCILING SERVICE CLASS-BASED ROUTING AFFECTING USER SERVICE WITHIN A CONTROLLABLE TRANSIT SYSTEM - Aspects of this invention provide gradient means for reconciling user service class prioritization. Under this approach, higher priority service classes may be maintained and used to compute routes for reaching desired destinations. However, when such treatment poses a cumulative disadvantage (e.g., an adverse impact that exceeds a predetermined “impact” threshold”) to too many users/vehicles, the routing algorithms may be adjusted to minimize overall inconvenience. As such, aspects of this invention provide a means of ensuring that various service classes of system users will not be affected negatively beyond predefined thresholds. Such reconciliation leads to a more flexible system, with higher user satisfaction permissible within the transit system. | 09-08-2011 |
20110218835 | CHANGING PRIORITY LEVELS WITHIN A CONTROLLABLE TRANSIT SYSTEM - Embodiments of the present invention provide for the changing/updating of priority levels within a controllable transit system. Specifically, vehicles and/or users thereof will be assigned a particular service level using any number of factors. Based on this service level, as well as any transit criteria specified, a route to a desired destination will be computed. Typically, the higher the service level assigned, the higher the priority that will be given to the particular vehicle/user. Under the present invention, the priority level of a vehicle/user can be changed (e.g., increased) upon request to result in an improved transit time and/or route to the desired destination. Examples of types of requests that may result in an increased priority level (but are not limited to) are: (1) payment of a fee for increased priority level; (2) trading priority levels with other vehicle/users; and (3) bidding in an auction-like environment for an improved priority level; etc. | 09-08-2011 |
20110225016 | CONSTRAINED RESOURCE MANAGEMENT - Implementation of resource management services is provided. A method includes setting a price, per unit of a resource, for a defined time period and based upon a collective projected resource demand corresponding to resource consumption entities (RCEs). For the duration of the time period, the method includes iteratively performing: monitoring actual usage of the resource for each of the RCEs. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and a projected surplus exists for another RCE, the method includes re-allocating a number of projected surplus units of the resource from the RCE having the projected surplus to the other RCE having the projected shortage. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and no projected surplus exists for any of the other RCEs, the method includes acquiring additional units of the resource. | 09-15-2011 |
20110299834 | PROGRAM REVIEW ON ALTERNATE DISPLAY DEVICES - A system and a method of recording a branch of a program being viewed on a primary viewing device coupled to a video recorder for playback of the branch on a secondary viewing device including the steps of creating a branch point in a program responsive to receiving a signal through an interface of the video recorder; recording a branch of the program from the branch point onward in the readable storage media; and sending the recorded branch to the secondary viewing device for viewing. | 12-08-2011 |
20110299836 | REPLACE CONTENT WITH LIKE CONTENT TO ENHANCE PROGRAM EXPERIENCE - A method and a system for replacement of programs on a video recorder based on preferences and size constraints of a video recorder. The video recorder compares recorded programs in the computer readable storage media and a schedule of programs to be recorded to a plurality of global preferences and program specific preferences specifying preferred recording quality. For each recorded program whose quality does not match a global preference or program specific preference, a listing of future programs is examined for alternate versions of the program which do match a global preference or program specific preference. | 12-08-2011 |
20110302430 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 12-08-2011 |
20110320828 | POWER MANAGEMENT AND PRIORITY CHARGING ASSIGNMENTS - Systems and methods are provided for managing power to devices in a network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving scheduled upcoming calendar events and/or activities from one or more of a plurality of devices connected in a network. The method further includes centrally managing power consumption of a device of the plurality of devices in the network based on the scheduled upcoming calendar events and/or activities. | 12-29-2011 |
20110320832 | MANAGING ELECTRICAL POWER IN A VIRTUAL POWER DELIVERY NETWORK - Systems and methods are provided for managing power to devices in a virtual power delivery network, using a centralized power allocation controller. The method of managing power consumption of a plurality of devices includes receiving device information from one or more devices connected in a virtual power delivery network. The method further includes managing power consumption of the one or more devices in the virtual power delivery network based on the received device information. | 12-29-2011 |
20120020468 | CONFERENCE CALL MANAGEMENT METHOD AND SYSTEM - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 01-26-2012 |
20120096408 | SYSTEM AND METHOD FOR ESTABLISHING A COLLABORATIVE WORKSPACE - An approach that establishes a collaborative workspace for one or more users based on a predefined context. In one embodiment, there is a collaborative workspace tool that includes a user input component configured to receive one or more user inputs when selecting collaborative workspace content from a plurality of pre-arranged resources displayed on a user interface to include in a collaborative workspace. The collaborative workspace tool further includes a preserving component configured to gather information relating to the selected workspace content, build a workspace object to preserve the selected workspace content and save the workspace object; and a rendering component to build the collaborative workspace on a user device when the workspace object is opened from the user device. | 04-19-2012 |
20120096470 | PRIORITIZING JOBS WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to prioritize jobs (e.g., within a cloud computing environment) so as to maximize positive financial impacts (or to minimize negative financial impacts) for cloud service providers, while not exceeding processing capacity or failing to meet terms of applicable Service Level Agreements (SLAs). Specifically, under the present invention a respective income (i.e., a cost to the customer), a processing need, and set of SLA terms (e.g., predetermined priorities, time constraints, etc.) will be determined for each of a plurality of jobs to be performed. The jobs will then be prioritized in a way that: maximizes cumulative/collective income; stays within the total processing capacity of the cloud computing environment; and meets the SLA terms. | 04-19-2012 |
20120113323 | COMPARING LOW QUALITY BROADCASTS TO HIGH QUALITY BRAODCASTS - A system, method, and computer program product for comparing a low quality broadcast to a high quality broadcast on a display device to show users the benefits of a high quality broadcast over a low quality broadcast. The display device capabilities are detected and compared to retrieved requirements for displaying a high quality broadcast. If the display requirements are met, retrieving the high quality broadcast and displaying the low quality and high quality broadcasts on a display device for user comparison. Then, the user accepts either the high quality or low quality broadcast and displays the high quality broadcast or the low quality broadcast in accordance with the user selection. | 05-10-2012 |
20120116789 | OPTIMIZING QUEUE LOADING THROUGH VARIABLE ADMITTANCE FEES - Attraction attendance levels experienced by a customer are dynamically managed as a function of customer admission pricing. A customer is offered an opportunity to pay a regular admission fee or a higher premium admission fee for admission to a facility with one or more attractions, wherein the customer is provided with information as to an amount of reduced queue loading that will be achieved by the customer if the customer pays the premium admission fee. Queue loading is monitored, and a queue load diminishment relative to an expected queue load is identified, the amount of reduced queue loading achievable by the customer through paying the premium admission fee updated accordingly. The customer is notified of the updated amount of reduced queue loading achievable through paying the premium admission fee as a function of customer metadata. | 05-10-2012 |
20120116863 | OPTIMAL SCHEDULING OF VENUE ATTENDANCE BASED ON QUEUE SIZE AND LOCATION - Embodiments of the invention provide for managing attraction attendance levels through tracking current attendance levels and notifying patrons of incentives to alter their attraction selections in real-time. Examples identify an attraction queue that has a customer wait time failing to meet a threshold and determine a geographic relationship of a tracking device associated with a registered customer to the queue. Accordingly, an incentive is created from metadata associated with the queue and offered to the registered customer to urge the registered customer to take a queue balancing action. The queue balancing action may be leaving the queue if the customer wait time exceeds a threshold maximum wait time and the tracking device is within the queue, or choosing to enter the queue if the customer wait time is less than a threshold minimum wait time and the tracking device is outside of the queue. | 05-10-2012 |
20120122566 | ACCESS CONTROL FOR ELECTRONIC ENTERTAINMENT SYSTEMS - Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules. | 05-17-2012 |
20120128146 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-24-2012 |
20120131631 | TRANSFERRING A BROADCAST TRANSMISSION TO A REMOTE DEVICE - An approach is described that includes determining that a remote device has moved outside of a pre-defined area associated with a digital video recorder (DVR), and transmitting program data from the DVR to the remote device while the remote device remains outside of the pre-defined area. Another approach includes a digital video recorder (DVR) having a memory and a processor. The DVR operates to: receive an incoming transmission signal; transmit a selected program to a primary display device; determine that a remote device has moved outside of a pre-defined area; and transmit program data corresponding to the selected program to the remote device while the remote device remains outside of the pre-defined area. | 05-24-2012 |
20120134652 | PROXY DIGITAL VIDEO RECORDER - A proxy-based digital video recording system and method, including receiving a request to record a video program from a requesting user and transmitting a request for the video program over a network to a first provider server. The requested video program is received and stored in memory according to a first provider format. A digital video format of a digital video recorder associated with the requesting user is determined, the stored video program is converted from the first provider format to the digital video format, and the converted video program is transmitted to the digital video recorder. | 05-31-2012 |
20120173708 | IDENTIFYING OPTIMAL PLATFORMS FOR WORKLOAD PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a workload optimization approach that measures workload performance across combinations of hardware (platform, network configuration, storage configuration, etc.) and operating systems, and which provides a workload placement on the platforms where jobs perform most efficiently. This type of placement may be based on performance measurements (e.g., throughput, response, and other such service levels), but it can also be based on other factors such as power consumption or reliability. In a typical embodiment, ideal platforms are identified for handling workloads based on performance measurements and any applicable service level agreement (SLA) terms. | 07-05-2012 |
20120180045 | DETERMINING AN OPTIMAL COMPUTING ENVIRONMENT FOR RUNNING AN IMAGE - Aspects of the present invention provide an approach that evaluates a locally running image (e.g., such as that for a virtual machine (VM)) and determines if that image could run more efficiently and/or more effectively in an alternate computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention evaluate the local (existing/target) image's actual and perceived performance, as well as the anticipated/potential performance if the image were to be migrated to an alternate environment. The anticipated/potential performance can be measured based on another image that is similar to the existing/target image but where that image is running in a different computing environment. Regardless, the system would display a recommendation to the end user if it were determined that the image could perform better in the alternate environment (or vice versa). It is understood that performance is just one illustrative metric for which the system would perform a comparison. Other metrics such as cost, reliability, availability, etc. could also be used. | 07-12-2012 |
20120185868 | WORKLOAD PLACEMENT ON AN OPTIMAL PLATFORM IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for optimizing workload placement in a networked computing environment (e.g., a cloud computing environment). Specifically, under embodiments of the present invention, a workload placement technique is applied to determine an optimal platform for handling an identified workload. The workload placement technique can comprise one or more of the following: a shadow placement technique whereby the workload is placed on multiple similar platforms substantially contemporaneously; a simultaneous placement technique whereby the workload is placed on multiple different platforms substantially contemporaneously; and/or a single platform placement technique whereby the workload is placed on a single platform at a given time. Once an optimal platform is identified, a workload timing method may be applied to determine when the workload should be placed thereon. The workload timing method can comprise one or more of the following: a time-based method whereby the workload is placed on the optimal platform at a predetermined time or time interval; and/or an event-based method whereby the workload is placed on the optimal platform based on an occurrence of one or more events external to the workload itself (e.g., a certain CPU or memory consumption, etc.). Once the workload is placed on the optimal platform, optimization data can be gathered for future assessments. | 07-19-2012 |
20120201366 | CONFERENCE CALL MANAGEMENT - A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call. | 08-09-2012 |
20120209451 | CONTROLLING VEHICLE OPERATIONS BASED ON OBJECT PRESENCE - Operation of a vehicle is controlled based on the presence of or absence of one or more identified foreign objects within one or more monitored zones about the vehicle. One or more transceivers receive information about the one or more foreign objects. Based on the received information and the one or more corresponding zones, one or more controllers identify a response, which may include notifying the user about the foreign object and/or generating a signal that inhibits the ignition from turning on. Controllers identify a response, which may include notifying a user about a present or absent object or generating a signal that inhibits the ignition from turning on. | 08-16-2012 |
20120219136 | TELEPHONY SERVICES OPTIMIZATION THROUGH CALLING PLAN ANALYSIS - Embodiments of the present invention provide optimization of telephone services through telephone calling plan/card analysis. The least expensive rate is found for telephone calls at any given time and/or date, either through static pre-entry of data, or through dynamic querying of rates via a web-based look-up table, and places calls according to an optimized calling plan. Specifically, in a typical embodiment, an outgoing/target telephone number for an intended telephone call is captured, and a corresponding destination geographic region is identified. Based on the geographic region, a calling plan resulting in a lowest price for the telephone call is identified. This is typically accomplished by consulting at least one table (e.g., call information table) that associates (among other things) calling plans and/or calling cards with geographic regions. Once a calling plan and/or calling card is identified/selected, a corresponding set of dialing instructions will be obtained from the table and used to make/place the telephone call. | 08-30-2012 |
20120251084 | REPLACE CONTENT WITH LIKE CONTENT TO ENHANCE PROGRAM EXPERIENCE - A method and a system for replacement of programs on a video recorder based on preferences and size constraints of a video recorder. The video recorder compares recorded programs in the computer readable storage media and a schedule of programs to be recorded to a plurality of global preferences and program specific preferences specifying preferred recording quality. For each recorded program whose quality does not match a global preference or program specific preference, a listing of future programs is examined for alternate versions of the program which do match a global preference or program specific preference. | 10-04-2012 |
20120266164 | DETERMINING STARTING VALUES FOR VIRTUAL MACHINE ATTRIBUTES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for determining starting values of attributes for a requested virtual machine. Specifically, in a typical embodiment, a request for a virtual machine is received from a requester. An image corresponding to the virtual machine is then obtained. A set of statistics pertaining to at least one previous operation of a related virtual machine is analyzed and used to recommend starting values for a set of attributes of the virtual machine (e.g., a processor speed, a memory capacity, a disk capacity, a network capacity, etc.). The starting values can be determined by selecting a graphical curve, which depicts attribute values versus time, pertaining to a particular attribute and then providing recommended the starting values for the attribute based on a position along the graphical curve as determined based upon the analysis of the set of statistics. Thereafter, an instance of the virtual machine that has the starting values can be generated based on the image. | 10-18-2012 |
20120284380 | IDENTIFYING OPTIMAL VIRTUAL MACHINE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying optimal virtual machine (VM) images in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of system requirements, a profile, and a performance state of the networked computing environment are received as input and analyzed against a library of VM images. Based on the analysis, a set of VM images having software programs (e.g., also referred to herein as a software stack) capable of accommodating requirements defined by the input is identified. A requester can select one or more of the identified VM images, which can then be provisioned/deployed accordingly. | 11-08-2012 |
20120284708 | CONFIGURING VIRTUAL MACHINE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for configuring virtual machine (VM) images in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a provided VM image is associated with a set of competing VM images (e.g., via a web-based portal). Once the competing VM image(s) are associated with the provided VM image, a designation of a set of statistical actions can be designated for the provided VM image. Thereafter, a performance of the provided VM image and a performance of each of the set of competing VM images are monitored with respect to a set of predetermined attributes. This allows the performance of the provided VM image to be compared to the performance of each of the set of corresponding VM images. Based on the comparison, at least one of the set of statistical actions can be performed. In a typical embodiment, a statistical action may result in an adjustment (upward or downward) of a value of an attribute of the provided VM image where the performance of the provided image is either under-performing or over-performing with respect to a competing VM image. For example, if the provided image is performing at a speed that is a certain percentage lower than that of its competitors, the speed can be increased by a predetermined amount/percentage. | 11-08-2012 |
20120296515 | METHOD AND SYSTEM TO MODIFY ROUTING INFORMATION BASED ON DETECTION OF RATE OF CHANGE OF PRESSURE IN TIRES - Embodiments of the present invention relate to a method, system and program product for monitoring the rate of deflation or inflation in vehicular tires to determine the time or distance it takes before the tire pressure of one or more tires enters an undesirable state. Under the present invention, tire specifications, environmental modifiers, vehicular modifiers, road and weather conditions, and current tire pressure for each tire are recorded as input to provide an alert with a route plan for a driver to bring a vehicle to a service station before tire pressure reaches an undesirable condition. In one embodiment, the system can inform the driver at what time in the future a tire will reach an undesirable condition. In another embodiment, the system can inform the driver at what distance (measured in miles, for example) a tire will reach an undesirable condition. In yet another embodiment, the system can modify a route in order to avoid an unsafe tire condition. | 11-22-2012 |
20120297424 | PROXY DIGITAL VIDEO RECORDER - A computer-implemented proxy digital video recording system and method, including a processor and memory. The memory including program instructions that are executable by the processor to intercept a request to record a video program, the request triggered by a requesting user and having a request format. The proxy digital video recording system and method determines if a target digital video recorder can understand a format of the request, and translates the request into an intelligible format if the target digital video recorder cannot understand the request format. | 11-22-2012 |
20120304169 | OPTIMIZING THE CONFIGURATION OF VIRTUAL MACHINE INSTANCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for optimizing a configuration of virtual machine (VM) instances. In a typical embodiment, such optimization comprises either the splitting of a single VM instance into multiple VM instances or the consolidation of multiple VM instances into fewer (e.g., a single) VM instance. Along these lines, it will first be determined which VM instances would be good candidates for reconfiguration. Under one approach, VM instances that are candidates for reconfiguration are identified based upon an analysis of applicable/associated service level agreement (SLA) terms versus the performance of the VM instances. For example, VM instances can be reconfigured if such reconfiguration will maximize a benefit provided by the applicable SLA terms (e.g., if the splitting of a single VM instance into multiple VM instances would cause a workload to be processed more efficiently, resulting in a more favorable cost/benefit ratio). In another embodiment, candidate VM instances can be identified based upon a commonality of an entity (e.g., a consumer) associated therewith. For example, if a single entity is utilizing multiple VM instances, such VM instances could be considered candidates for consolidation to avoid unnecessary computing resource consumption. | 11-29-2012 |
20130007234 | DYNAMICALLY MODIFYING QUALITY OF SERVICE LEVELS FOR RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically modifying Quality of Service (QoS) levels for resources (e.g., applications, processes, services, etc.) running in a networked computing environment. Specifically, embodiments of the present invention dynamically adjust transport level networking QoS parameters based on associated service level agreements (SLA) term. In a typical embodiment, a set of service level requirements associated with a resource running in the networked computing environment will first be identified (e.g., in a computer data structure). Then, the set of service level requirements will be mapped to a set of QoS parameters associated with a transport layer of the networked computing environment. A current performance of the resource within the transport layer will then be determined. Once the current performance has been determined, it will be further determined whether the current performance meets the set of service level requirements. Based on this determination/comparison, the set of QoS parameters can be adjusted accordingly. | 01-03-2013 |
20130007636 | Security Enhancements for Immersive Environments - In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment. | 01-03-2013 |
20130019016 | PRE-PROVISIONING VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENTAANM Anderson; Jason L.AACI San JoseAAST CAAACO USAAGP Anderson; Jason L. San Jose CA USAANM Boss; Gregory J.AACI SaginawAAST MIAACO USAAGP Boss; Gregory J. Saginaw MI USAANM Coveyduc; Jeffrey L.AACI San JoseAAST CAAACO USAAGP Coveyduc; Jeffrey L. San Jose CA USAANM Roach; Christopher W.AACI San JoseAAST CAAACO USAAGP Roach; Christopher W. San Jose CA US - In general, embodiments of the present invention provide an approach for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments of the present invention describe an approach to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests (e.g., instantiate/populate multiple e-commerce ‘shopping carts’). In a typical embodiment, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. | 01-17-2013 |
20130024555 | PRIORITIZING DATA PACKETS ASSOCIATED WITH APPLICATIONS RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for prioritizing a set of data packets associated with an application running in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, an SLA associated with a particular application and at least one other SLA associated with at least one other application are accessed (e.g., in a database or the like). A proposed modification to a priority of a set of data packets associated with the particular application (e.g., corresponding to a workload being processed via the particular application) is then determined based on a comparison of a current performance (e.g., transmission rate) of the set of data packets versus a specified performance of the set of data packets as set forth in the SLA. Then, an effect of the proposed modification on a capability of the particular application to meet a set of terms of the SLA, and of the at least one other application to meet a set of terms of the at least one other SLA will be evaluated. Based on this evaluation, it will be determined whether to implement the proposed modification. For example, the proposed modification can be implemented if it will not cause any of the SLAs to be unmet. | 01-24-2013 |
20130031480 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - A method and system for controlling access to a resource. Visual representations of the resource and an entity are included in a display. Assignments of an access control requirement to the resource visual representation and an attribute to the entity visual representation are received. A movement in the display of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. The attribute assigned to the entity visual representation is determined to satisfy the access control requirement assigned to the resource visual representation. The entity is permitted to access the resource based on the attribute satisfying the access control requirement. A movement in the display of the entity visual representation across the boundary and a placement of the entity visual representation within the boundary of the resource visual representation are permitted based on the entity being permitted to access the resource. | 01-31-2013 |
20130036226 | OPTIMIZATION OF RESOURCE PROVISIONING IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for pre-provisioning computing resource sub-components in order to achieve improved overall provisioning times. In a typical embodiment, when a workload request is received, a set/sequence of tasks needed to complete the workload request is identified. Based on the set of tasks, a set of corresponding computing resources is determined. Rather than provision each computing resource as a whole, embodiments of the present invention break each computing resource into its individual sub-components. Once the sub-components are identified, the time required to provision (i.e., provisioning time) each sub-component is determined (e.g., based on historical data). Based on these provisioning times, an optimal order in which the sub-components should be provisioned is determined, and the sub-components are then provisioned in this order. | 02-07-2013 |
20130041989 | DYNAMICALLY RELOCATING WORKLOADS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically relocating a set of workloads among geographic regions of a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, it is determined whether a first geographic region of the networked computing environment has a first set of computing resources with an available capacity that meets a needed capacity for handling a set of workloads that is initially associated with the first geographic region. If not, a second geographic region of the networked computing environment having a second set of computing resources with the needed capacity is identified. In general, this determination can be made based upon multiple factors such as: a set of performance requirements, stored in at least one computer data structure, needed to handle the set of workloads; a set of environmental parameters, stored in the at least one computer data structure, having a potential to affect the handling of the set of workloads; and/or a set of cost parameters, stored in the at least one computer data structure, associated with handling the set of workloads. Once the second geographic region has been identified, the set of workloads can be associated with and handled thereby. | 02-14-2013 |
20130042004 | DYNAMICALLY ACQUIRING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically acquiring computing resources in a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, a set of computing resources (needed to process a set of workloads) external to a first portion of a networked computing environment is identified. Once identified, electronic negotiations with at least one provider of the set of computing resources may be held for utilizing the provider's set of computing resources to process the set of workloads. In general, the negotiations are based on at least one resource registration (setting forth terms for utilizing the set of computing resources such as usage rates, usage limitations, etc.) associated with the at least one provider stored in at least one computer data structure. Responsive to successful completion of the negotiations, the set of computing resources will be associated with the first portion. Such association can occur through various methods such as utilizing computing resources in public cloud environments, expanding the first portion to include the set of computing resources, etc. | 02-14-2013 |
20130042005 | DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity. | 02-14-2013 |
20130044996 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes receiving by a processor of an audio/video recording device, a request for recording broadcast audio/video data. The processor analyzes audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 02-21-2013 |
20130055239 | PROVISIONING OF VIRTUAL MACHINE POOLS BASED ON HISTORICAL DATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention generally describe how to utilize a pool of raw computing resources to dynamically resize environments due to workloads. Specifically, embodiments of the invention provide an approach for generating a partially pre-provisioned pool of virtual machines (VMs). The pool is typically derived from a history of patterns weighted by a potential state of a corresponding VM image to fulfill a workload request. For each VM instance, this approach determines/calculates the number of times that an instance represents a possible starting point for a VM request. The starting points are then normalized to create a probability distribution of the resulting partially pre-provisioned pool of virtual machines. | 02-28-2013 |
20130055251 | SELECTION OF VIRTUAL MACHINES FROM POOLS OF PRE-PROVISIONED VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a set of algorithmic methods that can be used to select which partially and/or pre-provisioned virtual machines (VMs) should be used as a base platform to satisfy a new workload (e.g., provisioning) request received in a networked computing environment (e.g., a cloud computing environment). Specifically, when a workload request is received, a set (e.g., at last one) of software programs needed to process the workload request is identified. Then, a set of VMs is selected from a pool of pre-provisioned VMs having the set of software programs. In general, multiple methods and/or factors can be followed to select the set of VMs. Examples include a length of time to install the set of VMs, a probability of the set of VMs being in demand, and/or or a quantity of the set of VMs having the set of software programs. Once the set of VMs has been selected, the set of VMs may be installed, and the workload request can be processed using the set of software programs. | 02-28-2013 |
20130061221 | DETERMINING VIRTUAL MACHINE IMAGE PATTERN DISTRIBUTIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for determining distributions of virtual machine (VM) patterns across pools of VM instances based upon historical data (e.g., to achieve faster provisioning times). In a typical embodiment, a total pool size for a pool of VM instances is determined (e.g., based on historical data). Then, a distribution of a set of VM instance patterns across the pool is determined (e.g., also based upon historical data). Once the distribution has been determined, the pool of VM instances may be provisioned according to the distribution. | 03-07-2013 |
20130067413 | Control of Information Technology Resource Behavior Using Visual Positioning - An embodiment of the invention provides a method for controlling computing resources using visual positioning on a graphical user interface. More specifically, a computer resource is displayed as a symbol and applications are displayed as objects on the graphical user interface. Input is received from a user, wherein the input includes movement of the symbol and/or movement of at least one of the objects on the graphical user interface. The computer resource is allocated with a processor based on the input. This includes allocating more of the computer resource to a first application and less of the computer resource to a second application when the distance between the symbol and a first object representing the first application is reduced, and when the distance between the symbol and a second object representing the second application is increased. | 03-14-2013 |
20130103219 | PROTECTING ELECTRONIC DEVICES FROM ELECTRICAL SUPPLY DISTURBANCES - Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source. | 04-25-2013 |
20130103542 | PROVIDING PERSONALIZED RESULTS FOR GIFT GIVING UTILIZING A DATABASE - An approach for providing personalized results for gift giving utilizing a database is provided. The approach includes reviewing, by a processor, an item list of a recipient, determining an item to provide to the recipient that is not on the item list, and sending the item to the recipient. The item list is stored in one or more databases of at least one of a recipient device, a merchant server, and a third party server, for querying of the item list. | 04-25-2013 |
20130124704 | RELEASING COMPUTING INFRASTRUCTURE COMPONENTS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to the release of computing infrastructure components (e.g., hardware, software, combinations thereof, etc.) from a networked computing environment for potential use by another networked computing environment. In a typical embodiment, a computing infrastructure component is identified from set of computing infrastructure components associated with a networked computing environment. It may then be determined whether the computing infrastructure component can be released from the networked computing environment. Then, responsive to the determination, the computing infrastructure component may be released from the networked computing environment. | 05-16-2013 |
20130151624 | Context-Sensitive Collaboration Channels - A method, apparatus, and computer program product for collaborating is disclosed. Responsive to a computer system receiving a selection from a user for a portion of a document, the computer system identifies a context for the selected portion of the document. The computer system identifies a set of collaboration channels corresponding to the context. The computer system determines whether the set of collaboration channels corresponding to the context is empty. The computer system then creates a new collaboration channel based on the context for the selected portion of the document responsive to the set of collaboration channels corresponding to the context being empty. | 06-13-2013 |
20130151973 | Customizing a Presentation Based on Preferences of an Audience - A method, data processing system and computer program product for customizing a presentation. A set of individual preferences for each individual of a plurality of individuals to form a set of audience preferences is determined, wherein each preference in the set of individual preferences is associated with one of a plurality of versions of the presentation. A set of versions of the presentation from the plurality of versions of the presentation is selected based on the set of audience preferences. The set of versions of the presentation selected from the plurality of versions of the presentation is presented. | 06-13-2013 |
20130151976 | Providing Feedback for Screen Sharing - A method, data processing system and computer program product for sharing displayed content. A content displayed on a source computer system is shared with a set of target computer systems, wherein the content is displayed on a target display on each target computer system in the set of target computer systems. In response to a change in the content displayed on the source computer system, a progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is identified. An indication of the progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is generated at the source computer system. | 06-13-2013 |
20130159874 | VARIABLE REFRESH RATES FOR PORTIONS OF SHARED SCREENS - Illustrative embodiments disclose setting refresh rates for different portions of a shared screen in a sharing session. A processor sets an initial refresh rate for the sharing session. The processor selects a portion of the shared screen. The processor selects a refresh rate for the selected portion of the shared screen that is different from the initial refresh rate for the sharing session. The processor refreshes the selected portion based on the selected refresh rate and a portion not selected based on the initial refresh rate. | 06-20-2013 |
20130159880 | DYNAMIC SCREEN SHARING FOR OPTIMAL PERFORMANCE - Illustrative embodiments disclose sharing an area of a computer system screen. A first computer system configures a sharing session for sharing a region of the screen with a second computer system. The first computer system assesses information on performance of the sharing session, determining from the information a minimum size of the region based on the assessment, and then selects the region to share based on the assessment and a designation by a user. | 06-20-2013 |
20130184931 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 07-18-2013 |
20130185205 | SECURE TRANSACTION AUTHORIZATION - Provided is an approach for credit transaction authorization/approval. Specifically, a particular transaction payment device/mechanism (e.g., credit card, etc.) may be associated with a set of purchase authorization criteria/rules that sets forth specific conditions (e.g., an authorization protocol) under which the transaction payment device may be utilized. When a user later attempts to conduct a proposed credit transaction using the transaction payment device, it will be determined whether the proposed credit transaction complies with this set of purchase authorization criteria (e.g., the authorization protocol). Based on this determination, the proposed credit transaction can be approved or declined. | 07-18-2013 |
20130185380 | System and Method for Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 07-18-2013 |
20130185383 | Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 07-18-2013 |
20130204963 | MIGRATING DATA BETWEEN NETWORKED COMPUTING ENVIRONMENTS - Embodiments of the present invention provide an approach for predictively migrating data between network computing environments (e.g., cloud computing environments). Specifically, in a typical embodiment, data access patterns for sets of data utilized by a set of services running in a first networked computing environment may be analyzed. Based on the analysis one or more of the sets of data may be identified as candidates to be migrated from the first networked computing environment to a second networked computing environment. Then, a data migration protocol for the one or more sets of data to be migrated to the second networked computing environment may be generated based on the data access patterns and a predicted data migration time. Based on the data migration protocol, the one or more sets of data may then be migrated to the second networked computing environment. | 08-08-2013 |
20130219067 | ACTIVATING LOCATION-BASED RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for invocation and de-allocation of networked-based resources (e.g., cloud-based resources) based on users' geographic movements. Specifically, in a typical embodiment, a set (one or more) of user preferences are received. Such preferences can include: a set of geographic points of interest, a set of users, associations of a set of resources (e.g., services, applications, etc.) of the set of users with the set of geographic points of interest, and/or contexts associated with the set of geographic points of interest. A listening service may then be implemented for the set of resources to determine a location of the set of users. Based on the location and the associations of the set of resources with the set of geographic points of interest, at least one of the set of resources may then be activated. | 08-22-2013 |
20130219401 | PRIORITIZING JOBS WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to prioritize jobs (e.g., within a cloud computing environment) so as to maximize positive financial impacts (or to minimize negative financial impacts) for cloud service providers, while not exceeding processing capacity or failing to meet terms of applicable Service Level Agreements (SLAs). Specifically, under the present invention a respective income (i.e., a cost to the customer), a processing need, and set of SLA terms (e.g., predetermined priorities, time constraints, etc.) will be determined for each of a plurality of jobs to be performed. The jobs will then be prioritized in a way that: maximizes cumulative/collective income; stays within the total processing capacity of the cloud computing environment; and meets the SLA terms. | 08-22-2013 |
20130254360 | POLICY IMPLEMENTATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for resolving and/or implementing policies based on layers of a network stack (e.g., cloud computing stack). Specifically, for a given policy that is being resolved, the system first evaluates the applicability of the policy to each layer in the network stack. For a given policy, the system then evaluates the relative effectiveness of applying the policy to achieve the overall goal of the policy. Based on the best fit evaluation of the relative comparison, the system then decides how and where the policy is enacted (e.g., determines a protocol for implementing the policy). | 09-26-2013 |
20130262189 | ANALYZING METERED COST EFFECTS OF DEPLOYMENT PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for analyzing operating costs (e.g., metered cost effects) for deployment patterns (and changes thereto) in a networked computing environment. In a typical embodiment, a deployment pattern for the networked computing environment is identified. The deployment pattern may comprise a set of components arranged in a network topology. Moreover, the set of components may be associated with a set of policies (e.g., stored in a computer memory medium and/or computer storage device). A cost analysis algorithm(s) may then be selected for the deployment pattern. The selected algorithm(s) may then be applied (e.g., to the deployment pattern and/or network computing environment) to analyze the operating costs of the deployment pattern. | 10-03-2013 |
20130262643 | VALIDATING DEPLOYMENT PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for validating deployment patterns/topologies (e.g., prior to being deployed) against existing patterns that have already been determined to be compliant (e.g., against a set of policies/standards). In a typical embodiment, individual components of a proposed deployment pattern are identified and then evaluated against previously approved deployment patterns (e.g., based on standards and/or policies). Components of the proposed deployment patterns that are deemed non-compliant are identified, and corrective action(s) may be determined to address any non-compliance (e.g., to put the non-compliant components into compliance, to remove the non-compliant components, etc.). | 10-03-2013 |
20130263111 | Applying Social Computing Paradigm to Software Installation and Configuration - A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network. | 10-03-2013 |
20130268638 | MAPPING REQUIREMENTS TO A SYSTEM TOPOLOGY IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for mapping requirements (e.g., functional and/or non-functional requirements) to components and/or policies of a system topology in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of functional requirements is mapped to a set of components. A set of dependencies between the set of functional requirements is then indentified so that a set of interrelationships between the set of components may be identified. A set of non-functional requirements is then mapped to a set of policies that are then applied to the set of components. Based on the set of components, the set of interrelationships, and the set of policies, a system topology is generated. Upon implementation of the system topology, runtime metrics may be collected as feedback that is utilized for refinement of the system topology, as well as a system topology deployed in the future. | 10-10-2013 |
20130268913 | MANAGING APPLICATION TEMPLATE ARTIFACTS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for managing application template artifacts throughout an application's lifecycle in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload template is assigned to each phase of a set of successive phases of the application's lifecycle. Each template typically refers to a template in a preceding phase of the lifecycle. Moreover, the templates may contain pointers to artifacts used in the phases assigned thereto. Any changes occurring in the artifacts/phases are propagated to the corresponding templates so as to automatically manage application lifecycle operations. | 10-10-2013 |
20130289823 | TIRE PRESSURE ADJUSTMENT - A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. | 10-31-2013 |
20130293199 | CHARGING MANAGEMENT - A charging method and system. The method includes detecting and monitoring by a computer processor, a frequency signal associated with an input voltage signal used for powering power consumption devices at a first specified location. The computer processor generates frequency level data associated with the monitoring. The computer processor receives a request to enable a charging process for charging a rechargeable power source and power source data associated with the rechargeable power source and a user. In response to the request, the computer processor enables a customized charging process associated with charging the rechargeable power source based on the frequency level data and/or the power source data. | 11-07-2013 |
20130310996 | POWER PROFILE MANAGEMENT - A power profile management method and system. The method includes retrieving by a computer processor input data associated with a user of power consumption devices at a specified location. The computer processor retrieves power consumption data comprising power consumption levels for the power consumption devices. The computer processor generates and transmits a mobile usage portfolio associated said user and the power consumption devices. The computer processor generates a load usage prediction report associated with the user and the power consumption devices. The load usage prediction report is generated based on the mobile usage portfolio and said power consumption data. The computer processor transmits the load usage prediction report to a power provider utility for analysis. | 11-21-2013 |
20130311361 | SHARING VIRTUAL SPACE IN A VIRTUAL UNIVERSE - An approach that provides sharing of the same virtual space by a plurality of avatars in a virtual universe by grouping the avatars belonging to the virtual space and isolating each group. In one embodiment, there is an isolating tool, including a grouping component configured to group each of the plurality of avatars belonging to defined virtual space according to predefined grouping criteria. The isolating tool further includes an isolating component configured to isolate each group within each of the plurality of virtual spaces based on the grouping. | 11-21-2013 |
20130311988 | MIGRATING VIRTUAL MACHINES BETWEEN NETWORKED COMPUTING ENVIRONMENTS BASED ON RESOURCE UTILIZATION - Embodiments of the present invention relate to the migration of virtual machines (VMs) between networked computing environments (e.g., cloud computing environments) based on resource utilization. Specifically, embodiments of the present invention provide an approach to select an optimal set (one or more) of VMs as candidates for pre-staged migration. In a typical embodiment, when a first cloud environment nears physical resource capacity, an optimal set of VMs will be identified for migration to a second cloud environment that has sufficient capacity to accommodate workload(s) from the first cloud environment. To make this process more efficient, data associated with the set of virtual machines may be “pre-stage” replicated from the first cloud environment to the second cloud environment (e.g., in advance of the migration of the identified set of VMs). | 11-21-2013 |
20130332561 | Control of Collaboration Workspaces and Information Objects using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20130332564 | Control of Collaboration Workspaces and Information Objects Using Business Rules - An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received. | 12-12-2013 |
20140001961 | INTELLIGENT AND COORDINATED LIGHTING OF A LIGHTING DEVICE | 01-02-2014 |
20140007130 | DETERMINING AN OPTIMAL COMPUTING ENVIRONMENT FOR RUNNING AN IMAGE | 01-02-2014 |
20140025294 | ROUTE OPTIMIZATION - In general, the present invention relates to route optimization/prediction. In one embodiment, the present invention provides visibility to future predicted traffic situations, based on all reserved routes in a system at a given point in time. This allows city planners, for example, to know where traffic will be to adjust traffic flow accordingly. Additional value comes into play by being able to calculate and publish aggregated savings from using this system, such as driver time, mileage, and gas. This information may be added to a database and made available to individuals via their GPS. In a typical implementation, a request for a route is received from a requester. Based on the request, an optimized route and a potential position of the requester within the optimized route are determined and then proposed to the requester. The requester can then select an option from the proposal. | 01-23-2014 |
20140025547 | METHOD FOR SUPPLYING ELECTRICAL POWER AND BILLING FOR ELECTRICAL POWER SUPPLIED USING FREQUENCY REGULATION CREDITS - A method supplying AC power and billing a customer using frequency regulation credits. The method includes using an AC frequency measuring device, measuring a current AC frequency on an AC power line; using a power consumption measuring device, measuring a current power consumption on the AC power line over a period of time equal to a sampling interval; calculating a power consumption moving average of a last N power current power consumptions measured, where N is a positive integer greater than 1; generating credits or debits based on the current power consumption, the current AC frequency and the power consumption moving average; adding the credits or debits to a frequency regulation credit; and for each next sampling interval repeating measuring the current AC frequency, measuring current power consumption, calculating the power consumption moving average, generating the credits or debits, and adding the credits or debits to the frequency regulation credit. | 01-23-2014 |
20140025838 | SYSTEM AND METHOD OF STREAMING DATA OVER A DISTRIBUTED INFRASTRUCTURE - A system and method of streaming data in real time and, more particularly, a system and method of real time streaming of data over a grid network or other distributed infrastructure. The method and system includes updating a content directory of a root server with end resource information. The method and system further includes processing the end resource information to determine connection locations for streaming data to at least one requesting end resource in a network. | 01-23-2014 |
20140052492 | SERVICE REQUESTS FOR MULTIPLE SERVICE LEVEL CHARACTERISTICS - A system, method, program product and service for processing a multiple service level bid in a resource management framework. A buyer's agent is provided to receive a multiple service level request from a business unit and query a resource unit broker for available resource types that can be utilized to provide at least some of the service level requirements of the multiple service level request. A mapping system is provided to map the available resource types to a list of resource sets (i.e., bidding options) and a prioritization system is provided to order the list. Once the list is ordered, a bidding system is provided to submit a bid for the highest priority resource set. | 02-20-2014 |
20140075331 | Context-Sensitive Collaboration Channels - An apparatus and computer program product for collaborating is disclosed. Responsive to a computer system receiving a selection from a user for a portion of a document, the computer system identifies a context for the selected portion of the document. The computer system identifies a set of collaboration channels corresponding to the context. The computer system determines whether the set of collaboration channels corresponding to the context is empty. The computer system then creates a new collaboration channel based on the context for the selected portion of the document responsive to the set of collaboration channels corresponding to the context being empty. | 03-13-2014 |
20140075341 | Providing Feedback for Screen Sharing - A data processing system and computer program product for sharing displayed content. A content displayed on a source computer system is shared with a set of target computer systems, wherein the content is displayed on a target display on each target computer system in the set of target computer systems. In response to a change in the content displayed on the source computer system, a progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is identified. An indication of the progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is generated at the source computer system. | 03-13-2014 |
20140077952 | OPTIMIZATION OF LUGGAGE PLACEMENT IN STORAGE COMPARTMENTS - Aspects of the present invention disclose a system, method and computer program product for automatically assigning a location to a luggage belonging to a passenger in a passenger carrier. In an example, a computer system evaluates characteristics of the luggage. The computer system evaluates characteristics of the passenger. The computer system assigns a location associated with an RFID tag to the luggage. The computer system confirms the luggage being correctly located in the assigned location. | 03-20-2014 |
20140082518 | Variable Refresh Rates for Portions of Shared Screens - Illustrative embodiments disclose setting refresh rates for different portions of a shared screen in a sharing session. A processor sets an initial refresh rate for the sharing session. The processor selects a portion of the shared screen. The processor selects a refresh rate for the selected portion of the shared screen that is different from the initial refresh rate for the sharing session. The processor refreshes the selected portion based on the selected refresh rate and a portion not selected based on the initial refresh rate. | 03-20-2014 |
20140082652 | DYNAMIC REBROADCAST SCHEDULING OF VIDEOS - Some embodiments include a method for managing rebroadcast of a previously broadcast video. The method includes a computer determining popularity of the previously broadcast video based, at least in part, on a number of requests to rebroadcast the previously broadcast video. The method includes the computer determining a popularity threshold based in part on demographics of viewers sending the number of requests to rebroadcast the previously broadcast video. The method includes the computer determining that the popularity of the previously broadcast video exceeds the popularity threshold, and in response, the computer determining a day of week and time of day to rebroadcast the previously broadcast video based in part on days of the week and times of day in which the requests were sent. | 03-20-2014 |
20140089449 | PREDICTIVE DATA MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing file storage between local and remote storage locations in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, files/data may be tagged with metadata that associates the files/data with an event that indicates a date/time and a geographical destination of an intended use of the files. The files may then be transferred between local and remote storage (e.g., at the destination) based upon a set of predefined rules for transferring the files/data. | 03-27-2014 |
20140089531 | GENERATING RECOMMENDATIONS FOR PERIPHERAL DEVICES COMPATIBLE WITH A PROCESSOR AND OPERATING SYSTEM OF A COMPUTER - Computer program code (program code) identifies peripheral devices connected to a computer having a log file. Program code determines whether the peripheral devices identified are functioning properly or not functioning properly. The program code collects information about the configuration of the computer. The program code sets parameters that create a profile for the computer. The program code stores the profile and the log file in a database along with profiles and log files of other computers having peripheral devices identified by the program code. The program code utilizes the profiles and log files to generate recommendations for peripheral devices that are compatible with at least one processor and operating system of the computer. | 03-27-2014 |
20140095332 | SENDING A COUNTER-OFFER TO USE AN ALTERNATE PAYMENT OPTION - In a method for sending a counter-offer in response to receiving an indication about a point-of-sale transaction, a computer receives from a point-of-sale program a point-of-sale transaction and an indication that the point-of-sale transaction is to be paid for utilizing a first payment option and is to be recorded using a second payment option. The computer determines that a counter-offer is appropriate. The counter-offer includes a request that the point-of-sale transaction be paid for utilizing the second payment option. The computer sends to the point-of-sale program the counter-offer. | 04-03-2014 |
20140095601 | DEVICE OPERABILITY ENHANCEMENT WITH ALTERNATIVE DEVICE UTILIZATION - An approach is disclosed for enhancing mobile-device operation by resource sharing and/or pooling. The approach can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to trigger a first device to share content or request functionality of any of a plurality of other devices. The programming instructions can further be operable to discover a candidate device that is capable of receiving the content or a request to provide the functionality. The programming instructions can further be operable to determine that the candidate device can receive the content or provide the functionality based on predetermined criteria. The programming instructions can further be operable to establish a connection with the candidate device. The programming instructions can further be operable to send the content from the first device to the candidate device or receive functionality from the candidate device. | 04-03-2014 |
20140100927 | Customizing a Presentation Based on Preferences of an Audience - A data processing system and computer program product for customizing a presentation. A set of individual preferences for each individual of a plurality of individuals to form a set of audience preferences is determined, wherein each preference in the set of individual preferences is associated with one of a plurality of versions of the presentation. A set of versions of the presentation from the plurality of versions of the presentation is selected based on the set of audience preferences. The set of versions of the presentation selected from the plurality of versions of the presentation is presented. | 04-10-2014 |
20140101253 | Dynamic Screen Sharing for Optimal Performance - Illustrative embodiments disclose sharing an area of a computer system screen. A first computer system configures a sharing session for sharing a region of the screen with a second computer system. The first computer system assesses information on performance of the sharing session, determining from the information a minimum size of the region based on the assessment, and then selects the region to share based on the assessment and a designation by a user. | 04-10-2014 |
20140119521 | TELEPHONY SERVICES OPTIMIZATION THROUGH CALLING PLAN ANALYSIS - Embodiments of the present invention provide optimization of telephone services through telephone calling plan/card analysis. The least expensive rate is found for telephone calls at any given time and/or date, either through static pre-entry of data, or through dynamic querying of rates via a web-based look-up table, and places calls according to an optimized calling plan. Specifically, in a typical embodiment, an outgoing/target telephone number for an intended telephone call is captured, and a corresponding destination geographic region is identified. Based on the geographic region, a calling plan resulting in a lowest price for the telephone call is identified. This is typically accomplished by consulting at least one table (e.g., call information table) that associates (among other things) calling plans and/or calling cards with geographic regions. Once a calling plan and/or calling card is identified/selected, a corresponding set of dialing instructions will be obtained from the table and used to make/place the telephone call. | 05-01-2014 |
20140126710 | MANAGING SUBCONFERENCE CALLS WITHIN A PRIMARY CONFERENCE CALL - Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call. | 05-08-2014 |
20140128022 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 05-08-2014 |
20140129385 | BANDWIDTH MANAGEMENT - A computer identifies a plurality of available network connections, wherein at least one of the identified network connections is contractually available to the computer under terms of a monthly data plan. The computer determines, based, at least in part, on characteristics of each network connection of the plurality of network connections and anticipated bandwidth consumption of the computer, a network connection to connect to from the plurality of network connections. The computer connects to the determined network connection. The computer determines, based, at least in part, on anticipated bandwidth consumption of the computer and contractual terms of the monthly data plan, an amount of excess bandwidth available for sale. | 05-08-2014 |
20140129710 | DYNAMICALLY MODIFYING QUIALITY OF SERVICE LEVELS FOR RESOURCES RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically modifying Quality of Service (QoS) levels for resources (e.g., applications, processes, services, etc.) running in a networked computing environment. Specifically, embodiments of the present invention dynamically adjust transport level networking QoS parameters based on associated service level agreements (SLA) term. In a typical embodiment, a set of service level requirements associated with a resource running in the networked computing environment will first be identified (e.g., in a computer data structure). Then, the set of service level requirements will be mapped to a set of QoS parameters associated with a transport layer of the networked computing environment. A current performance of the resource within the transport layer will then be determined. Once the current performance has been determined, it will be further determined whether the current performance meets the set of service level requirements. Based on this determination/comparison, the set of QoS parameters can be adjusted accordingly. | 05-08-2014 |
20140133825 | COLLECTIVELY AGGREGATING DIGITAL RECORDINGS - Digital recordings of an event are collectively aggregated to improve the quality of the recordings. A user recording of an event by a user recording device is evaluated to determine a subject and quality of the user recording. Other recording devices in the vicinity of the user recording device that are recording the same subject concurrently are identified to expand the capabilities of the user recording device through crowdsourcing. An aspect of recordings from the other recording devices is analyzed to determine if it is superior in quality to the user recording according to crowdsourced quality assessments. Feedback is sent to the user recording device to expand the capabilities of the user recording device and to improve the quality of the user recording. All recordings of the event are pooled to create a higher quality composite recording using digital improvement techniques and the composite recording is offered for download. | 05-15-2014 |
20140133826 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes analyzing audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 05-15-2014 |
20140141793 | SYSTEM AND METHOD TO MANAGE QOS IN A BANDWIDTH-CONSTRAINED NETWORK (CELLULAR) BY SENDING TOWER-INITIATED POLICY CHANGES TO INDIVIDUAL PHONES - A method, system and computer-usable medium are disclosed for preemptively managing bandwidth consumption in a wireless network environment. A wireless service provider monitors network activity to generate network bandwidth availability data. The network bandwidth availability data is processed with bandwidth consumption projection data to determine whether the wireless network is able to provide a first amount of bandwidth. If the wireless network is unable to provide the first amount of bandwidth, then it generates a bandwidth mitigation request, which it in turn provides to a mobile device. If an affirmative response is received from the mobile device, then it is provided a second amount of bandwidth, which is less than the first amount of bandwidth. | 05-22-2014 |
20140146202 | METHOD AND APPARATUS FOR TAGGING MEDIA WITH IDENTITY OF CREATOR OR SCENE - An electronic device for contemporaneously obtaining, with a processor connected to a memory, a forward image from a forward facing camera of the electronic device and a rear image from a rear facing camera of the electronic device, and embedding the rear image in the forward image or the forward image in the rear image, thereby creating a composite image. Optionally, the rear image is embedded as a watermark in the forward image thereby creating the composite image. Alternatively, the rear image is steganographically embedded in the forward image thereby creating the composite image. | 05-29-2014 |
20140146204 | METHOD AND APPARATUS FOR TAGGING MEDIA WITH IDENTITY OF CREATOR OR SCENE - An electronic device and method for contemporaneously obtaining, with a processor connected to a memory, a forward image from a forward facing camera of the electronic device and a rear image from a rear facing camera of the electronic device, and embedding the rear image in the forward image or the forward image in the rear image, thereby creating a composite image. Optionally, the rear image is embedded as a watermark in the forward image thereby creating the composite image. Alternatively, the rear image is steganographically embedded in the forward image thereby creating the composite image. | 05-29-2014 |
20140152547 | USER ACCESS CONTROL BASED ON HANDHELD DEVICE ORIENTATION - Disclosed is a novel system, computer program product, and method for allowing access to an application on a handheld device. This is also known as logging on or password entry. The method begins with detecting a change in at least one of orientation and position of a handheld device relative to a given plane. At least one of a keyboard, a touch screen, a gesture, and voice recognition engine input is received. Based on a combination of the at least one of orientation and position of the handheld and the user input received matching a previously stored value, unlocking access to an application running on the handheld device. The detecting of the change in orientation or position or both can occur simultaneously with the user input or previous to the user input or after the user input. | 06-05-2014 |
20140156044 | DYNAMIC NEGOTIATION AND AUTHORIZATION SYSTEM TO RECORD RIGHTS-MANAGED CONTENT - A content recording system comprises a digital media recording device to record content. A rights-management module is in electrical communication with the digital media recording device to detect a desired recording performed by the digital media recording device. The rights-management module further communicates digital rights information of a rights-managed content to the digital recording device. The recording of the rights-managed content is performed according to the digital rights information. | 06-05-2014 |
20140157402 | USER ACCESS CONTROL BASED ON HANDHELD DEVICE ORIENTATION - Disclosed is a novel system, computer program product, and method for allowing access to an application on a handheld device. This is also known as logging on or password entry. The method begins with detecting a change in at least one of orientation and position of a handheld device relative to a given plane. At least one of a keyboard, a touch screen, a gesture, and voice recognition engine input is received. Based on a combination of the at least one of orientation and position of the handheld and the user input received matching a previously stored value, unlocking access to an application running on the handheld device. The detecting of the change in orientation or position or both can occur simultaneously with the user input or previous to the user input or after the user input. | 06-05-2014 |
20140157431 | DYNAMIC NEGOTIATION AND AUTHORIZATION SYSTEM TO RECORD RIGHTS-MANAGED CONTENT - A content recording system comprises a digital media recording device to record content. A rights-management module is in electrical communication with the digital media recording device to detect a desired recording performed by the digital media recording device. The rights-management module further communicates digital rights information of a rights-managed content to the digital recording device. The recording of the rights-managed content is performed according to the digital rights information. | 06-05-2014 |
20140173098 | PRIORITIZING DATA PACKETS ASSOCIATED WITH APPLICATIONS RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - The present invention provides an approach for prioritizing a set of data packets associated with an application running in a networked computing environment. An SLA associated with a particular application and at least one other SLA associated with at least one other application are accessed. A proposed modification to a priority of a set of data packets associated with the particular application is then determined based on a comparison of a current performance of the set of data packets versus a specified performance of the set of data packets as set forth in the SLA. An effect of the proposed modification on a capability of the particular application to meet a set of terms of the SLA, and of the at least one other application to meet terms of the at least one other SLA will be evaluated. It will then be determined whether to implement the proposed modification. | 06-19-2014 |
20140173662 | MULTI-DIMENSIONAL CHANNEL DIRECTORIES - Disclosed is a novel system and method for presenting a listing of multimedia content. The method begins with accessing a multi-dimensional data space with a plurality of nodes. Each of the nodes in the multi-dimensional data space contains a set of informational descriptors about multimedia content. User input is received for least one dimension of relatedness to be used with the set of informational descriptors. A subset of the plurality of nodes is defined with the at least one dimension of relatedness using an order embedding algorithm and the user input. The subset of the plurality of nodes is presented to the user. | 06-19-2014 |
20140173663 | MULTI-DIMENSIONAL CHANNEL DIRECTORIES - Disclosed is a novel system and method for presenting a listing of multimedia content. The method begins with accessing a multi-dimensional data space with a plurality of nodes. Each of the nodes in the multi-dimensional data space contains a set of informational descriptors about multimedia content. User input is received for least one dimension of relatedness to be used with the set of informational descriptors. A subset of the plurality of nodes is defined with the at least one dimension of relatedness using an order embedding algorithm and the user input. The subset of the plurality of nodes is presented to the user. | 06-19-2014 |
20140192964 | INTELLIGENT 911 SERVICE - A computer system manages emergency calls. The computer system receives an emergency call from a computing device along with a location of the computing device. The computer system determines that the location of the computing device is within a geographic area surrounding a location of a previously reported incident and sends a notification of the previously reported incident to the computer device. The computer system receives an indication from the computing device that the emergency call is related to the previously reported incident. Responsive to receiving the indication that the emergency call is related to the previously reported incident, the computer system handles the emergency call as a duplicative report of a known emergency. | 07-10-2014 |
20140195068 | INTELLIGENT ROAD SIGNS - An approach is provided for providing customized information to a driver of a vehicle. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: obtain one or more parameters of a vehicle; obtain environmental conditions outside of the vehicle; and calculate a speed at which the vehicle should traverse a portion of a road. The calculating is based on the one or more parameters of the vehicle and the environmental conditions outside of the vehicle. The approach is further operable to provide the calculated speed to the vehicle. | 07-10-2014 |
20140195297 | ANALYSIS OF USAGE PATTERNS AND UPGRADE RECOMMENDATIONS - An approach is provided for analyzing usage patterns of computing devices and providing upgrade recommendations. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: monitor usage on one or more electronic devices; and recommend upgraded functionality on the one or more devices based on the monitored usage based on a risk assessment allocation on selected functionality associated with an upgrade for the one or more electronic devices. | 07-10-2014 |
20140198254 | PREEMPTIVE PRELOADING OF TELEVISION PROGRAM DATA - Digital television channels are preemptively cached based on a modeling of a user to reduce delays while switching channels. A current television channel is selected using a first tuner. A future television channel selection of the user is then predicted based on a modeling of the user. The recorded content of the predicted future television channel is preemptively cached using a second tuner. A buffer of the recorded content of the predicted future television channel is displayed when the user switches from the current television channel to the predicted future television channel. The modeling of the user is updated and stored in storage. | 07-17-2014 |
20140201802 | PREEMPTIVE PRELOADING OF TELEVISION PROGRAM DATA - Digital television channels are preemptively cached based on a modeling of a user to reduce delays while switching channels. A current television channel is selected using a first tuner. A future television channel selection of the user is then predicted based on a modeling of the user. The recorded content of the predicted future television channel is preemptively cached using a second tuner. A buffer of the recorded content of the predicted future television channel is displayed when the user switches from the current television channel to the predicted future television channel. The modeling of the user is updated and stored in storage. | 07-17-2014 |
20140207700 | ENVIRONMENTALLY RESPONSIVE SHIPPING SELECTION - The selection of a shipping option responsive to an environmental preference is enabled. A user may indicate a shipping criteria preference including an environmental impact weighting. A cost value of each of a plurality of shipping options is determined including an environmental impact cost. A shipping option is selected and implemented for a shipping of an item as a function of the indicated environmental impact weighting. Each of the plurality of shipping option cost values may be dynamically recalculated and the status of at least one of the shipping options updated, the updating determining a change in value a shipping option cost value, an implemented selected shipping option changed to another of the plurality of shipping options as a function of the status updating. | 07-24-2014 |
20140208150 | CROSS COMMUNICATION OF COMMON PROBLEM DETERMINATION AND RESOLUTION - Approaches for problem determination and resolution process cross communication are provided. Embodiments provide cross communication of a problem determination and resolution among similar data center devices. Specifically, symptoms of an error condition encountered for one data center device are captured by a first enterprise group, along with an associated resolution solution, and made available to an another enterprise group managing a commonly configured data center device, which may be faced with a similar error condition. The error signature and resolution steps captured by the first enterprise group are subsequently made available within and across multiple management domains operating within a common model (e.g., a publication-subscription system). Within this model, both the originator of the error determination and resolution (i.e., publisher), and one or more commonly configured data center devices susceptible to the same error condition (i.e., subscribers), can filter, access, and control the flow of error resolutions. | 07-24-2014 |
20140215533 | TRANSFERRING A BROADCAST TRANSMISSION TO A REMOTE DEVICE - An approach is described that includes determining that a remote device has moved outside of a pre-defined area associated with a digital video recorder (DVR), and transmitting program data from the DVR to the remote device while the remote device remains outside of the pre-defined area. Another approach includes a digital video recorder (DVR) having a memory and a processor. The DVR operates to: receive an incoming transmission signal; transmit a selected program to a primary display device; determine that a remote device has moved outside of a pre-defined area; and transmit program data corresponding to the selected program to the remote device while the remote device remains outside of the pre-defined area. | 07-31-2014 |
20140244484 | NETWORK COMPUTING ENVIRONMENT COLLECTION AND NOTIFICATION OF POINT OF SALE INFORMATION - Automated information collection and notification ancillary to the acquisition of a product or service includes determining transaction and information thresholds for application to attributes of a transaction for goods or services, a card account used to purchase an item or service pursuant to the transaction and associated with application of the thresholds. When the purchase of the item or service is accomplished, additional informational items to be retained are determined in response to an attribute of the additional informational items meeting the information threshold, an attribute of the transaction meeting the transaction threshold, and execution of the transaction via the identified card account. Authoritative source locations for retrieval of copies of the additional information, and ancillary storage devices for holding copies of or links to the additional information items, are identified. | 08-28-2014 |
20140245429 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. A movement in the display of the entity representation to a position proximate to a boundary of the resource representation is detected. An attribute assigned to the entity representation is determined to not satisfy an access control requirement assigned to the resource representation. The entity is not permitted to access the resource based on the attribute not satisfying the access control requirement. Based on the entity not being permitted to access the resource, a visual cue is presented that indicates the entity representation is prevented from moving in the display across, and being placed within, the boundary of the resource representation. | 08-28-2014 |
20140248851 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 09-04-2014 |
20140297886 | SYSTEM AND METHOD OF STREAMING DATA OVER A DISTRIBUTED INFRASTRUCTURE - A system and method of streaming data in real time and, more particularly, a system and method of real time streaming of data over a grid network or other distributed infrastructure. The method and system includes updating a content directory of a root server with end resource information. The method and system further includes processing the end resource information to determine connection locations for streaming data to at least one requesting end resource in a network. | 10-02-2014 |
20140298337 | OPTIMIZING THE CONFIGURATION OF VIRTUAL MACHINE INSTANCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for optimizing a configuration of virtual machine (VM) instances. In a typical embodiment, such optimization comprises either the splitting of a single VM instance into multiple VM instances or the consolidation of multiple VM instances into fewer (e.g., a single) VM instance. Along these lines, it will first be determined which VM instances would be good candidates for reconfiguration. Under one approach, VM instances that are candidates for reconfiguration are identified based upon an analysis of applicable/associated service level agreement (SLA) terms versus the performance of the VM instances. For example, VM instances can be reconfigured if such reconfiguration will maximize a benefit provided by the applicable SLA terms (e.g., if the splitting of a single VM instance into multiple VM instances would cause a workload to be processed more efficiently, resulting in a more favorable cost/benefit ratio). In another embodiment, candidate VM instances can be identified based upon a commonality of an entity (e.g., a consumer) associated therewith. For example, if a single entity is utilizing multiple VM instances, such VM instances could be considered candidates for consolidation to avoid unnecessary computing resource consumption. | 10-02-2014 |
20140306822 | ACCESS CONTROL FOR ELECTRONIC ENTERTAINMENT SYSTEMS - Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules. | 10-16-2014 |
20140310192 | ENVIRONMENTAL STEWARDSHIP BASED ON DRIVING BEHAVIOR - An approach for managing driving patterns is presented. A first distance measured at a first time between a first vehicle and a second vehicle in front of the first vehicle is received and stored in driving behavior data over a time period. The driving behavior data includes a second distance between the first vehicle and a third vehicle in front of the first vehicle measured at a second time. Based on the first and second distances, the number of times the first vehicle tailgated other vehicles within the period of time is determined. Based on the number of times the first vehicle tailgated within the period of time, an incentive is provided to a driver of the first vehicle to encourage the driver to drive without tailgating, or a disincentive is provided to the driver to deter the driver from tailgating. | 10-16-2014 |
20140317050 | ENSURING ACCESS TO LONG-TERM STORED ELECTRONIC DOCUMENTS - Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more methods may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents. | 10-23-2014 |
20140317610 | ENSURING ACCESS TO LONG-TERM STORED ELECTRONIC DOCUMENTS - Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more systems may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents. | 10-23-2014 |
20140330975 | ENHANCED COMMAND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource. | 11-06-2014 |
20140372609 | DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity. | 12-18-2014 |
20140373011 | GENERATING A DEPLOYMENT PATTERN FOR REUSE IN A NETWORKED COMPUTING ENVIRONMENT - An approach for generating a deployment pattern for reuse after the deployment of a set of virtual machines and related application artifacts in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, information associated with one or more previously provisioned application environments is derived and, after analyzing the information, a deployment pattern is created in the form of tangible artifacts which may be reuse for further deployments without the need to trace back the original procedures used to deploy the previously previsioned application environment. | 12-18-2014 |
20140376385 | MITIGATING NETWORK CONNECTION PROBLEMS USING SUPPORTING DEVICES - An approach for mitigating network connection problems when a first computing device is unable to connect to a remote resource is described. A second computing device receives a request for diagnostic testing over a second network from the first computing device. The second computing device performs diagnostic tests on a data path to a desired remote resource. The second computing device sends over the second network, results from the diagnostic tests regarding the data path connectivity to the first device that is unable to connect to desired remote resource. The results are analyzed to determine the location of network connectivity failure. | 12-25-2014 |
20150032609 | CORRELATION OF DATA SETS USING DETERMINED DATA TYPES - A computer receives a data set and determines the data type of the column data within. The computer identifies a second data set with columns of the same data type. The computer compares the contents of the columns and the formatting of the contents to determine a score representative of the relevancy of the data sets to one another. Responsive to the score exceeding a threshold, the computer suggests the second data set to a user. | 01-29-2015 |
20150040125 | ALLOWING MANAGEMENT OF A VIRTUAL MACHINE BY MULTIPLE CLOUD PROVIDERS - Embodiments of the present invention provide approaches for allowing management of a virtual machine (VM) by multiple cloud providers in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a system identifies a set of provisioned resources of a VM managed by a first cloud provider, generates a set of artifacts containing information for a second cloud provider to allow co-management of the VM by the first cloud provider and the second cloud provider, and provides access to the set of provisioned resources of the VM to the second cloud provider. As such, a single virtual machine may be managed by multiple (e.g., geographically distinct) cloud providers to cooperatively and selectively execute VM operations because the end product (i.e., VM) from the first and second cloud providers is the same. | 02-05-2015 |
20150046595 | PRE-PROVISIONING VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments of the present invention describe an approach to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests (e.g., instantiate/populate multiple e-commerce ‘shopping carts’). In a typical embodiment, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. | 02-12-2015 |
20150046969 | ADJUSTING MULTI-FACTOR AUTHENTICATION USING CONTEXT AND PRE-REGISTRATION OF OBJECTS - A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code). | 02-12-2015 |
20150066698 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150066700 | COMPUTER BASED, USE-ORIENTED INFORMATION GENERATION AND MODIFICATION FOR PRODUCTS AND SERVICES - A method or apparatus for generating or modifying use-oriented information may include stored information regarding general and detailed product information. An information processor may receive additional information regarding an individual user or consumer of the product, as well as the particular context in which the product is used by the individual. Based at least on the received use context, the information processor may select or modify relatively specific product-related or service-related information, personalized or tailored to the individual's particular use of the product. The resulting use-oriented information may be sent to the individual by way of a telecommunications network or other suitable means. | 03-05-2015 |
20150067710 | CONSUMER-CONFIGURABLE ALTERNATIVE ADVERTISING RECEPTION WITH INCENTIVES - An indication from a user is detected by a first content viewing device to transfer an advertisement delivered to the first content viewing device as part of streamed audio and video (A/V) content to an alternative content viewing device. A determination is made, based upon user-specific advertising configuration information, as to whether the user is authorized to perform advertisement deferral during the streamed A/V content. The advertisement is configured as an incentivized deferred advertisement to be viewed by the user at a later time using the alternative content viewing device in response to determining that the user is authorized to perform advertisement deferral during the streamed A/V content. The configured incentivized deferred advertisement is transferred to the alternative content viewing device. | 03-05-2015 |
20150067714 | CONSUMER-CONFIGURABLE ALTERNATIVE ADVERTISING RECEPTION WITH INCENTIVES - An indication from a user is detected by a first content viewing device to transfer an advertisement delivered to the first content viewing device as part of streamed audio and video (A/V) content to an alternative content viewing device. A determination is made, based upon user-specific advertising configuration information, as to whether the user is authorized to perform advertisement deferral during the streamed A/V content. The advertisement is configured as an incentivized deferred advertisement to be viewed by the user at a later time using the alternative content viewing device in response to determining that the user is authorized to perform advertisement deferral during the streamed A/V content. The configured incentivized deferred advertisement is transferred to the alternative content viewing device. | 03-05-2015 |
20150071599 | STORAGE SPACE SAVINGS VIA PARTIAL DIGITAL STREAM DELETION - A method, computer system, and/or computer program product enables a reuse of media storage space via partial file deletion. Multiple friends in a same social circle, which together have control of multiple media storage devices that are storing all segments of a media file, are identified. A last friend from the multiple friends, who has control of a last media storage device to have a last copy of a particular segment of the media file, is identified. The last media storage device is the only media storage device, from the multiple storage devices, to have a copy of the particular segment of the media file. The last media storage device is prevented from deleting the particular segment of the media file until another of the multiple storage devices stores a copy of the particular segment of the media file. | 03-12-2015 |
20150074781 | USER CREDENTIAL VERIFICATION INDICATION IN A VIRTUAL UNIVERSE - User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone. | 03-12-2015 |
20150081372 | SYSTEM AND METHOD FOR PROVIDING PROFILE ENHANCEMENT USING SCHEDULING INFORMATION - A system and method of enhancing a profile of a portable device. The system and method includes defining an event type in a scheduling tool and scheduling a time to initiate the event type. The system and method further includes associating a notification profile of a device with the defined event type and changing a setting of the device to the notification profile in response to the scheduling time and the defined event type. | 03-19-2015 |
20150082059 | PEER TO PEER POWER MANAGEMENT - A system and methods for delivering power to a multitude of portable electronic devices is provided. More specifically, the system and methods provide for powering different portable electronic devices through a central charging device. The method of delivering a power supply to a plurality of portable electronic devices includes determining a power requirement for each of the portable computing devices and supplying the power requirement to each of the portable computing devices in a daisy chain configuration using a central power device. | 03-19-2015 |