Patent application number | Description | Published |
20100317400 | PROACTIVE CONTROL OF MOBILE COMMUNICATIONS DEVICES - At least one embodiment of the invention addresses the problem of accidental user operation (e.g., dialing) of a mobile communication device such as a mobile telephone. In this regard, embodiments of the invention provide a proactive solution for preventing unintended operation of a mobile device based on various types of input data of the device, most notably sensory data. | 12-16-2010 |
20110289029 | AUTOMATIC MODEL EVOLUTION - A method comprising: performing on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model. | 11-24-2011 |
20110289117 | SYSTEMS AND METHODS FOR USER CONTROLLABLE, AUTOMATED RECORDING AND SEARCHING OF COMPUTER ACTIVITY - Systems and methods for automating the process of recording, indexing, and searching computer activity are provided. Events resulting from computer activities trigger capturing of contents and association of operational contextual information to form a searchable record of activities. The searchable record can be stored in local computer for use by its user, or on server computer, such as can be used for a tutorial by multiple users. Storage management can be used to manage the storage requirements of the captured information forming the searchable record. | 11-24-2011 |
20120023223 | PREDICTIVE CONTEXT-BASED VIRTUAL WORKSPACE PLACEMENT - A method, information processing system, and computer program product manage virtual workspace migration. A set of information associated with a user is analyzed. A future virtual workspace demand associated with the user is predicted based on the analyzing. At least a portion of at least one virtual workspace associated with the user is migrated from a first location to at least a second location based on the future virtual workspace demand that has been predicted. | 01-26-2012 |
20120116838 | ANALYSIS OF IT RESOURCE PERFORMANCE TO BUSINESS ORGANIZATION - A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings. | 05-10-2012 |
20120218102 | MANAGING EMERGENCY RESPONSE SERVICES USING MOBILE COMMUNICATION DEVICES - One or more embodiments manage emergency response services. An emergency event is determined to have occurred. A set of civilian responders currently available to respond to the emergency event is selected from a plurality of civilian responders in response to determining that the emergency event has occurred. Each civilian responder in the set of civilian responders is associated with at least one wireless communication device. The set of civilian responders is notified that the emergency event has occurred. A set of emergency event information associated with the emergency event is transmitted to at least one wireless communication device associated with each civilian responder in the set of civilian responders. | 08-30-2012 |
20120265764 | FILE SEARCHING ON MOBILE DEVICES - Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file. | 10-18-2012 |
20120330639 | AUTOMATIC MODEL EVOLUTION - A method includes performing, on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model. | 12-27-2012 |
20130006974 | FILE SEARCHING ON MOBILE DEVICES - Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file. | 01-03-2013 |
20130122934 | Data Pre-Fetching Based on User Demographics - Mechanisms are provided for pre-fetching content data and storing the content data in a mobile device. An identifier of a mobile device and a location of the mobile device are received. Demographic information about a user of the mobile device is obtained based on the identifier of the mobile device. The demographic information of the user is compared with demographic information of other users to identify one or more similar users having similar demographic information to the demographic information of the user of the mobile device. Content data to transmit to the mobile device is identified based on the location of the mobile device and the identification of the one or more similar users. The content data is transmitted to the mobile device for storage in the mobile device. | 05-16-2013 |
20130246606 | Detecting Transparent Network Communication Interception Appliances - Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value. | 09-19-2013 |
20130346980 | Migrated Application Performance Comparisons Using Log Mapping - Mechanisms are provided for comparing the performance of applications. An application log record associated with a first application is identified. Mappings between the application logs and underlying log record of environments are made for both the source and the target environments. Performance measurements are made based on both the application logs in the source and target environments are made and compared to each other by way of the mappings. A result of the comparison is output to thereby compare performance of the first application in the source environment with performance of a second application in the target environment. | 12-26-2013 |
20140007203 | Web-Based Security Proxy for Computing System Environment Scanning | 01-02-2014 |
20140007204 | Web-Based Security Proxy for Computing System Environment Scanning | 01-02-2014 |
20140050094 | Efficient Urgency-Aware Rate Control Scheme for Mulitple Bounded Flows - A method for controlling a flow rate of multiple data flows at a network node on a path of the data flows includes the following steps. A private restriction token bucket (RTB) and a private guarantee token bucket (GTB) for each of the data flows and a shared token bucket (STB) common to all of the data flows are provided. n tokens are obtained from the RTBi for the data flow i when a message belonging to the data flow i arrives at the node and needs n tokens. An attempt is made to obtain n tokens from the GTBi for the data flow i and/or the STB. The message is transmitted if n tokens are obtained from the GTBi and/or from the STB, otherwise transmission of the message is delayed until n tokens are available in the GTBi and/or in the STB. | 02-20-2014 |
20140379716 | Process-Aware Code Migration - A mechanism is provided for process-aware code migration. A plurality of nodes and a plurality of edges are annotated within a call graph with information from execution data for executing the code and a topology of the data processing system to form an annotated call graph. Each node in the plurality of nodes is clustered into an associated cluster based on a subset of attributes used from the execution data or the topology to generate the annotated call graph to form a clustered call graph comprising a plurality of clusters. The execution data associated with each cluster in the plurality of clusters is process mined to form an existing process model. Processes identified within the existing process model are mapped to a proposed business-process model thereby forming a set of correlations between the existing process model and the proposed business-process model. | 12-25-2014 |
20150066598 | PREDICTING SERVICE DELIVERY COSTS UNDER BUSINESS CHANGES - A method for predicting service delivery costs for a changed business requirement including detecting an infrastructure change corresponding to the changed business requirement affecting a computer server, deriving a service delivery workload change of the computer server from the infrastructure change, and determining a service delivery cost of the computer server based on the service delivery workload change. | 03-05-2015 |
20150067140 | PREDICTING SERVICE DELIVERY METRICS USING SYSTEM PERFORMANCE DATA - A method for predicting a computerized service delivery organization workload including collecting data of a computer implementing service delivery routine including overlapping samples of load values, overlapping samples of performance values, overlapping samples of event outputs, ticket values and ticket volumes, building a first correlation of said load values with said performance values for predicting new performance values based on new data, building a second correlation of said performance values with said event outputs, said ticket values and said ticket volumes, combining said first and second correlations into a third correlation for correlating said load values with a ticket volume and an event volume, and determining at least one projected event volume or projected ticket volume value using said third correlation and at least one projected load value of said computer. | 03-05-2015 |