Patent application number | Description | Published |
20080320411 | METHOD OF TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to enter text selecting text based upon the number of words in phrases of the text, upon the number of letters in words of the text, or upon other patterns of the text. The method may also involve indexing the selected text, matching text currently being entered by the user into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In many embodiments, the text may be selected from the text entered into any of several applications. In a few embodiments, the text may be selected from sources specified by a user. In further embodiments, the sources may constitute data files. | 12-25-2008 |
20090006161 | SYSTEMS AND METHODS FOR MANAGING EVENTS OF EVENT SCHEDULING APPLICATIONS - Systems, methods, and computer program products for managing events in time management or event scheduling applications, such as calendar applications, are disclosed. Embodiments comprise analyzing event parameters, such as selections from input solicited from prospective meeting attendees that are associated with events of the meeting, determining an arrangement of the events based on the analysis of the event parameters, and proposing the arrangement. System embodiments generally comprise a list of events for the meeting, such as event items in a database, a constraint solver to analyze parameters of events of the list, and an arrangement module to select an arrangement of the events based on analysis by the constraint solver. | 01-01-2009 |
20090094088 | METHODS, SYSTEMS, AND APPARATUSES FOR AUTOMATED CONFIRMATIONS OF MEETINGS - Methods, systems, apparatuses, and computer program products for confirming attendance of prospective attendees to a meeting or events via time management or event scheduling applications, such as calendar applications, are disclosed. Various embodiments comprise scheduling the meeting, waiting for a period of time, and automatically sending confirmation requests to one or more prospective attendees of the meeting. Some embodiments also comprise sending invitations to and receiving acceptances by one or more prospective attendees. Some embodiments further comprise receiving one or more responses to the confirmation requests from the prospective attendees. Some embodiments may reschedule the meeting, or events of the meeting, based upon responses to the confirmation requests. Various embodiments may send or receive the confirmation requests and responses via instant messaging (IM) messages, e-mail messages, and short message service (SMS) messages. | 04-09-2009 |
20090106369 | DUPLICATE EMAIL ADDRESS DETECTION FOR A CONTACT - Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server. | 04-23-2009 |
20090265435 | Email Server Cooperative Management for Automatic Routing of Emails Based on Preferences - Methods, systems, and media are disclosed for managing the routing of an email at the server level to an email client by preferences set in a routing application located on the server. One embodiment includes querying, by a routing application located on a server and associated with an email system, the email by comparison to conditions for each preference set in the routing application, wherein a preference comprises a routing action. Further, the method includes identifying, based on the querying and by the routing application, a match between the email and at least one of the conditions. Further still, the method includes performing, based on the match and by the routing application, the preference associated with the at least one of the conditions of the email, whereby the email is transmitted to an email client. | 10-22-2009 |
20090271700 | TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to index segments of text from multiple sources and receive segments of text being entered into text-entry applications in a floating application. The embodiments may also involve matching the segments of text to indexed segments of text and entering completions of the received segments of text into the text-entry applications. The completions may be based upon the matching, and the completion of a segment may be entered into the text-entry application from which it was received. | 10-29-2009 |
20120066237 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 03-15-2012 |
20120072201 | LANGUAGE TRANSLATION REUSE IN DIFFERENT SYSTEMS - An account system obtains a first translation file associated with it. The account system obtains a second translation file from a second account system, wherein the second account system is a data processing system. The account system determines whether a third account system has a third translation file with untranslated terms. The account system obtains the third translation file from the third account system, responding to a determination that the third account system has the third translation file with untranslated terms. The account system, responding to a determination that the third account system has the third translation file with untranslated terms, forms a comprehensive file from at least two files selected from the group consisting of the first translation file, second and/or third translation files. The account system translates the comprehensive file to form a translated file. | 03-22-2012 |
20120331414 | ARRANGEMENTS OF TEXT TYPE-AHEAD - A method and system of text entry. An attribute of text entered by a user into an application is determined. The entered text is matched to a single portion of each attribute segment of one or more indexed segments of text, based upon a determined attribute of each attribute segment and the determined attribute of the entered text. Each attribute segment consists of the single portion and a remaining portion. After the entered text is matched to a single portion of each attribute segment, a selection of a single attribute segment selected from the one or more indexed segments of text by the user is received. The remaining portion of the selected single attribute segment is entered into the application. | 12-27-2012 |
20130111479 | Performance of Scheduled Tasks via Behavior Analysis and Dynamic Optimization | 05-02-2013 |
20130111484 | Identifying and Correcting Hanging Scheduled Tasks | 05-02-2013 |
20130111497 | Staggering Execution of Scheduled Tasks Based on Behavioral Information | 05-02-2013 |
20130305030 | TESTING A CONFIGURATION CHANGE - An approach is presented for testing a change (i.e., configuration change) in a configuration of a computing environment. A user identifier (ID) of a user is received from an administrative user having an administrative user ID. First configurable attributes of the user ID are determined. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is received. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation is performed by tracking data record modifications made by the TSID and based on the configuration change. The user ID and administrative user ID are unaffected by the configuration change. After completing the simulation, the data record modifications are undone. | 11-14-2013 |
20130312069 | MULTIPLE AUTHENTICATION SUPPORT IN A SHARED ENVIRONMENT - An authentication configurator may define a LDAP security group for LDAP authentication, wherein the LDAP security group is associated with rights. It may define a native security group for native authentication users, wherein the native authentication group has at least one right not present in the LDAP security group, and define customer-specified LDAP chains. It may configure an LDAP authentication web application and a native authentication web application, wherein the LDAP authentication web application and the native authentication web application each connect to a service management database, and the LDAP authentication web application uses the customer-specified LDAP chains. A first Uniform Resource Locator (URL) for LDAP authentication to access the LDAP authentication web application and a second URL for native authentication to access the native authentication web application may also be configured. It may assess the authentication requirements of a customer and create a user identifier, responsive to assessing. | 11-21-2013 |
20130318112 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 11-28-2013 |
20140223168 | TESTING A CONFIGURATION CHANGE - An approach is provided for testing a change (i.e., configuration change) in a configuration of a computing environment. First configurable attributes of a user identifier (ID) of a user are determined. The user ID was received from an administrative user having an administrative user ID providing the administrative user with an authority of an administrator in the computing environment. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation with the change in the configuration applied in the computing environment is performed. The user ID and administrative user ID are unaffected by the configuration change. | 08-07-2014 |
20140297589 | DYNAMICALLY SYNCHING ELEMENTS IN FILE - An approach is provided for synchronizing elements in files across a technical environment. In one embodiment, a processor obtains a first change to a first file. The processor also obtains data identifying a second file. The processor determines if the change is supported by a data library in a pre-defined list of data sources. The processor analyzes the data library to determine a type of the change. The processor applies the type of the change to the second file. | 10-02-2014 |
20140298185 | DYNAMICALLY ENHANCING USER INTERFACE - An approach is provided for dynamically enhancing and visually synchronizing elements in a display on a computing device. The approach includes using a processor to obtain a change to a first file and data identifying a second file one or more characteristics from a source file. The processor determines if the change is supported by a data library and analyzes the data library to determine the type of change. The processor then applies the type of change to the second file and generates a display associated with the second file on the computing device that includes the type of change applied to the second file. | 10-02-2014 |