Patent application number | Description | Published |
20090210948 | REMOTE COMPUTER REBOOTING TOOL - A method is presented for rebooting a local data processing entity requiring an access code to boot. The method may include receiving, on a local entity, an access code from a remote entity. The access code may be stored on an auxiliary device coupled to the local entity. The local entity may receive a reboot command from the remote entity and begin rebooting in response thereto. The auxiliary device may provide the access code to the local entity in response to the beginning of the reboot. The access code may then be deleted from the auxiliary device. | 08-20-2009 |
20090241096 | Dynamic Software Tracing - A method, computer program product and system for dynamically changing a trace level, and optionally the trace size, depending on a recognized critical path. In one embodiment of the invention, a method of dynamic software tracing includes identifying one or more critical patterns of a software code which can influence its execution; allocating a software logging metric to each identified critical pattern; searching for one or more critical patterns in the software code to determine one or more actual critical patterns; and attributing the software logging metric associated with each identified critical pattern to the actual critical pattern to discover areas in the software code that may impact performance. | 09-24-2009 |
20100174928 | Optimizer Mechanism to Increase Battery Length for Mobile Devices - An optimizer mechanism to increase battery length for mobile devices is provided. An operational state of a data processing system, e.g., a mobile device, is adjusted so as to achieve a target time period of operation when the data processing system is using a depleting power supply. A predicted power consumption of individual processes executing on the data processing system is determined and a remaining amount of power that the depleting power supply can provide is also determined. A subset of processes whose execution can be suspended is determined so that the data processing system can operate for the target period of time based on the predicted power consumption of the individual processes and the amount of power that the depleting power supply can provide. The identified subset of processes are placed in a suspended execution state. | 07-08-2010 |
20100175113 | Secure System Access Without Password Sharing - A mechanism is provided for performing secure system access by a requesting user without sharing a password of a credential owner. A database stores system information for resources. The owner of super user authority for a resource provides system information to the database including a credential for accessing the resource. When a user wishes to access the system, client software of the requestor sends an access request to client software of the owner. The client software of the owner prompts the owner to authorize or deny access. Responsive to the owner authorizing the access, the client software of the owner returns authorization to the client software of the requestor, which then uses the credential in the system information database to access the resource. The client software of the requestor does not cache or store the credential or present the credential to the user. | 07-08-2010 |
20100182158 | WAVELET BASED HARD DISK ANALYSIS - Monitoring systems with predictive failure analysis technology (e.g., Self Monitoring Analysis and Reporting Technology (S.M.A.R.T)) operate on the basis of correlations between the hard disk's mechanical and electronic characteristics. Using wavelet transforms to analyze electrical signals from the hard disks can help better determine changes in values and trends in various hard disk characteristics. Using wavelet transforms allows for thorough and deeper analysis of the electrical signals from the hard disks. Wavelet analysis can be performed on the electrical signal to extract time and frequency information associated with the low and high frequency components. Analyzing the extracted components of the electrical signal can indicate a presence and position of one or more mechanical defects on the hard disk. | 07-22-2010 |
Patent application number | Description | Published |
20140180753 | EVALUATING THE RELIABILITY OF ACTIVITY FORECASTS - Embodiments of the present invention disclose a method, computer program product, and system for evaluating the reliability of an activity forecast. A computer identifies forecast information for an activity, where the forecast information can include at least one forecasted time duration to finish the activity, an actual time duration of the activity, a highest forecasted time duration of the activity, and an individual that provided the identified forecast information. The computer utilizes the forecast information to generate a normalized Cartesian plot of the identified forecast information. The computer determines a best-fit line for the normalized Cartesian plot. The computer determines a variance between the best-fit line for the normalized Cartesian plot and the actual time duration of the activity. The computer determines an accuracy rating corresponding to the variance of the forecast information. | 06-26-2014 |
20140304396 | IT SYSTEM INFRASTRUCTURE PREDICTION BASED ON EPIDEMIOLOGIC ALGORITHM - A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. The computer-implemented method further comprises computing at least one server computing system of each of a class I server computing system, a class S server computing system, and a class R server computing system of the plurality of the server computing systems based on a deployment rate, an undeployment rate, and a removing rate of the each of the class I server computing system, the class S server computing system, and the class R server computing system. | 10-09-2014 |
20140325212 | DISTRIBUTION OF ENCRYPTED INFORMATION IN MULTIPLE LOCATIONS - A method, system, and/or computer program product stores information in a distributed data-processing environment. The method comprises: encrypting, by one or more processors, a piece of information; splitting, by one or more processors, the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block; distributing, by one or more processors, said at least one first encrypted block for storing in at least one first location; and distributing, by one or more processors, said at least one second encrypted block for storing in at least one second location. | 10-30-2014 |
20140372606 | IT SYSTEM INFRASTRUCTURE PREDICTION BASED ON EPIDEMIOLOGIC ALGORITHM - A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. The computer-implemented method further comprises computing at least one server computing system of each of a class I server computing system, a class S server computing system, and a class R server computing system of the plurality of the server computing systems based on a deployment rate, an undeployment rate, and a removing rate of the each of the class I server computing system, the class S server computing system, and the class R server computing system. | 12-18-2014 |
20150106940 | MOBILE DEVICE APPLICATION INTERACTION REPUTATION RISK ASSESSMENT - A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation. | 04-16-2015 |
20150106942 | MOBILE DEVICE APPLICATION INTERACTION REPUTATION RISK ASSESSMENT - A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation. | 04-16-2015 |
20150302206 | METHOD AND SYSTEM FOR HIDING SENSITIVE DATA IN LOG FILES - An approach for hiding sensitive data in log files is provided. The approach uses a background program embedded within an operating system. The background program intercepts a write operation of an application and, in response to determining that the write operation is for a log file, gets content of the write operation. The background program checks a knowledge base that comprises information for the sensitive data and identifies the sensitive data in the content of the write operation. The background program masks the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked. In the log file, the background program writes modified content in which the sensitive data is masked. | 10-22-2015 |
Patent application number | Description | Published |
20110016360 | Predictive Monitoring With Wavelet Analysis - A computer implemented method, computer program product and system for monitoring a plurality of hardware or software system resources for identifying hidden trends in the behavior of the system resources, includes: collecting metrics of at least one system resource indicative of the behavior of at least one system resource; for each of the at least one system resource, determining a spectrum representative of a time-based signal of the collected metrics; performing a wavelet transform on each of the at least one spectrum; and analyzing the result of the wavelet transform to identify possible linear trends in the behavior of the at least one system resource. | 01-20-2011 |
20120297252 | Predictive Monitoring With Wavelet Analysis - A computer implemented method, computer program product and system for monitoring a plurality of hardware or software system resources for identifying hidden trends in the behavior of the system resources, includes: collecting metrics of at least one system resource indicative of the behavior of at least one system resource; for each of the at least one system resource, determining a spectrum representative of a time-based signal of the collected metrics; performing a wavelet transform on each of the at least one spectrum; and analyzing the result of the wavelet transform to identify possible linear trends in the behavior of the at least one system resource. | 11-22-2012 |
20130159973 | ACTIVATION LOGIC GENERATION FOR A SOFTWARE APPLIANCE - Embodiments relate to generating an activation logic component for a software appliance. An aspect includes analyzing configuration settings of a software component, the software component being installed in a first system environment. Another aspect includes generating an image-based installation version of the software component for a second system environment, the second system environment being distinct from the first system environment. Yet another aspect includes generating an activation logic component, such that the image-based installation version of the software component and the activation logic component are generated by an activation logic generator. | 06-20-2013 |
20140101268 | Forwarding Messages for Meeting Attendees to Host Computers at the Meeting Location - A method and apparatus for managing messages is disclosed. A data processing system identifies a presence of a person in a meeting at a location using calendar information. The data processing system also identifies a computing device in the location having a connection to a network. The data processing system then sends a notification to the computing device identified in the location, responsive to the data processing system identifying a message for the person when the person is meeting in the location. | 04-10-2014 |
Patent application number | Description | Published |
20160087927 | EVENT NOTIFICATION - In an approach to event notification, one or more computer processors determine a baseline for a volume of activity on a social media website in a geographic location. One or more computer processors determine whether a deviation from the baseline for the volume of activity occurs. Responsive to determining a deviation from the baseline occurs, one or more computer processors identify an event that caused the deviation. One or more computer processors calculate an estimate of population for the geographic location. One or more computer processors identify based, at least in part, on the identified event and the estimated population, a relevant party to be notified of the event. One or more computer processors generate a recommendation based, at least in part, upon one or more of the identified event, the estimate of population, and the identified relevant party. | 03-24-2016 |
20160088099 | EVENT NOTIFICATION - In an approach to event notification, one or more computer processors determine a baseline for a volume of activity on a social media website in a geographic location. One or more computer processors determine whether a deviation from the baseline for the volume of activity occurs. Responsive to determining a deviation from the baseline occurs, one or more computer processors identify an event that caused the deviation. One or more computer processors calculate an estimate of population for the geographic location. One or more computer processors identify based, at least in part, on the identified event and the estimated population, a relevant party to be notified of the event. One or more computer processors generate a recommendation based, at least in part, upon one or more of the identified event, the estimate of population, and the identified relevant party. | 03-24-2016 |
Patent application number | Description | Published |
20140359030 | DIFFERENTIATION OF MESSAGES FOR RECEIVERS THEREOF - A solution for sending messages on a data-processing system is proposed. A corresponding method comprises upon a message to be sent from a sender to at least one receiver being submitted, parsing the message to identify an original expression therein matching an indication of one of a set of pre-defined concepts, determining, for the receiver, a preferred expression of the matched concept, among the corresponding original expression and a set of candidate expressions pre-defined to express the matched concept, according to a rating thereof representing an expected understanding by the receiver, processing the message for the receiver by replacing the original expression according, to the corresponding preferred expression for the receiver, and sending the processed message to the corresponding receiver. | 12-04-2014 |
20140359039 | DIFFERENTIATION OF MESSAGES FOR RECEIVERS THEREOF - A solution for sending messages on a data-processing system is proposed. A corresponding method comprises upon a message to be sent from a sender to at least one receiver being submitted, parsing the message to identify an original expression therein matching an indication of one of a set of pre-defined concepts, determining, for the receiver, a preferred expression of the matched concept, among the corresponding original expression and a set of candidate expressions pre-defined to express the matched concept, according to a rating thereof representing an expected understanding by the receiver, processing the message for the receiver by replacing the original expression according, to the corresponding preferred expression for the receiver, and sending the processed message to the corresponding receiver. | 12-04-2014 |
Patent application number | Description | Published |
20130332398 | MONITORING AND REPLAYING USER BEHAVIORS ON THE WEB - The present disclosure is directed to methods and systems for monitoring and replaying user interactions with one or more interactive electronic documents. The methods generally include identifying an event comprising an interaction between a user and an interactive electronic document, determining to record the event, identifying for the event a user action, a target element, and a set of element features, and recording data for recreating the event. Generally, the methods and systems monitor a training user's interactions with a document and generate an automated replay agent capable of replaying or recreating those interactions on the document or on similar documents. In some embodiments, the replay agent is able to place a document in a desired state and extract information from the document in the desired state. In some embodiments, the replay agent is trained to recognize elements, or types of elements, in the document. | 12-12-2013 |
20160103799 | METHODS AND SYSTEMS FOR AUTOMATED DETECTION OF PAGINATION - The present disclosure is directed to methods and systems for monitoring and replaying user interactions with one or more interactive multi-page electronic documents. The methods generally include observing an event consisting of an interaction between a user and a first page of a first instance of an interactive electronic document, identifying a first pagination element in the page, recording data for the event, and using the recorded data to identify, in a second page of a second instance of the interactive electronic document, a second pagination element in the second page, and locating a third page of the second instance of the interactive electronic document based on the second pagination element. | 04-14-2016 |