Patent application number | Description | Published |
20090006361 | METHOD AND SYSTEM FOR CONTAINING AND ACCESSING MULITPLE WEB BROWSERS - A container browser or a super browser stores browsers and enables a user to launch any stored web browser and display a designated web page from a preferred browser. This container browser can track and bookmark the browsers such that the browsers could be easily selected and initiated. The container browser could present the content in tabbed form, meaning that a tab that the user can click on will represent every open window. Once the user has designated a particular browser to display particular web page, then this information is stored in the container browser. Further accesses to that web site would be displayed using the designated web browser. Other designated web pages would be displayed on other designated web browsers. | 01-01-2009 |
20090016166 | TEXT MESSAGE ACTIVATED ALARM CLOCK - A method for adjusting an alarm activation time of an alarm clock includes: selecting a revised alarm activation time; broadcasting the revised alarm activation time to the alarm clock as a text message; and confirming the revised alarm activation time. A computer program product and alarm clock are disclosed. | 01-15-2009 |
20090049391 | METHOD AND SYSTEM FOR INTERNALLY IDENTIFYING A SPECIFIC WEB BROWSER FOR DISPLAYING A SPECIFIC WEB PAGE - Web browser information for the display of the web page is contained in HTML Meta tags of a web page for which access is desired. A web designer may incorporate preferred browser information within the meta tags. When the web page is accessed, the meta tags are inspected for such web browser preference information. When the preferred browser information is identified, availability of the preferred web browser on the particular computing device is determined. When the determination is that the preferred web browser is available, the web page is retrieved and display on the computing device using the identified preferred web browser. | 02-19-2009 |
20090094201 | ITEM LOCATION FINDER - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for locating items. In one illustrative embodiment, the computer implemented method comprises receiving a request for a location of an item from a requester, sending a query to a repository containing information relating to the location of the item, and obtaining a result from sending the query, wherein the result comprises, a location identifier if the location of the item was found in the repository. The result is then returned to the requester. | 04-09-2009 |
20090097635 | METHOD AND APPARATUS FOR RESERVING A POSITION ON A QUEUE IN A SERVICE CENTER - The Service Call Reservation program reserves a location in a queue so that a caller does not have to stay on the line to keep a position in a queue. When a customer contacts a service center the Service Call Reservation program informs the customer of the expected wait time. If the customer believes that the wait period is too long, the customer will indicate that to the program, and the program will prompt the user to provide a preferred method of notification. | 04-16-2009 |
20100056187 | METHOD AND SYSTEM FOR PROVIDING CELLULAR TELEPHONE SUBSCRIPTION FOR E-MAIL THREADS - A method, system and computer-usable medium for providing a subscription to an e-mail message thread via a mobile device. A user may subscribe to an e-mail message thread utilizing a mobile device, based on a unique e-mail thread ID associated with the e-mail thread within the e-mail message itself. Updated data regarding the e-mail message thread can then be provided in response to activity associated with the e-mail message thread. The updated data can be provided in the form of, for example, a text message, a text-to-speech voicemail message, and so forth. Additionally, a telephone number associated with the mobile device can be added to a database stored in an e-mail server that manages the e-mail message and the e-mail message thread in order to subscribe to the e-mail message via a mobile device. SMS data associated with the user can also be added to the database. A user is permitted to subscribe or unsubscribe to the e-mail message/thread, in response to a selection of a particular option in the e-mail message itself. | 03-04-2010 |
20100301993 | PATTERN BASED SECURITY AUTHORIZATION - A method, system and computer-usable medium for authorizing access to a secure location are disclosed. Data indicative of security-related activities (e.g., badging in and/or out of a secure building) can be compiled and then mined to deduce a particular pattern of security-related activities. Access to the secure location can be then authorized, based on the particular pattern of security-related activities. | 12-02-2010 |
20100311443 | METHODS AND APPARATUS FOR ACCESSING COMPUTER NETWORK ACCESSIBLE SERVICE APPLICATIONS VIA A MOBILE TERMINAL - Methods and systems for accessing computer network accessible services, such as internet based service applications, via a mobile terminal of a mobile telecommunication system using a mediation layer between a person's mobile terminal and the IT world. The mobile terminal in response to receiving user inputs interacts with this mediation layer via text messages. The mediation layer turns around and executes the appropriate IT services on behalf of the mobile terminal user. | 12-09-2010 |
20110276865 | AUTHORING CONTENT IN CONTEXT LOCATION OF BROWSER - A method is provided and includes sending a set of instructions from a server to a web browser, causing the web browser to identify a set of one or more universal resource locators (URLs) in the set of instructions sent from the server and causing the web browser to add one or more of the identified set of the one or more URLs in a context location of the web browser. | 11-10-2011 |
20120198564 | Security Classification Based on User Interaction - An embodiment of the invention includes a method and system for content management. More specifically, the system includes a user interface for receiving content from a user and a data repository connected to the user interface for storing the content. The user interface also receives a request to access the content from the user. A program processor is connected to the data repository, wherein the program processor determines whether the content includes a security classification. A communications module is connected to the program processor, wherein the communications module sends an alert to the user interface when the content does not include a security classification. The alert includes a request to assign a security classification to the content. | 08-02-2012 |
20120198568 | Security Classification Applying Social Norming - An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification. | 08-02-2012 |
20120284267 | Item Randomization with Item Relational Dependencies - An embodiment of the invention provides a method and system for randomizing items within a storage device. A linkage module links a first linked item in the storage device to one or more second linked items in the storage device based on attributes of the items. The linking is performed without input from a user of the storage device. The second linked item has at least one attribute in common with the first linked item. A list generating module connected to the linkage module generates a list, wherein the list includes a random sequence of items. The generating of the list groups the first linked item and the second linked item(s) in the list such that there are no items between the first linked item and the second linked item(s) in the list. | 11-08-2012 |
20120290544 | DATA COMPLIANCE MANAGEMENT - A solution for managing data compliance for a set of data repositories in an automated/semi-automated manner is provided. A data repository profile for each data repository can be used to identify a scanning component corresponding to the data repository, which can be launched to identify any suspect data items stored in the data repository. Subsequently, an identified suspect data item can be evaluated for compliance with one or more compliance policies of the corresponding data repository, which also can be stored in the repository profile. When the suspect data item is evaluated as being in violation of one or more compliance policies, a set of corrective actions stored in the repository profile can be identified and initiated to address the violation. | 11-15-2012 |
20120303616 | Data Perturbation and Anonymization Using One Way Hash - An embodiment of the invention provides a method for anonymizing data from multiple data sources according to an embodiment of the invention. The data sources include record identifiers identifying entities associated with the data, wherein the record identifiers are only stored by the data sources. The data is collected by a central data aggregation module connected to the data sources. A record identifier is received by an anonymization engine from a first data source; and, a first anonymous identifier is generated with the anonymization engine to replace the record identifier. A map is sent to a mapping module if the anonymization engine has anonymized the record identifier before, wherein the map includes a list of anonymous identifiers that have been used to replace the record identifier. The first anonymous identifier and first data associated with the first anonymous identifier are sent to the data aggregation module. | 11-29-2012 |
20120310392 | AUDIO MEDIA MOOD VISUALIZATION METHOD AND SYSTEM - An audio media visualization method and system. The method includes receiving by a computing processor, mood description data describing different human emotions/moods. The computer processor an audio file comprising audio data and generates a mood descriptor file comprising portions of the audio data associated with specified descriptions of the mood description data. The computer processor receives a mood tag library file comprising mood tags mapped to animated and/or still objects representing various emotions/moods and associates each animated and/or still object with an associated description. The computer processor synchronizes the animated and/or still objects with the portions of said audio data and presents the animated and/or still objects synchronized with the portions of said audio data. | 12-06-2012 |
20130007642 | CONTAINING AND ACCESSING MULTIPLE WEB BROWSERS - A method and system for displaying a web page. Each record in a container browser includes a web site locator of a web site and a web browser identifier of a web browser associated with the web site. A first web browser retrieves and displays a particular web page from a first web site. A user desires to replace a web browser identifier of a first web browser in a first record in the container browser with a web browser identifier of a second web browser. The web browser identifier of the second web browser is received from the user. The web browser identifier of the first web browser is replaced by the web browser identifier of the second web browser in the first record. The second web browser retrieves and displays the particular web page from the first web site. | 01-03-2013 |
20130035207 | ROUTINE-BASED MANAGEMENT OF EXERCISE EQUIPMENT ACCESS - A solution for managing access to exercise equipment in a fitness facility is provided. A planned exercise routine for a user, which includes data corresponding to a plurality of exercises desired to be performed by the user at the fitness facility is used for providing location information for presentation to the user. Each exercise can require use of an exercise apparatus. The exercise can be mapped to at least one exercise apparatus located at the fitness facility. A target exercise apparatus can be identified from the mapped exercise apparatus(es). Location information for one or more of the target exercise apparatuses can be provided for presentation to the user. | 02-07-2013 |
20130103542 | PROVIDING PERSONALIZED RESULTS FOR GIFT GIVING UTILIZING A DATABASE - An approach for providing personalized results for gift giving utilizing a database is provided. The approach includes reviewing, by a processor, an item list of a recipient, determining an item to provide to the recipient that is not on the item list, and sending the item to the recipient. The item list is stored in one or more databases of at least one of a recipient device, a merchant server, and a third party server, for querying of the item list. | 04-25-2013 |
20130135616 | CABLE IDENTIFICATION USING A UNIQUE CABLE SLEEVE - A cable identification system is provided. The cable identification system includes a cable sleeve with some predetermined unique properties. The cable sleeve is adapted to receive a cable therein. The cable includes one or more electrical conductors therein. The cable identification system further includes a portable measuring device configured to detect the predetermined unique properties of the cable sleeve when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130137291 | CABLE IDENTIFICATION USING A UNIQUE SIGNAL CARRIED ON AN UNUSED CONDUCTOR - A cable identification system is provided. The cable identification system includes a multiconductor cable with an electrical connector secured to at least one end. The electrical connector is adapted to connect a plurality of conductors in the cable to a mating connector. The cable identification system further includes a signal generator adapted to connect the electrical connector to the mating connector. The signal generator is configured to select an unused conductor from the plurality of conductors and generate and transmit a unique signal over the selected conductor in the cable. The cable identification system further includes a portable device configured to detect the unique signal when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130137292 | CABLE IDENTIFICATION USING A UNIQUE SIGNAL CARRIED ON AN EXTERNAL CONDUCTOR - A cable identification system is provided. The cable identification system includes a cable having a plurality of conductors with an electrical connector secured to at least one end. All but one of the conductors are enclosed in a shield conductor. The remaining additional conductor is positioned external to the outer surface of the shield conductor. The electrical connector is adapted to connect the plurality of conductors to a mating connector. The cable identification system further includes a signal generator adapted to connect the electrical connector to the mating connector. The signal generator is configured to generate and transmit a unique signal over the additional conductor in the cable. The cable identification system further includes a portable device configured to detect the unique signal when positioned adjacent the cable at any point along the cable. | 05-30-2013 |
20130138839 | CABLE IDENTIFICATION USING DATA TRAFFIC ACTIVITY INFORMATION - A cable identification system is provided. The cable identification system includes a cable having a plurality of conductors with an electrical connector on at least one end of the cable. The electrical connector is adapted to connect all conductors in the cable to a mating connector. The cable identification system further includes a signal generator connectable between the electrical connector and the mating connector on a network device. The signal generator includes a controller configured to measure and analyze parameters indicative of data traffic in the cable. The cable identification system further includes a cable sleeve adapted to receive the cable therein and coupled to the electrical connector. The cable sleeve has one or more segments which are electrically activatable to change an appearance based on a signal sent by the electrical connector in response to the measurements of the parameters indicative of traffic in the cable. | 05-30-2013 |
20130198362 | System for Identifying a Server to be Decommissioned - An embodiment of the invention provides a device for monitoring activity of a computing device connected to a network cable. The device includes a first interface for connecting the device to the network cable, a second interface for connecting the device to the computing device, and a third interface for connecting the device to a power cable. The device includes a first sensor for measuring network traffic to the computing device and/or network traffic from the computing device. The first sensor identifies an IP address accessing the computing device and/or a protocol used to access the computing device. The device further includes a second sensor for measuring power consumption of the computing device and a third sensor for identifying the computing device. A wireless communications module connected to the first sensor and/or the second sensor wirelessly transmits data from the first sensor and/or the second sensor to an external device. | 08-01-2013 |
20130268667 | POLICY-DRIVEN ADMINISTRATION OF MOBILE APPLICATIONS - Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition. | 10-10-2013 |
20130268668 | POLICY-DRIVEN ADMINISTRATION OF MOBILE APPLICATIONS - Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition. | 10-10-2013 |
20140075367 | Supplementing a Virtual Input Keyboard - Supplementing a virtual input keyboard is provided. A form and a virtual input keyboard are displayed in a display of a data processing system. An input is received selecting a particular field within the form. One or more character key sets are retrieved corresponding to previous data entries of the particular field selected. A delta set of character keys is determined based on character keys in the one or more character key sets that do not match displayed character keys on the virtual input keyboard. A set of delta character supplemental virtual input keyboards is generated based on the delta set of character keys. Then, the set of delta character supplemental virtual input keyboards are displayed in the display. | 03-13-2014 |
20140095601 | DEVICE OPERABILITY ENHANCEMENT WITH ALTERNATIVE DEVICE UTILIZATION - An approach is disclosed for enhancing mobile-device operation by resource sharing and/or pooling. The approach can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to trigger a first device to share content or request functionality of any of a plurality of other devices. The programming instructions can further be operable to discover a candidate device that is capable of receiving the content or a request to provide the functionality. The programming instructions can further be operable to determine that the candidate device can receive the content or provide the functionality based on predetermined criteria. The programming instructions can further be operable to establish a connection with the candidate device. The programming instructions can further be operable to send the content from the first device to the candidate device or receive functionality from the candidate device. | 04-03-2014 |
20140115148 | Decommission of a Server in Wireless Environment - An embodiment of the invention provides a device for monitoring activity of a computing device wirelessly connected to a network, wherein the device includes a first interface for connecting the device to the computing device. A second interface wirelessly connects the device to the network. A sensor connected to the second interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. Another embodiment of the invention provides a computing device having an interface for wirelessly connecting to a network. A sensor connected to the interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. A processor connected to the sensor compares the network traffic to the computing device and/or the network traffic from the computing device to one or more thresholds to determine whether the computing device should be decommissioned. | 04-24-2014 |
20140115371 | Decommission of a Server in Wireless Environment - An embodiment of the invention provides a device for monitoring activity of a computing device wirelessly connected to a network, wherein the device includes a first interface for connecting the device to the computing device. A second interface wirelessly connects the device to the network. A sensor connected to the second interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. Another embodiment of the invention provides a computing device having an interface for wirelessly connecting to a network. A sensor connected to the interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. A processor connected to the sensor compares the network traffic to the computing device and/or the network traffic from the computing device to one or more thresholds to determine whether the computing device should be decommissioned. | 04-24-2014 |
20140152470 | Vehicle-Induced Roadway Debris Monitoring - In an embodiment, a computer-implemented method of monitoring vehicles is provided, the method including: generating a debris report of an incident relating to vehicle-induced roadway debris, the debris report generated by a reporting vehicle; in a monitored vehicle distinct from the reporting vehicle, updating an incident record for the monitored vehicle based on the debris report and determining, based on the updated incident record, whether the monitored vehicle is associated with the incident or in a vicinity of the incident; and initiating a safety action to be performed on the monitored vehicle in response to a determination that the monitored vehicle is associated with the incident or in the vicinity of the incident. | 06-05-2014 |
20140195297 | ANALYSIS OF USAGE PATTERNS AND UPGRADE RECOMMENDATIONS - An approach is provided for analyzing usage patterns of computing devices and providing upgrade recommendations. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: monitor usage on one or more electronic devices; and recommend upgraded functionality on the one or more devices based on the monitored usage based on a risk assessment allocation on selected functionality associated with an upgrade for the one or more electronic devices. | 07-10-2014 |
20140208150 | CROSS COMMUNICATION OF COMMON PROBLEM DETERMINATION AND RESOLUTION - Approaches for problem determination and resolution process cross communication are provided. Embodiments provide cross communication of a problem determination and resolution among similar data center devices. Specifically, symptoms of an error condition encountered for one data center device are captured by a first enterprise group, along with an associated resolution solution, and made available to an another enterprise group managing a commonly configured data center device, which may be faced with a similar error condition. The error signature and resolution steps captured by the first enterprise group are subsequently made available within and across multiple management domains operating within a common model (e.g., a publication-subscription system). Within this model, both the originator of the error determination and resolution (i.e., publisher), and one or more commonly configured data center devices susceptible to the same error condition (i.e., subscribers), can filter, access, and control the flow of error resolutions. | 07-24-2014 |
20140288960 | ROUTINE-BASED MANAGEMENT OF EXERCISE EQUIPMENT ACCESS - A solution for managing access to exercise equipment in a fitness facility is provided. A planned exercise routine for a user, which includes data corresponding to a plurality of exercises desired to be performed by the user at the fitness facility is used for providing location information for presentation to the user. Each exercise can require use of an exercise apparatus. The exercise can be mapped to at least one exercise apparatus located at the fitness facility. A target exercise apparatus can be identified from the mapped exercise apparatus(es). Location information for one or more of the target exercise apparatuses can be provided for presentation to the user. | 09-25-2014 |