Patent application number | Description | Published |
20090204966 | UTILITY FOR TASKS TO FOLLOW A USER FROM DEVICE TO DEVICE - A “follow-me” utility runs on each of a plurality devices a person may typically use. This utility monitors applications running on a device and intelligently saves the state of tasks a user is performing. When the follow-me utility detects that the user has initialized another device having the follow-me utility and connectivity to the original device, the utility automatically and transparently creates an environment on the new device so that the user may continue the task at the same point as when he or she last performed the task on the original device. When the user continues a task or starts a new task, the follow-me utility automatically and transparently updates files and task states on any devices having the follow-me utility and connectivity. The follow-me utility may make intelligent task migration decisions based on conditions such as network bandwidth, security policy, location, and device capability. | 08-13-2009 |
20090265172 | INTEGRATED SYSTEM AND METHOD FOR MOBILE AUDIO PLAYBACK AND DICTATION - A method and system provides for a single-pass review and feedback of a document. During audio playback of the document to be reviewed, voice-activated recording of feedback and submission of feedback relative to the location in the original document are accomplished. This provides for a fully integrated, single pass review and feedback of documentation to occur. | 10-22-2009 |
20100049529 | INTEGRATED SYSTEM AND METHOD FOR MOBILE AUDIO PLAYBACK AND DICTATION - A method and system provides for a single-pass review and feedback of a document. During audio playback of the document to be reviewed, voice-activated recording of feedback and submission of feedback relative to the location in the original document are accomplished. This provides for a fully integrated, single pass review and feedback of documentation to occur. | 02-25-2010 |
20160139908 | CONSTRUCTING VIRTUAL IMAGES FOR INTERDEPENDENT APPLICATIONS - A technique for automating the construction of multiple virtual images with interdependencies includes creating a first virtual image (VI) instance by extending a first base VI based on input values associated with the first base VI and software bundles associated with the first base VI. A second VI instance is created by extending a second base VI based on input values associated with the second base VI, instance values received from the first VI instance, dependency instance values received from a deployed dependency instance, and software bundles associated with the second base VI. The first and second VI instances are then deployed to designated machines in a cloud environment for execution. | 05-19-2016 |
Patent application number | Description | Published |
20090037914 | AUTOMATIC CONFIGURATION OF ROBOTIC TRANSACTION PLAYBACK THROUGH ANALYSIS OF PREVIOUSLY COLLECTED TRAFFIC PATTERNS - A system and method which accesses or otherwise received collected performance data for at least one server application, where the server application capable of performing a plurality of transactions with client devices and the client devices are geographically dispersed from the server in known geographical locales, which automatically determines from the performance data which of the transactions are utilized by users of the client devices, which selects utilized transactions according to at least one pre-determined selection criteria, which automatically generates a transaction playback script for each of the selected transactions substituting test information in place of user-supplied or user-unique information in the transactions, which designates each script for execution from a geographical locale corresponding to the locale of the clients which execute said utilized transactions, which deploys the playback scripts to robotic agents geographically co-located with client devices according to the locale designation, and which executes the playback scripts from the robotic agents in order to exercise the server application across similar network topologies and under realistic conditions. | 02-05-2009 |
20090070881 | METHOD AND APPARATUS FOR CONTROLLING THE PRESENTATION OF CONFIDENTIAL CONTENT - A computer implemented method and apparatus for controlling the presentation of information. In response to receiving a request to present the information, a process confirms that conditions for presentation of the information are satisfied using a set of presentation policies, wherein the conditions are specified in the set of presentation policies, and wherein the conditions comprise a status of a user and a setting of the user. The process then determines whether confidential content is present in the information. Responsive to the confidential content being present, the process redacts the confidential content before presenting the information to a user, and then updates a presentation history with metadata describing the presentation of the information comprising the confidential content. | 03-12-2009 |
20090089133 | INTEGRATED CALENDAR AND TASK SCHEDULER - A computer implemented method for integrating a calendar and task scheduler to enable automatic scheduling of meetings and assignment of tasks based on priority. With the illustrative embodiments, a task in a user's calendaring system may be split into multiple time blocks, and each time block for the task may then be scheduled around meetings in a user's calendar. Tasks that are scheduled in the user's calendar may also be automatically rescheduled when meetings within the user's calendar change. Tasks may be scheduled over lower priority meetings in the user's calendar as needed in order to meet the due dates assigned to the tasks. The illustrative embodiments also allow for automatically adjusting meeting or task priorities based on policies, and identifying classes of activities that may be performed concurrently. | 04-02-2009 |
20090106361 | Identification of Root Cause for a Transaction Response Time Problem in a Distributed Environment - Method and apparatus for identifying a cause for a response time problem for a transaction in a distributed computing system that includes a central server and a plurality of subsystems. Data is stored at each subsystem relating to sub-transactions of transactions performed by the subsystems. When a problem is discovered in connection with the completion of a particular transaction, each subsystem of the plurality of subsystems that was involved in the particular transaction is identified, and both instance data relating to all of the sub-transactions of the particular transaction stored at each identified subsystem and current hourly aggregate data stored at each identified subsystem is forwarded to the central server. Root-Cause Analysis is then performed using the forwarded instance data and aggregate data to identify the particular subsystem that caused the transaction problem. | 04-23-2009 |
20090177692 | DYNAMIC CORRELATION OF SERVICE ORIENTED ARCHITECTURE RESOURCE RELATIONSHIP AND METRICS TO ISOLATE PROBLEM SOURCES - A potential multicomputer related problem is predicted and reported by determining a set of computer resources and relationships there between needed to complete a multicomputer business transaction, retrieving performance monitoring metrics for the computer resources during executions of the multicomputer transaction, dynamically deriving correlations between the resource relationships and the performance metrics, comparing a trend of the correlations to one or more service level requirements to predict one or more potential future violations of a business transaction requirement, including identification of one or more related resources likely to cause the violation, and reporting such prediction and likely case to an administrator. | 07-09-2009 |
20090189983 | SYSTEM AND METHOD FOR PATTERN BASED THRESHOLDING APPLIED TO VIDEO SURVEILLANCE MONITORING - A system, method, and program product is provided that configures video handlers pertaining to a dependent individual. Configuring includes setting alert thresholds. Visual locations are configured. Visual images that pertain to caregivers of the dependent individual are configured. Video streams are received from video sources. Video streams are compared to configured locations to classify the dependent individual's location. Video stream is analyzed to determine whether the dependent individual is alone or with others. If with others, a list of known persons is determined by comparing the video streams with the configured visual images. The configured video handlers are initiated based on the inputs of the location and the people present with the dependent individual. Video handlers trigger alerts when thresholds are reached. Alerts include performing actions to protect the dependent individual from harm. | 07-30-2009 |
20100174419 | Consumer Electronic Usage Monitoring and Management - A mechanism for managing energy consumption of electrical devices within a home or building. Energy usage data is collected for a first electrical outlet connected to an unidentified electrical device in a facility. A pattern of energy usage is determined from the energy usage data collected at the first electrical outlet. The pattern of energy usage of the first electrical outlet is then compared against known patterns of energy usage for one or more other electrical outlets. Responsive to identifying a match between the pattern of energy usage of the energy usage data collected at the first electrical outlet and a known pattern of energy usage of a second electrical outlet in the one or more other electrical outlets, the electrical device connected to the first electrical outlet is identified as the same electrical device that is associated with the known pattern of energy usage of the second electrical outlet. | 07-08-2010 |