Patent application number | Description | Published |
20090031019 | Technique for Graphically Displaying Application Processing Time Distributions in Real-Time - A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times. | 01-29-2009 |
20090210873 | RE-TASKING A MANAGED VIRTUAL MACHINE IMAGE IN A VIRTUALIZATION DATA PROCESSING SYSTEM - Embodiments of the present invention provide a method, system and computer program product for virtualization of application lifecycles. In an embodiment of the invention, a virtualization data processing system can be provided. The system can include a hypervisor configured for execution in a host computing platform, a VM image managed by the hypervisor, and a configuration applied to the VM image. The configuration can specify a set of resources in the host computing platform accessible by applications executing in the VM image. Finally, the system can include re-tasking logic coupled to the hypervisor. The logic can include program code enabled to select a new role for the VM image, to determine a new configuration for the new role, and to apply the new configuration to the VM image. | 08-20-2009 |
20110004735 | METHOD AND APPARATUS FOR TWO-PHASE STORAGE-AWARE PLACEMENT OF VIRTUAL MACHINES - Techniques for placement of a virtual machine in a computing system. A first request is sent from a pool management subsystem to a placement subsystem. The first request includes specification of available storage capacities of storage systems in a computer network. The placement subsystem automatically determines a target storage system based, at least in part, on the available storage capacities. An identification of the target storage system is received at the pool management subsystem. At least one disk image of the virtual machine is written to the target storage system. Then, a second request is sent to the placement subsystem. The placement subsystem automatically determines a target computer. The latter determination is based, at least in part, on connectivity between the target computer and the target storage system. The virtual machine is installed at the target computer. The techniques facilitate live migration of virtual machines placed thereby. | 01-06-2011 |
20150024793 | PUSH NOTIFICATION MIDDLEWARE - Embodiments relate to push notification middleware. A method includes receiving, at a notification service of a mobile platform server executing on a computer processor, a notification trigger including a payload to deliver to an endpoint. The method also includes accessing, by the notification service, a registry to determine a notification transport protocol associated with the endpoint. A channel plugin associated with the notification transport protocol is selected by the notification service to establish a notification channel with the endpoint, and the payload is sent to the endpoint on the notification channel. | 01-22-2015 |
20150024794 | PUSH NOTIFICATION VIA FILE SHARING SERVICE SYNCHRONIZATION - Embodiments relate to push notification via file sharing service synchronization. A method includes establishing synchronization, at a notification service of a mobile platform server executing on a computer processor, with a client-to-server directory of a file sharing container of a client mobile device via a file sharing service. The notification service detects a notification from the client mobile device in the client-to-server directory and determines an endpoint associated with the notification and a notification transport protocol associated with the endpoint. The notification service also selects a channel plugin associated with the notification transport protocol to establish a notification channel with the endpoint and sends a notification trigger on the notification channel to the endpoint based on the notification. | 01-22-2015 |
20150026237 | PUSH NOTIFICATION VIA FILE SHARING SERVICE SYNCHRONIZATION - Embodiments relate to push notification via file sharing service synchronization. A system includes a computer processor and a mobile platform server executable by the computer processor. The mobile platform server includes a notification service configured to establish synchronization with a client-to-server directory of a file sharing container of a client mobile device via a file sharing service. The notification service is further configured to detect a notification from the client mobile device in the client-to-server directory and to determine an endpoint associated with the notification and a notification transport protocol associated with the endpoint. The notification service is also configured to select a channel plugin associated with the notification transport protocol to establish a notification channel with the endpoint and to send a notification trigger on the notification channel to the endpoint based on the notification. | 01-22-2015 |
20150026324 | NOTIFICATION NORMALIZATION - Embodiments relate to notification normalization in a mobile communication environment. A system for notification normalization is provided. The system includes a computer processor and a mobile application platform server executable by the computer processor. The mobile application platform server includes a notification service configured to receive a plurality of notification triggers to deliver a plurality of notifications from an application server to a plurality of endpoints. The notification service is further configured to determine whether to apply notification throttling based on a stress level of the application server, and spread delivery of the notifications to the endpoints over a period of time based on the determination to apply the notification throttling such that traffic associated with responses from the endpoints to the application server is substantially normalized. | 01-22-2015 |
20150026325 | NOTIFICATION NORMALIZATION - Embodiments relate to notification normalization in a mobile communication environment. A method for notification normalization is provided. The method includes receiving, at a notification service of a mobile platform server executing on a computer processor, a plurality of notification triggers to deliver a plurality of notifications from an application server to a plurality of endpoints. The notification service determines whether to apply notification throttling based on a stress level of the application server, and spreads delivery of the notifications to the endpoints over a period of time based on determining to apply the notification throttling such that traffic associated with responses from the endpoints to the application server is substantially normalized. | 01-22-2015 |
20150026356 | PUSH NOTIFICATION MIDDLEWARE - Embodiments relate to push notification middleware. A system includes a computer processor and a mobile platform server executable by the computer processor. The mobile platform server includes a notification service and a registry. The notification service is configured to receive a notification trigger including a payload to deliver to an endpoint and access the registry to determine a notification transport protocol associated with the endpoint. The notification service is further configured to select a channel plugin associated with the notification transport protocol to establish a notification channel with the endpoint and send the payload to the endpoint on the notification channel. | 01-22-2015 |
Patent application number | Description | Published |
20080320411 | METHOD OF TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to enter text selecting text based upon the number of words in phrases of the text, upon the number of letters in words of the text, or upon other patterns of the text. The method may also involve indexing the selected text, matching text currently being entered by the user into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In many embodiments, the text may be selected from the text entered into any of several applications. In a few embodiments, the text may be selected from sources specified by a user. In further embodiments, the sources may constitute data files. | 12-25-2008 |
20090006161 | SYSTEMS AND METHODS FOR MANAGING EVENTS OF EVENT SCHEDULING APPLICATIONS - Systems, methods, and computer program products for managing events in time management or event scheduling applications, such as calendar applications, are disclosed. Embodiments comprise analyzing event parameters, such as selections from input solicited from prospective meeting attendees that are associated with events of the meeting, determining an arrangement of the events based on the analysis of the event parameters, and proposing the arrangement. System embodiments generally comprise a list of events for the meeting, such as event items in a database, a constraint solver to analyze parameters of events of the list, and an arrangement module to select an arrangement of the events based on analysis by the constraint solver. | 01-01-2009 |
20090094088 | METHODS, SYSTEMS, AND APPARATUSES FOR AUTOMATED CONFIRMATIONS OF MEETINGS - Methods, systems, apparatuses, and computer program products for confirming attendance of prospective attendees to a meeting or events via time management or event scheduling applications, such as calendar applications, are disclosed. Various embodiments comprise scheduling the meeting, waiting for a period of time, and automatically sending confirmation requests to one or more prospective attendees of the meeting. Some embodiments also comprise sending invitations to and receiving acceptances by one or more prospective attendees. Some embodiments further comprise receiving one or more responses to the confirmation requests from the prospective attendees. Some embodiments may reschedule the meeting, or events of the meeting, based upon responses to the confirmation requests. Various embodiments may send or receive the confirmation requests and responses via instant messaging (IM) messages, e-mail messages, and short message service (SMS) messages. | 04-09-2009 |
20090106369 | DUPLICATE EMAIL ADDRESS DETECTION FOR A CONTACT - Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server. | 04-23-2009 |
20090265435 | Email Server Cooperative Management for Automatic Routing of Emails Based on Preferences - Methods, systems, and media are disclosed for managing the routing of an email at the server level to an email client by preferences set in a routing application located on the server. One embodiment includes querying, by a routing application located on a server and associated with an email system, the email by comparison to conditions for each preference set in the routing application, wherein a preference comprises a routing action. Further, the method includes identifying, based on the querying and by the routing application, a match between the email and at least one of the conditions. Further still, the method includes performing, based on the match and by the routing application, the preference associated with the at least one of the conditions of the email, whereby the email is transmitted to an email client. | 10-22-2009 |
20090271700 | TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to index segments of text from multiple sources and receive segments of text being entered into text-entry applications in a floating application. The embodiments may also involve matching the segments of text to indexed segments of text and entering completions of the received segments of text into the text-entry applications. The completions may be based upon the matching, and the completion of a segment may be entered into the text-entry application from which it was received. | 10-29-2009 |
20120066237 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 03-15-2012 |
20120072201 | LANGUAGE TRANSLATION REUSE IN DIFFERENT SYSTEMS - An account system obtains a first translation file associated with it. The account system obtains a second translation file from a second account system, wherein the second account system is a data processing system. The account system determines whether a third account system has a third translation file with untranslated terms. The account system obtains the third translation file from the third account system, responding to a determination that the third account system has the third translation file with untranslated terms. The account system, responding to a determination that the third account system has the third translation file with untranslated terms, forms a comprehensive file from at least two files selected from the group consisting of the first translation file, second and/or third translation files. The account system translates the comprehensive file to form a translated file. | 03-22-2012 |
20120331414 | ARRANGEMENTS OF TEXT TYPE-AHEAD - A method and system of text entry. An attribute of text entered by a user into an application is determined. The entered text is matched to a single portion of each attribute segment of one or more indexed segments of text, based upon a determined attribute of each attribute segment and the determined attribute of the entered text. Each attribute segment consists of the single portion and a remaining portion. After the entered text is matched to a single portion of each attribute segment, a selection of a single attribute segment selected from the one or more indexed segments of text by the user is received. The remaining portion of the selected single attribute segment is entered into the application. | 12-27-2012 |
20130111479 | Performance of Scheduled Tasks via Behavior Analysis and Dynamic Optimization | 05-02-2013 |
20130111484 | Identifying and Correcting Hanging Scheduled Tasks | 05-02-2013 |
20130111497 | Staggering Execution of Scheduled Tasks Based on Behavioral Information | 05-02-2013 |
20130305030 | TESTING A CONFIGURATION CHANGE - An approach is presented for testing a change (i.e., configuration change) in a configuration of a computing environment. A user identifier (ID) of a user is received from an administrative user having an administrative user ID. First configurable attributes of the user ID are determined. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is received. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation is performed by tracking data record modifications made by the TSID and based on the configuration change. The user ID and administrative user ID are unaffected by the configuration change. After completing the simulation, the data record modifications are undone. | 11-14-2013 |
20130312069 | MULTIPLE AUTHENTICATION SUPPORT IN A SHARED ENVIRONMENT - An authentication configurator may define a LDAP security group for LDAP authentication, wherein the LDAP security group is associated with rights. It may define a native security group for native authentication users, wherein the native authentication group has at least one right not present in the LDAP security group, and define customer-specified LDAP chains. It may configure an LDAP authentication web application and a native authentication web application, wherein the LDAP authentication web application and the native authentication web application each connect to a service management database, and the LDAP authentication web application uses the customer-specified LDAP chains. A first Uniform Resource Locator (URL) for LDAP authentication to access the LDAP authentication web application and a second URL for native authentication to access the native authentication web application may also be configured. It may assess the authentication requirements of a customer and create a user identifier, responsive to assessing. | 11-21-2013 |
20130318112 | DELTA LANGUAGE TRANSLATION - Revised component selector extracts a translation file comprising a plurality of English keys and translation language values in a database, including untranslated keys as an XML file. The revised component selector extracts a plurality of English keys and translation language values and determines whether there are XML unsupported characters in the XML file. The revised component selector first filters out the XML unsupported characters to form a resultant file, responsive to a determination that XML unsupported characters are in the XML file. The revised component second selector filters out translated data from the resultant file to form an untranslated file. The revised component selector selects a subset of data. The revised component selector, responsive to selecting, third filters out any data not included in the subset to form a translatable file, responsive to selecting. The revised component selector sends the translatable file to a translation center to translate. | 11-28-2013 |
20140223168 | TESTING A CONFIGURATION CHANGE - An approach is provided for testing a change (i.e., configuration change) in a configuration of a computing environment. First configurable attributes of a user identifier (ID) of a user are determined. The user ID was received from an administrative user having an administrative user ID providing the administrative user with an authority of an administrator in the computing environment. A temporary simulation user ID (TSID) having second configurable attributes is generated so that the values of respective first and second configurable attributes are identical. The configuration change is associated with the TSID and with no other user ID. Based on the configuration change being associated with the TSID and with no other user ID, a simulation with the change in the configuration applied in the computing environment is performed. The user ID and administrative user ID are unaffected by the configuration change. | 08-07-2014 |
20140297589 | DYNAMICALLY SYNCHING ELEMENTS IN FILE - An approach is provided for synchronizing elements in files across a technical environment. In one embodiment, a processor obtains a first change to a first file. The processor also obtains data identifying a second file. The processor determines if the change is supported by a data library in a pre-defined list of data sources. The processor analyzes the data library to determine a type of the change. The processor applies the type of the change to the second file. | 10-02-2014 |
20140298185 | DYNAMICALLY ENHANCING USER INTERFACE - An approach is provided for dynamically enhancing and visually synchronizing elements in a display on a computing device. The approach includes using a processor to obtain a change to a first file and data identifying a second file one or more characteristics from a source file. The processor determines if the change is supported by a data library and analyzes the data library to determine the type of change. The processor then applies the type of change to the second file and generates a display associated with the second file on the computing device that includes the type of change applied to the second file. | 10-02-2014 |