Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 109. Отображено 109.
16-08-2012 дата публикации

Personal Resources Organizer with Calendar Interface and Object Detection

Номер: US20120209868A1

A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects. 1. A method , in a data processing system , for monitoring personal resources for use with a scheduled event , comprising:identifying one or more personal resource objects present in a container;retrieving a list of required personal resource objects for an event scheduled in an electronic schedule;comparing the identified one or more personal resource objects with the list of required personal resource objects;generating a report of a readiness for the scheduled event based on results of the comparison; andoutputting the report, wherein the one or more personal resource objects are physical objects and wherein the container is a physical container into which the one or more personal resource objects are physically placed and which houses the one or more personal resource objects.2. The method of claim 1 , wherein:the container comprises a reader device,the one or more personal resource objects comprise tags coupled to the one or more personal resource objects that are readable by the reader device, andidentifying the one or more personal resource objects present in the container comprises reading the ...

Подробнее
26-07-2012 дата публикации

Extending Memory Capacity of a Mobile Device using Proximate Devices and Multicasting

Номер: US20120191821A1

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.

Подробнее
16-05-2019 дата публикации

Managing Assets

Номер: US20190147380A1
Принадлежит:

A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. 129-. (canceled)3039-. (canceled)40. A computer program product for use in managing information technology assets owned by an owner , the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith , the program instructions executable by a processing circuit to cause the device to perform a method comprising:receiving an asset management task from an administrator across a network, the asset management task including a description of the asset management task to be performed for review by a user on an owner system, criteria for identifying which information technology assets are to perform the asset management task, and specific instructions to be executed by a set of information technology assets owned by the owner to perform the asset management task;automatically without human intervention identifying a subset of the information technology assets owned by the owner that meet the criteria set forth in the asset management task;automatically without human intervention transmitting a personalized direct communication across the network to the owner system including the received description of the asset management task to be performed for approval by the user of the owner system; andresponsive to receiving an approval communication ...

Подробнее
25-03-2010 дата публикации

METHOD AND SYSTEM FOR DYNAMIC CONTACT INFORMATION MANAGEMENT IN ELECTRONIC COMMUNICATION DEVICES

Номер: US20100076926A1

A method and system for user contact information in electronic devices is provided. One implementation involves detecting a change in a user contact information at a first electronic device, determining effective date of the change in the contact information, storing the contact information change and effective date in a memory store, automatically communicating the contact information change and effective date to a second electronic device, and applying the received contact information change to a contact information list in a memory store of the second device, on or after the effective date.

Подробнее
24-02-2011 дата публикации

Method and System for Presenting Information Associated With a Location

Номер: US20110046879A1

An enhanced navigation system in which present location is compared to a database of points of interest. Data for each point of interest include a reference to a source of dynamic information reflecting the real time status of the point of interest. Such a reference may comprise, for example, an Internet link. Real time status information will vary depending on the nature of the point of interest, and may include information such as whether the point is open or closed, queue lengths, waiting times, etc. The real time status information is retrieved from the source and presented to the user.

Подробнее
22-05-2012 дата публикации

Personal resources organizer with calendar interface and object detection

Номер: US0008185527B2

A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects.

Подробнее
18-05-2016 дата публикации

Management of a computing system with dynamic change of roles

Номер: GB0002532229A
Принадлежит:

A management server 110 deploys management data to client computers 115. Some of the client computers 115(1,2,5) act as relays to deploy the management data to child client computers. A client computer 115(5), which is a child of one relay client, may be a relay client for its own child clients. The resources of the client computers are monitored. This may include monitoring the processing power, processing usage, working memory, working memory usage, mass memory capacity or mass memory usage of the client computers. If the monitored resources of a relay client are insufficient for the number of child client computers, for which it acts as a relay, then the child clients are moved to other clients, which do have sufficient resources. These may be endpoint clients, which did not have any child clients. The new relay client may be selected based on the distance between it and the child client.

Подробнее
24-11-2005 дата публикации

Software distribution method and system supporting configuration management

Номер: US20050262501A1

A software distribution method ( 300 ) and a corresponding system are proposed. In the solution of the invention, each software package (which is used to deploy a desired software product) includes the definition of installation actions and configuration actions; the installation actions are used to load the software product (including its initial configuration), whereas the configuration actions are used to set configuration options of the software product after the installation. The software package can be applied ( 316 - 332;346 ) on each endpoint specifying an installation activity or a configuration activity (involving the execution of the corresponding actions). In this way, it is possible to reconfigure ( 346 ) a software product that is already available without its reinstallation; moreover, it is possible to correct ( 374 ) configuration errors directly on the endpoint.

Подробнее
11-06-2019 дата публикации

Dynamic presentations management

Номер: US0010318116B2

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.

Подробнее
21-01-2010 дата публикации

METHOD AND SYSTEM FOR PROVIDING PROXY FUNCTIONALITY IN A MESSAGE CLIENT

Номер: US20100017479A1

A method and system for communicating electronic messages among clients in a network is provided. One implementation involves marking an electronic message to indicate that the message is to be routed to recipient clients identified by a user group definitions, sending the marked message from a sender client to a proxy client, parsing an incoming message at the proxy client to detect an indication that the message is to be routed to recipient clients in a user group, and routing the message from the proxy client to one or more recipients in the user group based on the user group definition.

Подробнее
03-12-2013 дата публикации

Scheduling a meeting in real time

Номер: US0008601061B2

A method, data processing system, and computer program product for sending a notification of a meeting. An identification is made when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance. Whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting is determined in response to the identification that the number of users in the plurality of users is within the threshold distance. The notification of the meeting is sent to the number of the users in response to determining that the number of users is greater than or equal to the threshold number.

Подробнее
29-10-2009 дата публикации

SYSTEM AND METHOD TO HANDLE PHONE LINE SERVICES DURING MODEM DIAL-UP CONNECTION

Номер: US20090268887A1

A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party. A reporting notification message is further transmitted by the ...

Подробнее
27-01-2015 дата публикации

Granular virus detection

Номер: US0008943595B2

A group of files for an application installed on a computer system is identified in response to a request to scan the application for malware. The group of files for the application is scanned for the malware. A result is obtained. An action is performed based on the result.

Подробнее
18-06-2009 дата публикации

SOFTWARE LICENSE RECONCILIATION FACILITY

Номер: US20090158438A1

A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.

Подробнее
02-03-2006 дата публикации

Software distribution method and system with automatic prerequisite installation

Номер: US20060048145A1
Принадлежит:

A software distribution method (300) is proposed. The solution of the invention relates to the deployment (from a source host to selected endpoints) of main packages that require one or more prerequisite packages. In this case, the source host builds (304-326) and transmits (330-332) a multi-segment distribution structure that embeds the main package and any prerequisite package that is not available on at least one of the endpoints. Each endpoint receiving the distribution structure only installs (336-360) the prerequisite packages that are not available on the endpoint. The main package can then be installed (362-366) correctly (with the required configuration of the endpoint) ...

Подробнее
14-09-2017 дата публикации

Managing Virtual Machine Policy Compliance

Номер: US20170262302A1
Принадлежит: International Business Machines Corp

A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule.

Подробнее
09-04-2019 дата публикации

Management of a computing system with dynamic change of roles

Номер: US0010257260B2

A solution for managing a computing system comprising a plurality of client computing machines to be managed and at least one server computing machine for controlling the managing of the client computing machines, wherein each client computing machine has at least one of a plurality of roles in a deployment infrastructure for deploying management data from said at least one server computing machine to the client computing machines. A corresponding method comprises monitoring one or more operative parameters of each client computing machine against one or more reference policies, detecting a non-compliance of the operative parameters to the reference policies, and changing the role of at least one of the client computing machines in response to the non-compliance of the operative parameters to the reference policies for restoring a compliance thereto.

Подробнее
04-02-2014 дата публикации

Personal resources organizer with calendar interface and object detection

Номер: US0008645371B2

A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects.

Подробнее
08-01-2009 дата публикации

METHOD AND APPARATUS FOR CONTROLLING MULTIPLE SYSTEMS IN A LOW BANDWIDTH ENVIRONMENT

Номер: US20090013084A1

A method of controlling one or more client systems by means of one or more server systems, comprising the steps of identifying a set of system control actions that occur as a result of carrying out a particular function on the server system, which function is required to be replicated on the one or more client systems; and sending the set of system control actions to any client system which is connected to the server system to configure the client system to carry out the system control actions and thereby causing the client system to carry out the particular function on the client system.

Подробнее
14-09-2010 дата публикации

Method and system for managing a shared electronic mail account

Номер: US0007797388B2

A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.

Подробнее
31-07-2012 дата публикации

Allergy prevention

Номер: US0008234124B2

An allergy prevention method and system. The method includes retrieving, by a computing system from a fidelity card, a user profile comprising information specifying first elements known to cause a user to have an allergic reaction. The computing system retrieves data associated with an item for purchase. The data comprises information specifying second elements comprised by the item. The computing system compares the first elements to the second elements to determine that a first element of the first elements matches a second element of the second elements. The computing system generates and presents to the user, a warning indicating that the first item may cause the user to have an allergic reaction.

Подробнее
15-10-2009 дата публикации

Managing Document Access

Номер: US20090257596A1

Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.

Подробнее
05-04-2016 дата публикации

Localizing a software product

Номер: US0009304785B2

Localizing a software product is improved. A plurality of attributes of a plurality of interface elements according to a specified type of user interface are retrieved. Responsive to user input, one or more countries in which the software product is to be localized are specified. An interface element for the user interface is selected. From the attributes of the selected interface element, it is determined whether the interface element is consistent with the specified countries. If not, an alert on a computer display is displayed, in the event the selected interface element is not consistent with the countries specified by the user. The invention also calculates a cost of localizing the selected interface element, wherein the projected cost of localizing the user interface is incremented with the cost of localizing the selected interface element. An alert for the projected cost of localizing the user interface is displayed on the computer display.

Подробнее
09-07-2020 дата публикации

CONTROL OF ACTIVITIES EXECUTED BY ENDPOINTS BASED ON CONDITIONS INVOLVING AGGREGATED PARAMETERS

Номер: US20200220781A1
Принадлежит: International Business Machines Corp

A method and system. One or more local parameters are collected from one or more corresponding endpoints. Each policy of one or more policies includes an indication of one or more activities for execution on the corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on at least one of the one or more local parameters. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters.

Подробнее
18-06-2015 дата публикации

DETERMINING RULES FOR PARTITIONING INTERNET CONNECTION BANDWIDTH

Номер: US20150172207A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention disclose a computer implemented method, computer program product, and system for determining rules for partitioning internet connection bandwidth. In one embodiment, in accordance with the present invention, the computer implemented method includes the steps of identifying static bandwidth partitioning policies that correspond to a cluster of users, wherein the static bandwidth partitioning policies are based on time schedules, quality of service requirements, an amount of internet connection bandwidth paid for by a user, and proportional quotas of internet connection bandwidth, identifying historical bandwidth usage data corresponding to the cluster of users, and determining bandwidth partitioning rules for the cluster of users based on the identified static bandwidth partitioning policies and identified historical bandwidth usage data. In another embodiment, the method further includes the step of applying the determined bandwidth partitioning rules to the cluster of users.

Подробнее
14-02-2013 дата публикации

Managing Cellular Phone Calls

Номер: US20130040602A1

A mechanism is disclosed for managing phone calls on phone devices used by the employee of a company. When the user wants to give a call, a new plugin in the phone device interprets an attribute value added by the phone device user to each phone number in order to categorize the call. The cell phone user enters a profile describing his call accounting information. A call management plugin computes a prefix for user personal calls which will be adapted to the user location. The call management plugin at the end of the call tags the call information as a personal call or business call. The phone device sends the tagged call information to a remote server of the company, which consolidates billing information received from the phone operators with the tagged call information. 1. A method , in a phone device , for managing phone calls , said method comprising:reading in a phone book a phone type attribute value appended to a phone number selected for giving a call;reading profile data from at least one profile associated with the phone type attribute value;applying at least one rule to the profile data; andresponsive to determining the phone type attribute value corresponds to a personal call, prefixing a phone number selected for giving the call with a prefix determined according to the at least one rule and the profile data, wherein the prefix is understandable by a phone network on which the call is to be given.2. The method of claim 1 , further comprising:the phone network distinguishing the call between a personal call and a business call in call billing information sent later on to a phone device owner location.3. The method of claim 1 , wherein the prefix is determined by taking into account a location of the phone device by using the profile data or a navigation function.4. The method of claim 1 , further comprising: testing applicability of the profile data to the at least one rule;', 'repeating the testing applicability of the profile data to the at least one ...

Подробнее
23-10-2018 дата публикации

Managing virtual machine policy compliance

Номер: US0010108444B2

A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule.

Подробнее
31-12-2009 дата публикации

METHOD FOR MANAGING PACKAGE DELIVERY

Номер: US20090326971A1
Принадлежит: IBM Corporation

A method for managing package delivery may include receiving a plurality of packages. Each package may include a bar code or RFID tag associating the package with personal profile information. A delivery route plan may be generated based on the personal profile information. The estimated delivery time may be transmitted to the recipient in advance of the delivery. An electronic reply communication including a location of the recipient may be received from a notified recipient either confirming the delivery or proposing an alternate delivery time or location. The delivery route plan may be recalculated based on the retrieved personal profile information, the alternate delivery time or location if proposed by the recipient, and/or the current location of the recipient to identify alternate delivery time and location options. A confirmation selecting one of the alternate delivery time and location options or reconfirming the delivery may be received from the recipient.

Подробнее
17-01-2013 дата публикации

SCHEDULING A MEETING IN REAL TIME

Номер: US20130018951A1

A method, data processing system, and computer program product for sending a notification of a meeting. An identification is made when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance. Whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting is determined in response to the identification that the number of users in the plurality of users is within the threshold distance. The notification of the meeting is sent to the number of the users in response to determining that the number of users is greater than or equal to the threshold number. 1. A method for sending a notification of a meeting , the method comprising:identifying when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance;responsive to identifying that the number of users in the plurality of users is within the threshold distance, determining whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting; andresponsive to determining that the number of users is greater than or equal to the threshold number, sending the notification of the meeting to the number of the users.2. The method of claim 1 , wherein identifying when the number of users in the plurality of users requesting the notification of the meeting is within the threshold distance comprises:identifying when the number of users are within the threshold distance of a point of interest.3. The method of claim 2 , wherein sending the notification of the meeting to the number of the users comprises:including the point of interest in the notification as a location for the meeting.4. The method of claim 1 , wherein identifying when the number of users in the plurality of users requesting the notification of the meeting is within the threshold distance comprises:identifying when a first user ...

Подробнее
14-06-2012 дата публикации

Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Unicasting

Номер: US20120150986A1

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.

Подробнее
25-11-2014 дата публикации

Extending memory capacity of a mobile device using proximate devices and unicasting

Номер: US0008898245B2

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.

Подробнее
10-03-2020 дата публикации

Managing assets

Номер: US0010586187B2

A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.

Подробнее
22-10-2009 дата публикации

ALLERGY PREVENTION METHOD AND SYSTEM

Номер: US20090265381A1
Принадлежит:

An allergy prevention method and system. The method includes retrieving, by a computing system from a fidelity card, a user profile comprising information specifying first elements known to cause a user to have an allergic reaction. The computing system retrieves data associated with an item for purchase. The data comprises information specifying second elements comprised by the item. The computing system compares the first elements to the second elements to determine that a first element of the first elements matches a second element of the second elements. The computing system generates and presents to the user, a warning indicating that the first item may cause the user to have an allergic reaction.

Подробнее
10-08-2021 дата публикации

Populating a software catalogue with related product information

Номер: US0011086618B2

A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.

Подробнее
29-07-2010 дата публикации

SANDBOX WEB NAVIGATION

Номер: US20100192224A1

Browsing the World Wide Web may expose a user's system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (sandbox) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system.

Подробнее
16-05-2013 дата публикации

INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION

Номер: US20130124658A1

A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee. 1. A method comprising:receiving information corresponding to a plurality of instant messaging contacts from one or more collaboration applications, wherein the plurality of instant messaging contacts are stored by an instant messaging application, wherein the collaboration applications comprise an e-mail application, a calendar application, an online meeting application, and a voicemail application;associating the information with the instant messaging contacts;determining a contact priority for each of the instant messaging contacts based, at least in part, on the association between the information and the instant messaging contacts, wherein the contact priority indicates an attention level associated with each of the instant messaging contacts;generating a contact tip based, at least in part, on the contact priority, wherein the contact tip specifies a reason for the contact priority; anddisplaying an indication of the contact priority and the ...

Подробнее
07-06-2007 дата публикации

METHOD, SYSTEM AND COMPUTER PROGRAM FOR DISTRIBUTING SOFTWARE PRODUCTS IN TRIAL MODE

Номер: US20070130073A1
Принадлежит:

A solution (300) for distributing software products in trial mode is proposed. This solution is based on the idea of leveraging a software distribution infrastructure. For this purpose, a trial software package (identified by a specific attribute) is provided (306-309) for any software product to be distributed in the trial mode. The trial software package is deployed (318-321) and applied (324-330) as usual to install the software product. An additional service of the software distribution infrastructure monitors (333-339) the reaching of an expiration term of the software product (defined in another attribute of the corresponding trial software package). When this expiration term is reached, the trial software package is applied again (342-345) so as to remove the software product temporarily. If a license for the same software product is bought later on (354), a corresponding activation software package is deployed (354-360) and applied (363). The activation software package in turn ...

Подробнее
27-09-2018 дата публикации

Managing Assets

Номер: US20180276585A1
Принадлежит:

A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. 191119- , and (canceled)1012182029 , - and - (canceled)30. A method for use in managing information technology assets owned by a set of owners comprising:receiving an asset management task from an administrator across a network, the asset management task including a description of the asset management task to be performed for review and approval by a user on an owner system for each of the set of owners, criteria for identifying which information technology assets are to perform the asset management task, and specific instructions to be executed by a set of information technology assets owned by the set of owners and approved to perform the asset management task;automatically without human intervention identifying a subset of the information technology assets owned by each of the set of owners;automatically without human intervention transmitting a personalized direct communication across the network to the owner system of each of the set of owners including the received description of the asset management task to be performed, wherein the personalized direct communication requests approval, for the subset of assets to perform the asset management task, by the user of the owner system for each of the set of owners;requesting each of the subset of information technology assets to identify whether that ...

Подробнее
30-10-2018 дата публикации

Managing assets

Номер: US0010115066B2

A system or computer usable program product for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.

Подробнее
26-05-2020 дата публикации

Control of activities executed by endpoints based on conditions involving aggregated parameters

Номер: US0010666515B2

A method and system. One or more policies is stored. Each policy includes activities for execution on corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on one or more local parameters of a corresponding group of endpoints. The local parameters are collected from the corresponding endpoints. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters.

Подробнее
17-01-2013 дата публикации

GRANULAR VIRUS DETECTION

Номер: US20130019313A1

A group of files for an application installed on a computer system is identified in response to a request to scan the application for malware. The group of files for the application is scanned for the malware. A result is obtained. An action is performed based on the result. 1. A method for managing malware comprising:identifying, by a computer system, a group of files for an application installed on the computer system in response to a request to scan the application for the malware;scanning the group of files for the application for the malware to obtain a result; andperforming an action based on the result.2. The method of claim 1 , wherein identifying claim 1 , by the computer system claim 1 , the group of files for the application installed on the computer system in response to the request to scan the application for malware claim 1 , further comprises:determining whether the application has a package in a catalog of a manager;responsive to determining that the application does have the package in the catalog of the manager, determining whether a block in the package contains one of a reference, an invocation of an installer outside of the block, and a reference and an invocation of the installer outside of the block;in response to determining that the block does not contain one of the reference, the invocation of the installer outside of the block, and the reference and the invocation of the installer outside of the block, parsing a number of blocks in the package;after parsing the number of blocks, forming a list of a number of files in the package;selecting a number of files from the list;creating a descriptor identifying the number of files selected from the list;placing a command to perform a scan in the descriptor; andsending the descriptor with the command to a scanner.3. The method of claim 1 , wherein identifying claim 1 , by the computer system claim 1 , the group of files for the application installed on the computer system in response to the request ...

Подробнее
25-06-2009 дата публикации

MULTIMEDIA ARTICLE MANAGEMENT FACILITY

Номер: US20090160621A1

A method is presented for managing user preferences upon reading a multimedia article. The method may include receiving a request to read the multimedia article, and reading a RFID tag coupled to the multimedia article. The RFID tag may store user preference information for reading the multimedia article. The user preference information may then be applied, and the multimedia article may be read in accordance with the user preference information.

Подробнее
08-07-2010 дата публикации

On-Demand Network Connection

Номер: US20100174816A1

An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection.

Подробнее
22-05-2014 дата публикации

Managing Assets

Номер: US20140142999A1

A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. 1. A method of managing assets comprising:receiving a task across a network to be performed by a set of assets;identifying a subset of assets owned by an owner;transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task; andresponsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.2. The method of wherein the task includes a description of the task claim 1 , a set of relevance criteria for the task claim 1 , and an action to be performed by the set of approved assets.3. The method of wherein the personalized direct communication to the owner is an email.4. The method of wherein the email to the owner utilizes an SMTP/POP infrastructure.5. The method of wherein the set of communications to the set of approved assets is a set of emails claim 1 , each email to one of the set of approved assets.6. The method of further comprising receiving an email from each of the set of approved assets indicating whether the task was ...

Подробнее
05-03-2013 дата публикации

Method and system for managing a shared electronic mail account

Номер: US0008392512B2

A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.

Подробнее
02-04-2013 дата публикации

Method, system and computer program for installing software products based on package introspection

Номер: US0008413134B2

A method for facilitating the management of a software distribution process is proposed. The method provides the possibility of performing an introspection of a software package (which is used for installing a corresponding software product) before its application on each endpoint. The introspection evaluates any run-time parameters that condition the execution of the actions specified in the software package; in this way, it is possible to determine a list of the actions that will be actually executed during the application of the software package. This list is displayed on a monitor of the endpoint, so as to allow its user to decide whether the application of the software package should be accepted or not. Alternatively, the list of those actions can be collected on a distribution server (from multiple endpoints), to determine an impact of the distribution process on the whole system before its execution.

Подробнее
21-01-2010 дата публикации

METHOD AND SYSTEM FOR LOCATION AWARE ELECTRONIC COMMUNICATION

Номер: US20100017482A1

A method and system for location aware electronic communication. One implementation involves receiving an electronic communication at a receiving client, upon detecting that the communication includes location-based information, retrieving criteria for processing the communication from a location profile, and automatically processing the communication utilizing the retrieved criteria and the location-based information from the communication.

Подробнее
18-02-2010 дата публикации

METHOD FOR TRACKING LOCAL STORAGE OF WEB PAGES

Номер: US20100043011A1

The present disclosure is directed to a method for tracking client side storage of a web page. The method may comprise providing a script in the web page for responding to a save operation; responding to the save operation initiated in a browser; sending a set of tracking information to a HTTP server providing the web page and/or a particular resource to be stored; forwarding the set of tracking information to an application server; and storing the set of tracking information.

Подробнее
03-12-2009 дата публикации

Method and System For Localizing A Software Product

Номер: US20090299726A1

Localizing a software product is improved. A plurality of attributes of a plurality of interface elements according to a specified type of user interface are retrieved. Responsive to user input, one or more countries in which the software product is to be localized are specified. An interface element for the user interface is selected. From the attributes of the selected interface element, it is determined whether the interface element is consistent with the specified countries. If not, an alert on a computer display is displayed, in the event the selected interface element is not consistent with the countries specified by the user. The invention also calculates a cost of localizing the selected interface element, wherein the projected cost of localizing the user interface is incremented with the cost of localizing the selected interface element. An alert for the projected cost of localizing the user interface is displayed on the computer display.

Подробнее
17-01-2012 дата публикации

Method, system and computer program for configuring firewalls

Номер: US0008099588B2

A solution is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system includes a set of security applications (such as firewalls), which are adapted to control communications of the entities. A corresponding method starts with the step of determining a target configuration of the security applications for allowing execution of the software product on the entities. A software package (or more), being adapted to enforce the software product and the target configuration, is then built. The method continues by distributing the software package in the system, so as to cause the application of the software package for enforcing the software product on each entity and the target configuration of each security application.

Подробнее
08-01-2015 дата публикации

Managing Virtual Machine Policy Compliance

Номер: US20150012920A1
Принадлежит:

A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule. 1. A method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule , the method comprisingdetecting non-compliance of the virtual machine with the compliance rule using a compliance agent deployed on the virtual machine;detaching the virtual machine from a network;creating a copy of a compliance repository volume on a requested disk resource for the virtual machine;mounting the requested disk resource, having stored thereon the copy of the compliance repository volume, to the virtual machine;applying a remediation action to the virtual machine using content of the copy of the compliance repository volume to restore compliance of the virtual machine; andtriggering, by the compliance agent, a compliance scan to ensure that the virtual machine complies with the compliance rule.2. The method according to claim 1 , further comprising:detaching the requested disk resource having stored the copy of the compliance repository volume from the virtual machine.3. The method according to claim 1 , further comprising:removing the copy of the compliance repository volume on the requested disk resource.4. The method according to claim 3 , wherein the removing the copy of the compliance repository volume comprises releasing the requested disk resource.5. The method according to further comprising:attaching the virtual machine ...

Подробнее
02-09-2014 дата публикации

Method and apparatus for controlling multiple systems in a low bandwidth environment

Номер: US0008825739B2

A method of controlling one or more client systems by means of one or more server systems, comprising the steps of identifying a set of system control actions that occur as a result of carrying out a particular function on the server system, which function is required to be replicated on the one or more client systems; and sending the set of system control actions to any client system which is connected to the server system to configure the client system to carry out the system control actions and thereby causing the client system to carry out the particular function on the client system.

Подробнее
25-06-2009 дата публикации

VEHICLE-MOUNTED TOOL FOR MONITORING ROAD SURFACE DEFECTS

Номер: US20090164063A1

A vehicle-mountable system is provided for monitoring road surface defects. The system may include a detector to detect a surface defect in a road surface along which a vehicle is traveling. A positioning system may determine an instant location of the vehicle, and a repository may store a location of the surface defect with reference to the instant location. A controller unit may receive and compare the instant location with the location of the surface defect to identify an imminent surface defect encounter. The controller unit may also identify guidance instructions to minimize an effect of the imminent surface defect encounter. Finally, an interface may relay the guidance instructions to the vehicle.

Подробнее
09-04-2009 дата публикации

ARCHIVING TOOL FOR MANAGING ELECTRONIC DATA

Номер: US20090094297A1

A method for storing electronic data in a network including a server and at least two client machines. Electronic data may be archived in a predetermined location of a client machine. A local archiving list may be generated on the client machine and may include descriptive properties of the electronic data, as well as the predetermined location. The local archiving list may be transmitted from the client machine to the server to generate a global archiving list, which may then be transmitted to any other client machines in communication with the server. In this manner, each client machine in the network may store the location and descriptive properties of the archived electronic data to facilitate electronic data recovery.

Подробнее
21-01-2010 дата публикации

METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION

Номер: US20100017874A1

A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized.

Подробнее
07-01-2016 дата публикации

DYNAMIC PRESENTATIONS MANAGEMENT

Номер: US20160004400A1
Принадлежит: International Business Machines Corp

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.

Подробнее
20-04-2021 дата публикации

Control of activities executed by endpoints based on conditions involving aggregated parameters

Номер: US0010985987B2

A method and system. One or more local parameters are collected from one or more corresponding endpoints. Each policy of one or more policies includes an indication of one or more activities for execution on the corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on at least one of the one or more local parameters. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters.

Подробнее
12-05-2016 дата публикации

Management of a Computing System with Dynamic Change of Roles

Номер: US20160134463A1
Принадлежит:

A solution for managing a computing system comprising a plurality of client computing machines to be managed and at least one server computing machine for controlling the managing of the client computing machines, wherein each client computing machine has at least one of a plurality of roles in a deployment infrastructure for deploying management data from said at least one server computing machine to the client computing machines. A corresponding method comprises monitoring one or more operative parameters of each client computing machine against one or more reference policies, detecting a non-compliance of the operative parameters to the reference policies, and changing the role of at least one of the client computing machines in response to the non-compliance of the operative parameters to the reference policies for restoring a compliance thereto. 1. A method for managing a computing system comprising a plurality of client computing machines to be managed and at least one server computing machine for controlling the managing of the client computing machines , each client computing machine having at least one of a plurality of roles in a deployment infrastructure for deploying management data from said at least one server computing machine to the client computing machines , wherein the method comprises:monitoring one or more operative parameters of each client computing machine against one or more reference policies;detecting a non-compliance of the operative parameters to the reference policies; andchanging a role of at least one of the client computing machines in response to the non-compliance of the operative parameters to the reference policies for restoring a compliance thereto.2. The method according to claim 1 , wherein each client computing machine is configured to be changeable between a relay role for deploying the corresponding management data on one or more other client computing machines being child client computing machines depending thereon claim 1 ...

Подробнее
26-06-2008 дата публикации

Method and System for Network Terminal Identification

Номер: US20080155083A1
Принадлежит:

A method of dynamically composing or updating electronic contact lists, such as mailing lists, on the basis of proximity to a particular point or user. By means of this method a user can be offered the option of addressing a method to all “nearby” users. Proximity may be determined with reference to network hardware or other resources associated with each user, for example, LAN segments or wireless access points.

Подробнее
13-07-2006 дата публикации

Method and system for sharing information in a network of computers

Номер: US20060155821A1
Принадлежит:

A method and a corresponding system are proposed for sharing information in a network of computers. In the method of the invention, a shortcut (410a,410b) is defined on the desktop (405a,450b) of each computer; the shortcut is associated with an editor, which is invoked passing the name of a shared file (420a,420b) as an argument. Whenever a user needs to transfer information from a first computer to a second computer of the network, the user copies/cuts a block of information into a clipboard of the first computer. The shared file (420a) is opened calling the corresponding shortcut (410a), the block of information is pasted into the shared file from the clipboard, and the file is saved. The user then moves to the second computer, and opens again the shared file (420b) calling the same shortcut (410b). The content of the shared file is copied/cut into a clipboard of the second computer, so as to be available to be pasted to the desired position in a selected window (415b).

Подробнее
30-07-2009 дата публикации

ENHANCED MESSAGING COLLABORATION

Номер: US20090191849A1

The capabilities of a collaboration messaging system are extended through so that a user can be contacted, or at least notified of incoming messages, when the user is away from his own messaging client computer but is near another messaging client computer. The proximity of a user to a messaging client computer other than his own is inferred from the detection of a wireless communications device (e.g., a Bluetooth-enabled cellular phone) associated to the user. The association is recorded in a user profile set up by the user and stored in the collaboration messaging system. If a wireless communications device is detected proximate to a messaging client computer, a search is made of stored user profiles, each of which associates a particular wireless communication with a particular user. If a profile exists for the detected wireless communication device, it is retrieved and a set of actions defined in the user profile is implemented. The defined actions include sending messages addressed ...

Подробнее
25-12-2012 дата публикации

Display monitor electric power consumption optimization

Номер: US0008339429B2

Controlling electrical power consumption of a display monitor screen involves grouping screen pixels into different resolution cells, detecting display of one or more windows on the screen, and selectively controlling the cells by providing power only to the pixels in cells corresponding to one or more windows of interest to the user, and reducing power to pixels in remaining cells.

Подробнее
22-09-2015 дата публикации

Dynamic presentations management

Номер: US0009141620B2

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.

Подробнее
18-08-2015 дата публикации

Managing cellular phone calls

Номер: US0009112965B2

A mechanism is disclosed for managing phone calls on phone devices used by the employee of a company. When the user wants to give a call, a new plugin in the phone device interprets an attribute value added by the phone device user to each phone number in order to categorize the call. The cell phone user enters a profile describing his call accounting information. A call management plugin computes a prefix for user personal calls which will be adapted to the user location. The call management plugin at the end of the call tags the call information as a personal call or business call. The phone device sends the tagged call information to a remote server of the company, which consolidates billing information received from the phone operators with the tagged call information.

Подробнее
26-07-2012 дата публикации

Extending Memory Capacity of a Mobile Device using Proximate Devices and Unicasting

Номер: US20120191812A1

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. 1. A method for downloading a file to a device , comprising steps of:receiving, at the device, a first portion of the file, with the file having a greater size than available memory within the device; andsending, by the device, the first portion of the file to another device in physical proximity to the device while the downloading of the file to the device is still pending.2. The method of claim 1 , further comprising:the device retrieving, from each of a plurality of client devices including the another device, device characteristics for each of the plurality of client devices; andthe device sending the device characteristics to a server.3. The method of wherein the device characteristics sent to the server include an available amount of memory for each of the plurality of devices.4. The method of claim 2 , further comprising:determining whether any of the plurality of devices is a session initiated protocol (SIP) enabled device; andfor each of the plurality of devices that are determined to be an SIP enabled device, registering the SIP ...

Подробнее
17-01-2012 дата публикации

Secure agent-less enterprise infrastructure discovery

Номер: US0008099767B2

Mechanisms for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store.

Подробнее
09-10-2008 дата публикации

Method, System and Computer Program for Automating Configuration of Software Applications

Номер: US20080250493A1
Принадлежит: International Business Machines Corp

A solution ( 300 ) is proposed for populating a policy file ( 320 ) in a Java environment automatically. For this purpose, there is provided a wrapper ( 325 ) for a security manager ( 315 )—in charge of controlling any access to protected resources. A generic Java application ( 310 ) is run in a test environment. Whenever a specific operation must be executed on a secured resource, the Java application submits a corresponding permission request to the wrapper (A 1 ). The wrapper forwards the permission request to the security manager (A 2 ), which verifies whether the required permission is available in the policy file (A 3 -A 4 ). The wrapper logs any denied permission (A 5 ); in any case, the wrapper always grants the required permission to the Java application (A 6 -A 7 ), so that its operation can continue without any problem. At the end of the running of the Java application, the logged missing permissions are added to the policy file (A 8 ).

Подробнее
18-09-2008 дата публикации

METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DISTRIBUTING SOFTWARE BASED ON AN E-MAIL SERVICE

Номер: US20080228889A1

A solution for distributing software products is proposed. Typically, a software distribution infrastructure controls the deployment of software packages to selected endpoints; each software package includes commands and resource images, which are used to install a corresponding software product. For this purpose, an e-mail service is exploited. Particularly, a new e-mail message is created for each software package to be deployed; the software package is embedded into the e-mail message as an attachment and tags for controlling the software distribution process (such as a desired target state of the software package) are inserted into its body section. A plug-in of a mail client on each endpoint receives that e-mail message; the software package is then extracted and passed to an application engine, which controls its application according to the target state indicated by the corresponding control tag.

Подробнее
12-02-2013 дата публикации

Integration of collaboration systems in an instant messaging application

Номер: US0008375309B2

A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread ...

Подробнее
19-05-2005 дата публикации

Software distribution application supporting verification of external installation programs

Номер: US20050108704A1

The present invention relates to a software distribution application, which is used to deploy software products to multiple endpoints. The software distribution application supports either bundled packages (detailing all the operations to be executed on the endpoints) or native packages (including a simple command for launching an external installation program); an introspection attribute is added to discriminate the two types of packages. Whenever an endpoint receives (314) a native package, a snapshot of the endpoint is taken (332) using a reverse engineering tool (such as AutoPack). The desired software product is then installed launching (334) the corresponding external installation program. As soon as the installation has been completed, a further snapshot of the endpoint is taken (336). A reversed package is built (338-339) according to a comparison between the two snapshots. The reversed package is then used to verify whether the actions executed on the endpoint at the installation ...

Подробнее
24-07-2012 дата публикации

Method, system and computer program for deploying software packages with increased security

Номер: US0008230222B2

A software distribution method ( 300 ) with security add-on is proposed. Particularly, any software package to be deployed to selected target endpoints is encrypted ( 312 - 315 ) with a symmetric key (generated dynamically). The symmetric key is in turn encrypted ( 318 - 321 ) with a public key of each target endpoint. A multi-segment software package (embedding the encrypted software package and the encrypted symmetric keys) is then deployed ( 324 - 336, 360 ) to all the target endpoints. In this way, each target endpoint can decrypt ( 343 - 348 ) the encrypted symmetric key with a corresponding private key; it is then possible to decrypt ( 363 - 366 ) the encrypted software package with the symmetric key so obtained. As a result, the endpoint is able to apply ( 369 ) the decrypted software package. Therefore, the application of the software package can be restricted to the desired target endpoints only.

Подробнее
16-10-2012 дата публикации

Managing document access

Номер: US0008291471B2

Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.

Подробнее
18-06-2009 дата публикации

DEPLOYMENT TOOL FOR INCREASING EFFICIENCY IN A PRODUCTION COMPUTER SYSTEM

Номер: US20090158266A1

A method is presented for deploying a component onto a production computer system. The method may include identifying one or more alterations associated with deployment of a first application onto a first computer system, where the first application on the first computer system is substantially similar to a second application on a second computer system. Embodiments may further include generating a command and an object corresponding to the alteration, where the command and the object are generated as a function of the first application. The alteration may then be replicated on the second application of the second computer system by executing the command and the object on the second computer system.

Подробнее
19-07-2018 дата публикации

CONTROL OF ACTIVITIES EXECUTED BY ENDPOINTS BASED ON CONDITIONS INVOLVING AGGREGATED PARAMETERS

Номер: US20180205610A1
Принадлежит:

A method and system. One or more policies is stored. Each policy includes activities for execution on corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on one or more local parameters of a corresponding group of endpoints. The local parameters are collected from the corresponding endpoints. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters. 1. A method , said method comprising:storing, by one or more processors of a computer system, one or more policies, each policy comprising an indication of one or more activities for execution on one or more corresponding endpoints, at least one of the activities of the policies being conditioned by a condition based on one or more aggregated parameters, each aggregated parameter depending on one or more local parameters of a corresponding group of a plurality of the endpoints;collecting, by the one or more processors, the local parameters from the corresponding endpoints;aggregating, by the one or more processors, the local parameters into the aggregated parameters;distributing, by the one or more processors, each aggregated parameter at least to the corresponding endpoints of each policy comprising any activity conditioned on the aggregated parameter; andsending, by the one or more processors, at least the corresponding policies to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of ...

Подробнее
26-07-2016 дата публикации

Populating a software catalogue with related product information

Номер: US0009400992B2

A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.

Подробнее
09-04-2019 дата публикации

Managing assets

Номер: US0010255569B2

A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.

Подробнее
03-11-2016 дата публикации

Populating a Software Catalogue with Related Product Information

Номер: US20160321068A1
Принадлежит:

A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products. 1. A method of populating a software catalogue with software product identifiers corresponding to software products being discovered on a plurality of data processing systems by a system management application , the method including the steps of:scanning, by the system management application, the file systems of the plurality of data processing systems to detect the occurrence of a set of files indicative of a software product being installed on a data processing system, the set of files including at least one manifest file containing management interface information on at least one referenced software product usable by the system management application to control operation of the at least one referenced software product;determining, by the system management application, a product signature associated to the at least one referenced software product using the information of the manifest file;storing, by the system management application, the product signature and an associated software product identifier of the referenced product on the software catalogue; andcontrolling, by the system management application, the at least one reference software product using the management interface information.2. The method of claim 1 , wherein the at least one manifest file includes an XML document.3. The method of wherein the at ...

Подробнее
05-11-2009 дата публикации

LICENSE MANAGEMENT FACILITY

Номер: US20090276856A1

A method is presented for managing resource licensing. The method may include detecting an installed web server and/or application server to identify a container installation path, and identifying a resource associated with the container installation path. A resource installation path and a licensing structure may be determined for the resource. The method may further include building an application representation associating the resource installation path with the licensing structure, and determining the instances of resource use. The instances of resource use may be compared to the application representation to determine a licensing state for the resource.

Подробнее
08-07-2010 дата публикации

INTEGRATION OF COLLABORATION SYSTEMS IN AN INSTANT MESSAGING APPLICATION

Номер: US20100174999A1

A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread ...

Подробнее
23-02-2017 дата публикации

DYNAMIC PRESENTATIONS MANAGEMENT

Номер: US20170052663A1
Принадлежит:

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software. 125- (canceled)26. A computer-implemented method for electronically presenting a presentation including multiple slides , each slide haying at least one presentation constraint parameter assigned thereto , comprising:gathering metadata regarding the presentation;modifying, based upon the gathered metadata, one of the at least one presentation constraint parameter; andmodifying, automatically and based upon the modified at least one presentation constraint parameter, a content contained within one of the multiple slides.27. The method of claim 26 , further comprisingrearranging, automatically, the multiple slides based upon the gathered metadata.28. The method of claim 27 , whereinthe rearranging occurs contemporaneously with the presentation.29. The method of claim 26 , wherein an audience of the presentation,', 'a location of the presentation, and', 'a schedule of the presentation., 'the gathered metadata includes at least one of information regarding'}30. The method of claim 26 , whereinthe gathered metadata includes feedback from an audience of the presentation.31. The method of claim 26 , whereinthe feedback is from an email associated with the presentation.32. The method of claim 30 , wherein activating a mobile communication device to request ...

Подробнее
01-03-2007 дата публикации

METHOD, SYSTEM AND COMPUTER PROGRAM FOR DEPLOYING SOFTWARE PACKAGES WITH INCREASED SECURITY

Номер: US20070047735A1
Принадлежит:

A software distribution method (300) with security add-on is proposed. Particularly, any software package to be deployed to selected target endpoints is encrypted (312-315) with a symmetric key (generated dynamically). The symmetric key is in turn encrypted (318-321) with a public key of each target endpoint. A multi-segment software package (embedding the encrypted software package and the encrypted symmetric keys) is then deployed (324-336, 360) to all the target endpoints. In this way, each target endpoint can decrypt (343-348) the encrypted symmetric key with a corresponding private key; it is then possible to decrypt (363-366) the encrypted software package with the symmetric key so obtained. As a result, the endpoint is able to apply (369) the decrypted software package. Therefore, the application of the software package can be restricted to the desired target endpoints only.

Подробнее
08-07-2010 дата публикации

DYNAMIC NETWORK CONFIGURATION FOR A NETWORK DEVICE

Номер: US20100172266A1

A network services profile can be associated with a unique device identifier, such as a MAC address, rather than an IP address. When a network device is connected to a network, a network management server can recognize the unique device identifier and retrieve the network services profile. The network management server can automatically enables network services indicated in the network services profile.

Подробнее
13-12-2016 дата публикации

Dynamic presentations management

Номер: US0009519410B2

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.

Подробнее
22-05-2014 дата публикации

Managing Assets

Номер: US20140143293A1

A system or computer usable program product for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. 19-. (canceled)10. A computer usable program product comprising a computer usable storage medium including computer usable code for use in managing assets , the computer usable program product comprising code for performing the steps of:receiving a task across a network to be performed by a set of assets;identifying a subset of assets owned by an owner;transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task; andresponsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.11. The computer usable program product of wherein the task includes a description of the task claim 10 , a set of relevance criteria for the task claim 10 , and an action to be performed by the set of approved assets.12. The computer usable program product of wherein the personalized direct communication to the owner is an email.13. The computer usable program product of wherein the email to the owner utilizes an SMTP/ ...

Подробнее
29-12-2015 дата публикации

Integration of collaboration systems in an instant messaging application

Номер: US0009225674B2

A user of an instant messaging application may interact with instant messaging contacts in other collaboration applications (e.g., e-mail, calendar applications, etc.). IM conversations may relate to information in the collaboration applications. For example, an employee may send an e-mail containing marketing data to his manager and wishes to discuss the data further. The employee sends an IM to the manager referencing the data. The manager should read the e-mail before responding, but the manager may not know that she received the e-mail. Information from a plurality of collaboration applications can be integrated into an instant messaging application. A collaboration integration unit can collect and associate information from the collaboration applications with instant messaging contacts and provide suggestions based on the information. In the previous example, the manager's instant messaging application collects information from an e-mail application and indicates that she has an unread e-mail from the employee.

Подробнее
18-06-2015 дата публикации

DETERMINING RULES FOR PARTITIONING INTERNET CONNECTION BANDWIDTH

Номер: US20150172216A1

Embodiments of the present invention disclose a computer implemented method, computer program product, and system for determining rules for partitioning internet connection bandwidth. In one embodiment, in accordance with the present invention, the computer implemented method includes the steps of identifying static bandwidth partitioning policies that correspond to a cluster of users, wherein the static bandwidth partitioning policies are based on time schedules, quality of service requirements, an amount of internet connection bandwidth paid for by a user, and proportional quotas of internet connection bandwidth, identifying historical bandwidth usage data corresponding to the cluster of users, and determining bandwidth partitioning rules for the cluster of users based on the identified static bandwidth partitioning policies and identified historical bandwidth usage data. In another embodiment, the method further includes the step of applying the determined bandwidth partitioning rules to the cluster of users. 17-. (canceled)8. A computer program product for determining rules for partitioning internet connection bandwidth , including one or more computer-readable storage media and program instructions stored on at least one of the one or more storage media , wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to carry out the acts of:identifying static bandwidth partitioning policies that correspond to a cluster of users, wherein the static bandwidth partitioning policies are based on time schedules, quality of service requirements, an amount of internet connection bandwidth paid for by a user, and proportional quotas of internet connection bandwidth;identifying historical bandwidth usage data corresponding to the cluster of users; anddetermining bandwidth partitioning rules for the cluster of users based on the identified static bandwidth partitioning policies and identified historical ...

Подробнее
01-09-2015 дата публикации

Software license reconciliation facility

Номер: US0009122843B2

A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.

Подробнее
16-11-2006 дата публикации

Method, System and Computer Program For Installing Software Products Based On Package Introspection

Номер: US20060259904A1
Принадлежит:

A method (300) for facilitating the management of a software distribution process is proposed. For this purpose, the method provides the possibility of performing (333-339) an introspection of a software package (which is used for installing a corresponding software product) before its application on each endpoint. The introspection evaluates (333) any run-time parameters that condition the execution of the actions specified in the software package; in this way, it is possible to determine (336-339) a list of the actions that will be actually executed during the application of the software package. This list is displayed (339) on a monitor of the endpoint, so as to allow its user to decide (345) whether the application of the software package should be accepted or not. Alternatively, the list of those actions can be collected (357-366) on a distribution server (from multiple endpoints), so as to determine (375) an impact of the distribution process on the whole system before its execution ...

Подробнее
01-08-2017 дата публикации

Extending memory capacity of a mobile device using proximate devices and multicasting

Номер: US0009723100B2

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.

Подробнее
28-05-2013 дата публикации

Monitoring road surface conditions

Номер: US0008451140B2

Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage.

Подробнее
09-10-2008 дата публикации

METHOD AND SYSTEM FOR POPULATING A SOFTWARE CATALOGUE WITH RELATED PRODUCT INFORMATION

Номер: US20080250038A1
Принадлежит:

A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.

Подробнее
28-01-2010 дата публикации

METHOD AND SYSTEM FOR DISPLAY MONITOR ELECTRIC POWER CONSUMPTION OPTIMIZATION

Номер: US20100020092A1

A method and system for controlling electrical power consumption of a display monitor screen, is provided. One implementation involves grouping screen pixels into different resolution cells, detecting display of one or more windows on the screen, and selectively controlling the cells by providing power only to the pixels in cells corresponding to one or more windows of interest to the user, and reducing power to pixels in remaining cells.

Подробнее
04-07-2017 дата публикации

Managing virtual machine policy compliance

Номер: US0009697025B2

A method for managing virtual machine policy compliance. The method for restoring compliance of a virtual machine found to be non-compliant to a compliance rule may comprise detecting non-compliance of a virtual machine using a compliance agent, detaching the virtual machine from a network, creating a copy of a compliance repository volume, mounting the newly requested disk resource having stored the copy of the compliance repository volume, applying a remediation action to the virtual machine, and triggering by the compliance agent a compliance scan for ensuring that the virtual machine complies to the compliance rule.

Подробнее
20-09-2011 дата публикации

Automating configuration of software applications

Номер: US0008024564B2

A solution is proposed for populating a policy file in a Java environment automatically. For this purpose, there is provided a wrapper for a security manager in charge of controlling any access to protected resources. A generic Java application is run in a test environment. Whenever a specific operation must be executed on a secured resource, the Java application submits a corresponding permission request to the wrapper. The wrapper forwards the permission request to the security manager, which verifies whether the required permission is available in the policy file. The wrapper logs any denied permission. In any case, the wrapper always grants the required permission to the Java application, so that its operation can continue without any problem. At the end of the running of the Java application, the logged missing permissions are added to the policy file.

Подробнее
27-01-2009 дата публикации

Method and system for selective route search on satellite navigators

Номер: US0007483786B1

A method of operating a motor vehicle satellite navigation system using a motor vehicle's structure and characteristic information to calculate a best route to a desired destination. The method includes operating a graphical user interface (GUI), presenting display images for receiving input data for the desired destination and receiving satellite position data, and calculating a current location of the motor vehicle. The GUI presents a display image requesting motor vehicle structure and characteristic information. The method includes calculating and updating current best routes to a desired destination using map and POI databases comprising geographic coordinate grid and point of interest information from the current location and motor vehicle structure and characteristic information. The motor vehicle structure and characteristic information reflects static vehicle structure and characteristics such as size, fuel type, engine efficiency and fuel capacity, and dynamic information such as current fuel level and real-time traffic and road condition information.

Подробнее
07-01-2010 дата публикации

METHOD AND SYSTEM FOR SECURE AGENT-LESS ENTERPRISE INFRASTRUCTURE DISCOVERY

Номер: US20100005516A1

A method and system for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store.

Подробнее
24-07-2008 дата публикации

METHOD AND SYSTEM FOR MANAGING A SHARED ELECTRONIC MAIL ACCOUNT

Номер: US20080177850A1

A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.

Подробнее
06-01-2009 дата публикации

System and method to handle phone line services during modem dial-up connection

Номер: US0007474745B1

A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party. A reporting notification message is further transmitted by the ...

Подробнее
08-07-2010 дата публикации

Personal Resources Organizer with Calendar Interface and Object Detection

Номер: US20100174759A1

A personal resources organizer with calendar interface and object detection is provided. The personal resources organizer monitors personal resources for use with a scheduled event by identifying one or more personal resource objects present in a container and retrieving a list of required personal resource objects for an event scheduled in an electronic schedule. The identified one or more personal resource objects are compared with the list of required personal resource objects for the schedule event and a report of a readiness for the scheduled event is generated based on results of the comparison. The report may then be output for use by a user in determining the user's readiness or preparedness for the scheduled event such that the user may make modifications to the personal resource objects in the container and/or the list or required personal resource objects.

Подробнее
05-11-2013 дата публикации

Software distribution method and system with automatic prerequisite installation

Номер: US0008578371B2

A software distribution method (300) is proposed. The solution of the invention relates to the deployment (from a source host to selected endpoints) of main packages that require one or more prerequisite packages. In this case, the source host builds (304-326) and transmits (330-332) a multi-segment distribution structure that embeds the main package and any prerequisite package that is not available on at least one of the endpoints. Each endpoint receiving the distribution structure only installs (336-360) the prerequisite packages that are not available on the endpoint. The main package can then be installed (362-366) correctly (with the required configuration of the endpoint).

Подробнее
14-06-2012 дата публикации

Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Multicasting

Номер: US20120151067A1

An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. 110-. (canceled)11. A data processing system for downloading a file , the data processing system comprising a data processor coupled to a memory , wherein the data processor is operable for executing instructions in the memory to perform steps of:receiving device properties associated with each device of a plurality of devices;partitioning the file into a plurality of file extents based upon the device properties;establishing a communication session with the each device to form a plurality of communication sessions; andsending the plurality of file extents to the plurality of devices using the plurality of communication sessions.12. The data processing system of claim 11 , wherein the device properties associated with each device includes an amount of memory available for use within the each device.13. The data processing system of claim 12 , wherein the file is partitioned into the plurality of file extents such that a size of a given file extent for a given device of the plurality of devices is less than or equal to the amount of memory ...

Подробнее
21-06-2012 дата публикации

Method and system for dynamic presentations management

Номер: US20120159332A1
Принадлежит: International Business Machines Corp

A method for dynamic presentations management of electronic presentations including multiple slides, wherein each slide has at least one presentation constraint parameter assigned thereto, and wherein a presentation software is used for generating and displaying the presentation can include gathering metadata regarding the presentation by the presentation software, evaluating the metadata regarding the presentation and determining at least one presentation constraint parameter by the presentation software, and automatically arranging and/or selecting slides and/or modifying a content of slides according to the determined at least one presentation constraint parameter to be presented by use of the presentation software.

Подробнее
22-07-2014 дата публикации

Network terminal identification

Номер: US8788642B2
Принадлежит: International Business Machines Corp

A method of dynamically composing or updating electronic contact lists, such as mailing lists, on the basis of proximity to a particular point or user. By means of this method a user can be offered the option of addressing a method to all “nearby” users. Proximity may be determined with reference to network hardware or other resources associated with each user, for example, LAN segments or wireless access points.

Подробнее
07-10-2014 дата публикации

On-demand network connection

Номер: US8856348B2
Принадлежит: International Business Machines Corp

An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection.

Подробнее
23-12-2004 дата публикации

A method and system for sharing information in a network of computers

Номер: WO2004111846A1

A method and a corresponding system are proposed for sharing information in a network of computers. In the method of the invention, a shortcut (410a, 410b) is defined on the desktop (405a, 450b) of each computer; the shortcut is associated with an editor, which is invoked passing the name of a shared file (420a,420b) as an argument. Whenever a user needs to transfer information from a first computer to a second computer of the network, the user copies/cuts a block of information into a clipboard of the first computer. The shared file (420a) is opened calling the corresponding shortcut (410a), the block of information is pasted into the shared file from the clipboard, and the file is saved. The user then moves to the second computer, and opens again the shared file (420b) calling the same shortcut (410b). The content of the shared file is copied/cut into a clipboard of the second computer, so as to be available to be pasted to the desired position in a selected window (415b).

Подробнее
01-11-2009 дата публикации

Multimedia article management facility

Номер: TW200945101A
Принадлежит: Ibm

Подробнее
18-03-2010 дата публикации

Method and system for dynamic contact information management in electronic communication devices

Номер: WO2010028871A1

A method and system for user contact information in electronic devices is provided. One implementation involves detecting a change in a user contact information at a first electronic device, determining effective date of the change in the contact information, storing the contact information change and effective date in a memory store, automatically communicating the contact information change and effective date to a second electronic device, and applying the received contact information change to a contact information list in a memory store of the second device, on or after the effective date.

Подробнее
09-07-2024 дата публикации

Shaving razor hanger

Номер: USD1033965S1
Принадлежит: Gillette Co LLC

Подробнее
09-09-2009 дата публикации

Electrical power usage controller

Номер: EP2098013A1
Принадлежит: International Business Machines Corp

A solution is proposed for an integrated system which tries to prevent and manage power break down in home electrical system with an interaction between the appliances or the electricity points within the house and a server controlling the system. A server (105) is connected to the meter (201) and to a plurality of agents (110). In a state of the art home electrical system the device (105) provides a new functionality which can range from a mere alerting service to a proper control and management of the electricity consumption within the house. Server (105) could be located anywhere between the main meter/switch, normally provided by the electrical distribution company, and the household appliances or, more in general, the electrical devices to be managed. Its preferred location is however inside the apartment itself, near the remainder of the main internal switches. Connected to the Server (105) there are several clients which are associated to one or more switches or plugs.

Подробнее