Abstract: The example embodiments are directed to an application and a system capable of identifying levels of secure data within electronic message content. In one example, the method includes at least one of: receiving an electronic message from a user device, the electronic message including message content and at least one recipient, determining that the message content includes a plurality of different levels of secure content corresponding to a plurality of different authentication levels, shielding each portion of the secure content, and providing an indicator indicating a level of authentication associated with each respective shielded portion of secure content from among the plurality of different levels of authentication, and transmitting the electronic message to the at least one recipient including the shielded secure content and the indications of the plurality of different levels of authentication.
Abstract: A location based assistant is provided on client device. The client device may activate a business-oriented operation system or a personal-oriented operating system based on a location of the apparatus, a time of day, or a user defined setting. Upon activation of the business-oriented operation system or the personal-oriented operating system, client device may interact and communicate with a business or personal calendar of a user, business or personal messages of the user, business or personal activities of the user.
Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: Message-based keyword, phrase, and/or object processing and resource allocation may perform functionality related to the message data, such as keywords, phrases, and/or objects (e.g., images, video, etc.). Based on the keywords, phrases, and/or objects, emails may be modified, project plans may be updated, calendar events may be created, and/or various notifications may be sent to allocate and notify human resources accordingly.
Abstract: An operation comprising one or more of loading one or more primary applications and including said one or more primary applications in a synchronization point, halting execution of said one or more primary applications upon arriving at said synchronization point, triggering a migration of said one or more primary applications to one or more backup applications, wherein said migration starts when the execution of said one or more primary applications are halted at said synchronization point.
Abstract: A system, method, and computer readable medium for maintaining mappings between resources inside an isolated environment and outside the isolated environment for one or more applications. The system may include a plurality of lists of resources requested by the one or more applications during installation and while executing, and a corresponding lists of resources inside the isolated environment. The system may also include a list of resource exceptions, wherein the mappings between resources as requested by the applications and their corresponding values in the isolated environment are maintained subject to the list of exceptions.
Abstract: A method, system and program product for remote scheduling of at least one job to run on a plurality of computers in a computer network. The job scheduler enables selection of a domain that includes at least a subset of the computers on which the job is to run. A list of computers in the selected domain is automatically generated. The computers on which the job is to run can be selected from the generated list of computers. A configuration file is created for storing an identification of the selected domain and the job to be run on the selected computers in the domain.
Abstract: A voice encoder/decoder (vocoder) may provide receiving a voice sample and generating zero crossings of the voice sample in response to voice excitation in a first formant and creating a corresponding output signal. Additional operations may include dividing the output signal by two, and sampling the output signal at a predefined frequency such that a resulting combination uses half of a bit rate for an excitation and a remainder for short term spectrum analysis.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid touch event on a touch sensitive device. At least two touch events are received from a touch interface. The at least two touch events are combined if a time difference between each of the at least two touch events is less than a time threshold and a proximity between each of the at least two touch events is less than a proximity threshold. A valid touch event is determined if a combined pressure indicator of a combined touch event is greater than a pressure threshold.
Abstract: Code creation and revision requires optimal error detection and correction and collaboration among programmers. One example method of operation may include receiving and processing a comment associated with a first user profile, identifying a software code context of the comment based on a software code data file, identifying a number of other user profiles associated with the software code context of the comment, and transmitting request messages to the other user profiles to provide feedback regarding the software code context of the comment.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid sequence of touch events on a touch sensitive device. A first sequence of touch events is received, a proximity between any two touch events of the first sequence of touch events being greater than a proximity threshold. A second sequence of touch events is received. The touch events from the first and the second sequence are combined if a time difference between the first and the second sequence of touch events is below a time threshold and a proximity between the first and the second sequence of touch events is less than the proximity threshold. A valid sequence of touch events is determined if a combined pressure of the first and the second sequence of touch events is greater than a pressure threshold.
Abstract: A method, apparatus and non-transitory computer readable storage medium, in one embodiment, associating at least one autonomous transport and at least one user, determining at least one characteristic of said at least one user based on at least one of at least one user search history and at least one user preference selection, determining at least one user location of said at least one autonomous transport and querying at least one adjacent entity based at least on said determined at least one characteristic within a predetermined range of said at least one user location.
Abstract: To enable tracking of a document's history, each time an electronic document is opened, an embedding module obtains one or more document history parameters. The document history parameters may include a MAC address or the computer used to open the document, an operating system, a file size of the document, time of opening the document, a user ID, etc. The embedding module encrypts the document history parameters and embeds them into the document, for example using steganography techniques.
Abstract: A system includes a multi-process application that runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: The embodiments describe an apparatus for accessing a remote object. The apparatus includes a transceiver. The transceiver is configured to transmit a Domain Name Service request of the remote object to a Domain Name Service server and receive a Domain Name Service response comprising an Internet Protocol of the remote object. The transceiver is further configured to connect to the Internet Protocol of the remote object based on the Domain Name Service response.
Abstract: A system, method, and computer readable medium for processing short message service terminations in a communication system featuring an IP-based femtocell system are provided. The femtocell system includes a base transceiver station and a Session Initiation Protocol to Internet Operating System adapter. The Session Initiation Protocol to Internet Operating System adapter conveys the depacketized message content to the base transceiver station which transmits the message content to the user equipment.
Abstract: A method and apparatus are disclosed that create an electronic form based on table data provided by Internet searching operations. One example may include determining at least one search term, querying, via a server, information provided by at least one network based on the search term, and copying at least one data table resulting from the information discovered during the querying operation. Additional operations may include parsing the at least one data table and storing the information in the server, displaying the data table to an end user so that the end user may select whether the data table should be included in the electronic form, and providing the user with the option to select and edit the contents of the data table. Upon the user's approval the data table may be copied into the electronic form.
Abstract: Disclosed are an apparatus and method of transmitting a message to a plurality of data recipients subscribed to receive information from a leader. An example method of operation may include transmitting a message intended for the plurality of data recipients, analyzing content of the message to determine a category corresponding to the content and matching the message with the category. The method may also include determining that only a subset of the plurality of data recipients are configured to receive the message based on the determined category, and transmitting the message to the subset of the plurality of data recipients.
Abstract: In order to manage stale data on a network of computer systems, a file harvester agent may be configured with a list of stale data files to be deleted. The file harvester agent may be deployed to the computer systems of a network. When executed in a computer system, the file harvester agent searches the file system of the computer system to locate any files or data indicated in the file list. Any located data files are deleted. Once the agent has finished processing the file list on a computer system, the agent can copy or replicate itself to other computer systems of the network in accordance with a pre-configured itinerary.
Abstract: An apparatus and method of adding thin client functionality are disclosed. One example method provides generating a call function directed to an electronic device and at least one peripheral device. The method also includes redirecting the call function to an auxiliary device, extracting payload data from information sent to the at least one peripheral device, discarding values outside a previously negotiated range from the extracted payload data, performing at least one of incrementing and decrementing the remaining values of the payload data to create a data subset, and redirecting the data subset to at least one other peripheral device resulting in output information being sent to the at least one other peripheral device.