Abstract: A method for notification of a change to content of a document may include providing a mechanism for selecting a certain portion of content of a document by a user that the user desires to receive notification of changes to the certain portion of content. The method may also include detecting a change to the certain portion of content being made by another user. The method may further include creating the notification of the change to the certain portion of content in response to a predefined condition being meet and transmitting the notification of the change to the certain portion of content to at least the user in response to the change to the certain portion of content of the document being saved by the other user.
Type:
Grant
Filed:
June 6, 2013
Date of Patent:
April 12, 2016
Assignee:
International Business Machines Corporation
Abstract: A server connected to a client terminal via a network, includes a conference room management unit that manages a conference room for holding a conference, and a medical image holding unit that holds the predetermined number of medical image data including medical image data linked to the conference, wherein the conference room management unit manages one state which is a conference live state and other states which are different from the one state as a conference room state.
Abstract: In some embodiments, electronic data may be automatically captured to provide a user with a universal Internet identity and e-mail address, comprehensive e-mail filtering and forwarding services, and e-receipt identification and data extraction. Detailed user e-mail preferences data stored at a central server may be selectively altered such that incoming correspondence is redirected in accordance with the user's preferences. Computer program code at the central server may parse incoming e-mail header information and data content, selectively extract data from identified types of correspondence, and forward the extracted data in accordance with the user's preferences. Additional computer program code may manipulate the extracted data in accordance with format requirements and display the manipulated data to a user in a desired format.
Abstract: One or more interactions between a first user and a second user of a social networking system are identified. Each respective interaction of the one or more interactions is scored based on a group score and a time penalty. The group score is based on the number of users in the respective interaction and the time penalty is based on a time between a current time and a time of a last interaction between the first user and the second user. A relationship ranking that measures the first user's affinity towards the second user is determined, where the relationship ranking comprises one or more interaction scores. An indicator representing the relationship ranking is sent to a client for display.
Type:
Grant
Filed:
November 14, 2013
Date of Patent:
February 23, 2016
Assignee:
Path Mobile Inc Pte. Ltd.
Inventors:
David B. Morin, Shawn D. Fanning, Dustin R. Mierau, Daniel S. Dofter, Matthew M. Matteson, Mark Lewandowski, Mary Ann Brennan, Daniel Trinh, Mallory Paine
Abstract: A hardware-assisted integrity monitor may include one or more target machines and/or monitor machines. A target machine may include one or more processors, which may include one or more system management modes (SMM). A SMM may include one or more register checking modules, which may be configured to determine one or more current CPU register states. A SMM may include one or more acquiring modules, which may be configured to determine one or more current memory states. A SMM may include one or more network modules, which may be configured to direct one or more communications, for example of one or more current CPU register states and/or current memory states, to a monitor machine. A monitor machine may include one or more network modules and/or analysis modules. An analysis module may be configured to determine memory state differences and/or determine CPU register states differences.
Type:
Grant
Filed:
August 22, 2014
Date of Patent:
February 23, 2016
Assignee:
George Mason Research Foundation, Inc.
Inventors:
Anup K. Ghosh, Kun Sun, Jiang Wang, Angelos Stavrou
Abstract: A method for sign-on and sign-out for a computer system. The method includes receiving a first sign-on request for the computer system and obtaining, from the first sign-on request, a first user identifier where the first user identifier corresponds to a first user for the computer system. The method then includes obtaining, from the first sign-on request, a first uniform resource locator (URL) and determining whether the first URL includes a first root name for the computer system. When a determination is made that the first URL includes the first root name for the computer system a first cookie associated with the first user is issued and a first sub-domain name is obtained from the first URL. Also, a second cookie may be issued associated with the first sub-domain name and, when the first cookie and the second cookie are issued, the first user may sign-on to the computer system. In one or more embodiments, the method may include receiving a sign-out request.
Type:
Grant
Filed:
August 28, 2012
Date of Patent:
February 23, 2016
Assignee:
Microsoft Technology Licensing, LLC
Inventors:
Sarat Chandra Subramaniam, Christian Roy, Venkatesh Veeraraghavan, Nicholas Carl Sturm, Titus Constantin Miron, Matthew Taylor Cohen
Abstract: In one embodiment, a geo-social networking system automatically tags one or more social contacts of a first user to a photo of the first user by ranking the social contacts based on spatial and temporal proximity to the first user, and in response to the first user's selection of one or more top ranked social contacts, associating the selected social contacts to the photo.
Abstract: A system for establishing a remote desktop connection between a client projector and a host computer, the client projector and the host computer being connected by a network. A private remote desktop service virtual channel is established between the host computer and the client projector. In the client projector, a processor initiates a remote desktop connection process, and completes a remote desktop connection to the host computer. The client projector receives keyboard and mouse events from the host computer across the private remote desktop service virtual channel. The keyboard or mouse events received by the client projector are injected into an operating system of the client projector. They are interpreted by a client application remote desktop connection as a valid input device event, and forwarded to the host computer to actuate a graphical user interface of a remote desktop session.
Abstract: The invention relates to a method for transmission of messages from a sender node to multiple destination nodes in a network in which: The same message is sent from the sender node to multiple destination nodes, and the destination node of a message returns an acknowledgment message to the sender node after receiving the message it comprises a step of the distribution, by the sender node, of the destination nodes into at least two groups of destination nodes according to a predetermined distribution criterion taking into account the to and fro travel time between the sending of the message and the receiving of the acknowledgment message from the destination node, and a step of sending of messages to destination nodes in the same group with a latency period between the sending of two successive messages to the same destination nodes of the same group, the latency periods, each specific to a group and defining the throughput rate of the group being different from one group to another.
Abstract: A network topology system for reducing the hardware links in a centrally-controlled network having a plurality of network switches and a plurality of centralized controllers controlling those switches. The global network of switches and controllers is broken up into domains, wherein a domain contains a subset of controllers and switches, and a switch in a domain is controlled by one or more controllers. In-band hardware links, which carry both data and control information, are used to connect the controllers and switches in a domain, and thereby reduce the number of hardware links from that used in networks which have separate hardware links for both data and control information.
Abstract: A method, system, and computer program product for transparent configuration of virtual hosts to support timestamping of documents that are processed in multiple time zones within an enterprise platform. Embodiments use network address translation and virtual host initialization techniques to configure a port listener such that the port listener receives IP packets from the network interface and uses the subnet's network address IP address to map to a time zone correspondence. When the identified time zone corresponds to a first time zone, then the port listener forwards the IP packet to a first virtual host process that has been initialized with a first time zone virtual time clock used for timestamping. When the identified time zone corresponds to a second time zone, the port listener forwards the IP packet to a second virtual host process that has been initialized with a second time zone virtual time clock used for timestamping.
Abstract: Methods and systems for social media cooperation, via allowing inter-social network communications between users of different networks is provided. The inter-social network communications may be facilitated by sending inter-social network communications in a format determined by a protocol that is used by the social networks agreeing to allow inter-social network communications.
Abstract: Disclosed is a hardware NFA cell array used to find matches to regular expressions or other rules in an input symbol stream. The cell array scans multiple symbols per clock cycle by comparing multiple symbol classes against multiple input symbols per cycle in parallel, signaling bundles of multiple transitions from parent cells to child cells and updating NFA state status by multiple steps. To retain high frequency operation, the cell array will not resolve transition chains from a first cell to a second cell to a third cell in a single cycle. When a chain is required, the cell array takes fewer steps in one cycle to break the chain into separate cycles. To detect multi-transition chains, each cell compares symbol classes to future symbols in advance and back-communicates future match positions to parent cells in the array as launch hazards.
Abstract: Described are a system and method for use by a computing device to transmit information over a communication medium. The computing device communicates over the medium according to a protocol stack having a plurality of protocol layers. Information having an identifier is received at a first protocol layer from a higher protocol layer in the protocol stack. The computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier. Upon determining to present the information to the communication medium, the computing device incorporates the identifier in the information before placing the information on the network communication medium.
Type:
Grant
Filed:
February 22, 2012
Date of Patent:
January 26, 2016
Assignee:
SRI INTERNATIONAL
Inventors:
Charles Patton, Jeremy Roschelle, Roy D. Pea, Phil Vahey
Abstract: A novel overlay networking method designed specifically to handle the large file transfers that constitute a large and growing portion of media-rich Internet traffic is disclosed. The proposed system and method uses large (e.g., 10 MB) packets or Media Frames (MF) and orderly concatenations of these frames into chains (MC) to achieve a considerable reduction in power consumption relative to current IP Internet routers. Transmission of each MC is scheduled, while individual MFs are routed directly in interstices within MCs.
Type:
Grant
Filed:
April 27, 2012
Date of Patent:
January 19, 2016
Inventors:
Thomas E. Darcie, Sudhakar Ganti, Ilijc Albanese
Abstract: Link aggregation is a practice that uses multiple Ethernet links between two end points in order to obtain higher bandwidth and resiliency than possible with a single link. A flow distribution technique is provided to distribute traffic between the two end points equally across all links in the group and achieve greater efficiency. The flow distribution technique generates and sub-divides a hash value based on received packet flow. The divided portions of the hash value are used in a hierarchical fashion to select a link to use for this packet.
Type:
Grant
Filed:
January 11, 2013
Date of Patent:
January 5, 2016
Assignee:
International Business Machines Corporation
Inventors:
Claude Basso, Natarajan Vaidhyanathan, Colin B. Verrilli, Bruce M. Walk, Daniel Wind
Abstract: Techniques for identifying influential users of a social networking service are provided. Influential users may be identified via an algorithm in which an influence score is assigned to each user based at least in part on other members of the community users having taken an affirmative step with respect to the user's communications. Iterative processing may be performed, with each user's influence score being determined by contributions from other users, and each contribution being determined by the contributor's influence score as of a prior iteration. A map-reduce framework may be employed, with data representing the community being partitioned into a plurality of discrete shards, a map process corresponding to each shard calculating an influence score for users represented in the shard, and reduce processes ranking users according to influence score across all shards.
Type:
Grant
Filed:
March 22, 2012
Date of Patent:
December 22, 2015
Assignee:
Microsoft Technology Licensing, LLC
Inventors:
Hung-Chih Yang, Danny B. Lange, Xiong Zhang
Abstract: A social networking system manages the accessibility of content items provided by users and directed to various audiences in the social networking system. An author provides the social networking system with a content item, a content item tag indicating an association between the content item and a tagged user, and a definition of a first audience who may view the content item. The social networking system then allows the tagged user to provide a definition of a second audience who may view the content item, where the second audience may contains users who are not in the first audience defined by the original author. The social networking system then determines whether a viewing user may view the posted content item (and tag) based on whether the viewing user is in at least one of the first audience and the second audience.
Abstract: A system and method receives and stores instant messaging messages, and provides them upon request by one or more programs, such messages containing text, status of other users or other information. Instant messages received from programs may also be provided as instant messages using the system and method. The programs may be validated before allowing them to communicate using the instant messaging network.