­
­
­
­

Inventi Impact - Start-Ups

Patent Watch

  • Limiting transmission rate of data

    An improved solution for limiting the transmission rate of data over a network is provided according to an aspect of the invention. In particular, the transmission rate for a port is limited by rate limiting one of a plurality of queues (e.g., class/quality of service queues) for the port, and directing all data (e.g., packets) for transmission through the port to the single rate limited queue. In this manner, the transmission rate for the port can be effectively limited to accommodate, for example, a lower transmission rate for a port on a destination node.

  • User authentication based on asymmetric cryptography utilizing RSA with personalized secret

    A method for authenticating a user to a computer system is disclosed, comprising using a first input and a second input in producing a digital signature in response to a challenge. The digital signature is valid when the first input matches a personalized secret and the second input matches a trio comprising a public modulus, a public exponent, and a private-key-dependent exponent. Selection of the personalized secret is discretionary and changeable. A crypto-key generation process uses the personalized secret and two primes as input to produce the trio. The public modulus and public exponent of the trio form a public key used in digital signature validation. Also disclosed is a business method that replaces the conventional public-key certificate with an agreement on the user's public key.

  • System and method for forecasting information using collective intelligence from diverse sources

    System, method, computer program product, and business operating model. Information processing system comprising: server computer having processor for executing computer instructions and memory coupled to processor for storing instructions and data; communications link for communicating between server and information appliance client entities external to server, communication link enabling receipt of first information from a plurality of external entities and for transmitting second information to second entities, first and second entities may be same entities or different entities; data store defining database for storing first and second information; computer program having plurality of executable command instructions and executing in processor and memory for generating second information from at least some of plurality of first information; wherein first information comprising plurality of individual information items and second information comprising processed collective information generated from plurality of individual information items and having increased value to second entities by virtue of collective contribution and processing applied thereto.

  • Electronic business/personal card and method of use thereof

    The present invention includes a wireless communication method and device comprising a one-to-one exchange of wireless electronic device identifications or unique profile IDs between a sending and a receiving party who are both registered users of the electronic business/personal card service and further comprising upload of the wireless electronic identifications to a data server computer system wherein said system matches said identifications with those of registered users and said computer system displays information about the user associated with each identification.

  • Business method for giving and tracking gifts

    A business method for distributing gifts. The method employs a gift wrap which is marked with a specific code number. The wrap is sold by an originator to a customer who places a gift within the wrap and mails or delivers the package to a first recipient. The customer inputs to the originator's website information comprising the wrap's code number, his name and address and the name and address of the first recipient. Then the first recipient inputs to the website information comprising the code number, his name and address and the name and address of any other recipient to whom the same wrap is sent with another gift. The information is sorted and stored in a database. The customer and first and any subsequent recipient of a wrap access the website over the internet to view the track history of the wrap.

  • Integrating a web-based business application with existing client-side electronic mail systems

    A method, system, computer program product, and related business methods are described in the context of a web-based business information system having an internal e-mail facility, wherein e-mail communications between a native e-mail system of an end user of the web-based business information system and an external contact are facilitated and automatically tracked by the web-based business information system, the native e-mail system lying outside the web-based business information system but often being preferred by the end user over the internal e-mail facility of the web-based business information system. The described preferred embodiments provide for easy-to-use, reasonably transparent, "no-click" integration of the web-based business information system with the end user's native e-mail system in a manner that is independent of the particular type and choice of native e-mail system.

  • Object oriented based, business class methodology for generating quasi-static web pages at periodic intervals

    A method for providing a requestor with access to dynamic data via quasi-static data requests, comprising the steps of defining a web page, the web page including at least one dynamic element, creating an executable digital code to be run on a computer and invoked at defined intervals by a scheduler component the executable code effective to create and storing a quasi-static copy of the defined web page, creating the scheduler component capable of invoking the executable code at predefined intervals, loading the executable code and the scheduler component onto a platform in connectivity with a web server and with one another, invoking execution of the scheduler component, and retrieving and returning the static copy of the defined web page in response to requests for the defined web page.

  • Wastewater treatment method and apparatus, biosolids-based food additive, and business application

    The present invention is directed to processes and business methods and wastewater treatment units for converting the waterborne residuals from wastewater generated by food processing plants into an ingredient suitable for use in animal feeds. The ingredient produced by the processes of the present invention has a high protein content and can be used as a replacement for conventional sources of animal feed protein such as fish meal.

  • PLANTS AND SEEDS OF SPRING CANOLA VARIETY SCV119103

    The invention relates to a novel canola line designated as SCV119103. The invention also relates to the seeds, the plants, and the plant parts of canola line SCV119103 as well as to methods for producing a canola plant produced by crossing canola line SCV119103 with itself or with another canola line. The invention also relates to methods for producing a canola plant containing in its genetic material one or more transgenes and to the transgenic canola plants and plant parts produced by those methods. The invention further relates to canola lines or breeding lines and plant parts derived from canola line SCV119103, to methods for producing other canola lines or plant parts derived from canola line SCV119103 and to the canola plants, varieties, and their parts derived from use of those methods. The invention additionally relates to hybrid canola seeds, plants, and plant parts produced by crossing the line SCV119103 with another canola line.

  • PLANTS AND SEEDS OF SPRING CANOLA VARIETY SCV152154

    The invention relates to a novel canola line designated as SCV152154. The invention also relates to the seeds, the plants, and the plant parts of canola line SCV152154 as well as to methods for producing a canola plant produced by crossing canola line SCV152154 with itself or with another canola line. The invention also relates to methods for producing a canola plant containing in its genetic material one or more transgenes and to the transgenic canola plants and plant parts produced by those methods. The invention further relates to canola lines or breeding lines and plant parts derived from canola line SCV152154, to methods for producing other canola lines or plant parts derived from canola line SCV152154 and to the canola plants, varieties, and their parts derived from use of those methods. The invention additionally relates to hybrid canola seeds, plants, and plant parts produced by crossing the line SCV152154 with another canola line.

  • SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS

    Method for implementing a software application in networked desktop virtualization environment, desktop virtualization environment including desktop virtualization server and desktop virtualization endpoint device, both in communication with one another over network. Method involves: structuring software with multiple internal elements and interfaces among them; installing first instance of software on desktop virtualization server, detecting characteristics of desktop virtualization server computer; in first instance of article of software, selectively enabling first set of internal software elements and disabling remaining internal software elements based on results of detecting on server computer; installing second instance of software on desktop virtualization client endpoint device; detecting characteristics of desktop virtualization endpoint device; in second instance of article of software, selectively enabling second set of internal software elements and disabling remaining internal software elements based on results of detecting on desktop virtualization client endpoint device; and establishing an association of second instance of software with first instance of software.

  • Providing Software Validation as a Service

    In one embodiment, a method includes accessing an event-driven application input by a user, the event-driven application comprising source code, one or more use cases input by the user for the event-driven application, and one or more functional requirements input by the user for the event-driven application; parsing the use cases and the functional requirements according to the predefined syntax to construct one or more validation modules for validating the event-driven application without any modification to the source code of the event-driven application for validation purposes; formally validating the event-driven application using the validation modules without relying on assertions inserted into the source code of the event-driven application for validation purposes; and if the formal validation finds one or more defects in the event-driven application, generating output for communication to the user identifying the defects.

  • CONFIGURABLE HIGHLIGHTS PANEL FOR DISPLAY OF DATABASE RECORDS

    Systems and methods for configuring a UI display layout for displaying record fields in a multi-tenant on-demand database service. A data record is initially displayed on a first portion of a user interface display, and an identification of a set of one or more fields of the data record is received, e.g., from a user. A selection of a display configuration for the set of identified fields is also received, e.g., from a user. The display configuration may include one or more columns, each column having one or more rows, wherein the display configuration identifies, for each of the set of fields, in which column and row the field is to be displayed. Data for the set of fields based on the selected display configuration is then displayed on a second portion of the user interface display which may include a collapsible display panel.

  • SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING DATA UTILIZING A SELECTED SOURCE AND VISUALIZATION

    In accordance with embodiments, there are provided mechanisms and methods for displaying data utilizing a selected source and visualization. These mechanisms and methods for displaying data utilizing a selected source and visualization can enable enhanced data display, improved data display development, increased time savings, etc.

  • DIGITAL RIGHTS MANAGEMENT IN A MOBILE ENVIRONMENT

    Embodiments provide a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device's hardware identification information, thus forming a plurality of hardware instruction interpretations. The embodiment also combines each of the plurality of hardware instruction interpretations and hashes the combination to form a quasi-hardware device identifier. An encryption process is based on the quasi-hardware encryption device identifier and the media is then encrypted using the encryption process. The encrypted media is transferred to the mobile device wherein the mobile device decrypts the media based at least in part on the mobile device's internal knowledge of the quasi-hardware device identification.

  • METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES

    Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities.

  • COMPENSATION PATTERNS FOR ADJUSTING LONG RUNNING ORDER MANAGEMENT FULFILLMENT PROCESSES IN AN DISTRIBUTED ORDER ORCHESTRATION SYSTEM

    A computer-readable medium, computer-implemented method, and system are provided. In one embodiment, a compensation pattern is defined for a step of an executable process, and the step of the executable process is executed. A change request is received, and, based on the change request, the compensation pattern is applied to the step of the executable process.

  • COMPENSATION PATTERNS FOR ADJUSTING LONG RUNNING ORDER MANAGEMENT FULFILLMENT PROCESSES IN AN DISTRIBUTED ORDER ORCHESTRATION SYSTEM

    A computer-readable medium, computer-implemented method, and system are provided. In one embodiment, a business process is created, and a cost of change value for the business process is defined. An executable process that is generated from the business process is executed, and a change request is received. It is determined whether the cost of change value is greater than a threshold value, and, when the cost of change value is not greater than the threshold value, the change request is initiated.

  • METHOD, SYSTEM, AND PROGRAM FOR AN IMPROVED ENTERPRISE SPATIAL SYSTEM

    Disclosed is a method, system, and program for providing access to spatial data. A request for data is received. Enterprise and third party data are integrated. The integrated data is processed. Spatially referenced results are generated using the processed data. The spatially referenced results are returned in response to the request.

  • SYSTEM, PROGRAM PRODUCT, AND METHODS FOR ONLINE IMAGE HANDLING

    A system to facilitate electronic commerce associated with an online marketplace, program product, and methods are provided. Electronic commerce over a computer network is facilitated by a computer system that forms a community of computers that enable the users to buy and sell items in an online marketplace. To list the item on an online marketplace website, for example, the selling user posts an item with a seller marketplace item management website by completing an online-item marketplace item creation form. The form requires input related to the item, such as a description, sale price or minimum bid, shipping instructions, and the like, and an image file or image file location illustrating the marketplace item. The seller marketplace item management server provides a marketplace administrator server the marketplace item data including original image file or image file location. The server contains a random image size generator that generates at least two additional images of the marketplace item for display in a seller marketplace item web page to advertise the marketplace item.

  • ARRANGEMENT FOR MANAGING MOBILE DEVICE ACCESS TO PRECINCT REGIONS CONTAINING SERVICES AND PRODUCTS AND INFORMATION

    An arrangement for managing mobile device access to precinct regions so that a user can access usable information about certain products, services or other things from said precinct for real time consideration and decision making, said arrangement including: a server with a database of vendors, products, services, promotional materials, information, applications and other resources for each precinct; a hand-held device having means to allow a user to operate software applications including a web browser; said hand-held device having means to support short range wireless communication protocols; said hand-held device having navigation means displayable upon said screen to locate, promote and/or direct a customer to a certain location and/or vendor within precinct; communication means for said hand-held device to wirelessly access information from and transfer information to said database; wherein provision for the hand-held device to associate with a precinct is realised by the inherent short range wireless communication protocol of the hand-held device to be activated by proximity with a kiosk, port, pad, gate or zone (proximity station) within or near to the precinct region such that once access to the wireless network has been established as permitted through the proximity gesture of the hand-held device coming in range with said proximity station, the user of the hand-held device may then interact with the precinct and those associated vendors, products, services, information, applications and other resources from the database and to be then under the guidance of the navigational display appearing on the hand-held device to be then guided to the point of sale of such a vendor, product and/or service.

  • DYNAMIC COLLABORATIVE ADAPTATION OF A BUSINESS ACTIVITY IN A BUSINESS ACTIVITY MANAGEMENT SYSTEM

    Dynamic adaptation of a business activity involves creation and updating of the business activity in an ad-hoc and collaborative manner as the business activity executes. User input relating to creation of a business activity is received through a user portal, where the business activity involves interactions among people. A business activity orchestrator orchestrates execution of work in the business activity. The business activity is updated using a business activity adapter, where updating the business activity occurs during execution of the business activity, and the updating is further responsive to collaborative input of the people involved in the business activity.

  • METHOD AND SYSTEM FOR PROVIDING ENTERPRISE PROCUREMENT NETWORK

    According to an embodiment, the present invention provides a computer system. The computer system includes one or more processors and a computer-readable medium in communication with the one or more processors. The computer system also includes an enterprise social network system, implemented by an enterprise application stored on the computer-readable storage medium, for retrieving and providing procurement information from a plurality of social network entities associated with the enterprise social network system, the enterprise social network system comprising a set of instructions executable by the one or more processors to perform one or more operations. The set of instructions includes instructions for providing, at a computer system, a user interface for receiving input from a user. The set of instructions includes instructions for providing a user profile for a user, the user profile being stored at the enterprise social network system, the user being associated with a plurality of network entities, the user profile including a first plurality of user attributes.

  • TECHNOLOGY SHARING DURING DEMAND AND SUPPLY PLANNING IN A NETWORK-BASED SUPPLY CHAIN ENVIRONMENT

    A system, method, and article of manufacture are provided for technology sharing during demand and supply planning in a network-based supply chain environment. Steps included are providing locator and mapping capabilities utilizing the network. Technology that includes streaming audio, stereo audio and video data is also shared utilizing the network. Encryption capabilities for the technology are also included. Further, searching capabilities are provided utilizing the network in addition to logging events and passive user profiling. The event logging includes logging network operations. User profile data is automatically received and stored. User profile data includes user identity, state, preferences and interests. User profile data is also automatically exported to an active profile manager which automatically adds additional user profile data. Additional user profile data includes information related to whether the user is a service provider or a manufacturer and the location of user.

  • ENTERPRISE PROPOSAL MANAGEMENT SYSTEM

    A system and method for managing an enterprise is provided. The system and method may be based on a layered architecture including a data center that may store all documents and data abstractions for an enterprise. One or more services may interact with an enterprise resource planning system and/or a customer relationship manager to facilitate interaction with the documents and data abstractions. A client access point of the system may include a graphical user interface that includes one or more enterprise management functions for managing the enterprise documents and/or data abstractions. The enterprise management functions may include a user proposal manager, an enterprise proposal manager, a proposal library, a content health manager, an archive library, a bid center, a contracts manager, a resume manager, a debriefing center, and/or a projects manager. The enterprise management functions may re-engineer business processes and enable users to manage all aspects of an enterprise using a single unified interface.

  • MONITORING APPLICATION INTERACTIONS WITH ENTERPRISE SYSTEMS

    Networked services may interface with enterprise systems of an organization to access data in the enterprise systems. A networked service may be able to retrieve, manipulate, and store data in the enterprise systems. Once a networked service interfacing with enterprise systems has been created, developers may create apps or applications that call one or more networked services to access data in the enterprise systems. The apps may provide basic functionality, such as generating a user interface in a specific device using a specific industry standard platform for incorporating data from enterprise systems accessed by a linked service. Networked services may also contain modules for tracking calls or invocations of the service together with an identifier of an associated application and user, in addition to other data. This data may be recorded in a database and shared to compensate parties based on actual usage of the services and/or apps.

  • METHOD AND SYSTEM FOR PROVIDING URL POSSIBLE NEW ADVERTISING

    Disclosed are a method and system for providing a uniform resource locator (URL) enabling a new advertisement. The method includes acquiring, from a usage record of users using an application, a URL with respect to a site where the users visit, analyzing the URL or a landing page of the URL to classify a category of business with respect to the URL, and providing the URL that enables the new advertisement based on a comparison of a site of the URL with a registered advertisement site or an exposed advertisement site for each of the classified category of business.

  • SYSTEM AND METHOD FOR WORKFLOW DRIVEN CHANNEL SEARCH RESULTS

    A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.

  • SYSTEM AND METHOD FOR COMPILING STATISTICS IN AN IP MARKETPLACE

    A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.

  • SYSTEMS AND METHODS FOR OPTIMIZING THE SCHEDULING OF RESOURCES ON AN AIRPLANE

    A system and method for enabling passengers to swap seats with other passengers, so that they may obtain seats that appear to be unavailable because they are occupied. Passengers use interfaces to specify their desire and/or willingness to switch seats, including to get better seats, give up their seats for compensation, sit together and/or sit with other passengers, sit away from certain types of passengers, sit next to an empty seat, and the conditions, if any, for switching. A processor runs an algorithm reassigning passenger seats based on the conditions inputted at the interface. Passengers are notified of their new seats, and may be charged or compensated for switching seats.

  • SYSTEM AND METHOD FOR PROVIDING INFORMATION ACCESS ON A PORTABLE DEVICE

    A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation.

  • APPARATUS AND METHOD FOR IMPROVING THE SECURITY IN PORTABLE COMMUNICATION SYSTEM

    An apparatus for improving the security of a portable communication terminal includes: a security card having a plurality of projections provided in a predetermined projection form that is capable of identifying a user; and an authentication managing unit for analyzing the projection form, which is detected through a touch input of the security card, and performing an authentication process using the analyzed outcome.

  • DOMAIN-AUTHENTICATED CONTROL OF PLATFORM RESOURCES

    A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.

  • SYSTEMS, DEVICES, AND METHODS FOR PROVIDING MULTIPLE SERVICES TO PREMISES OVER COMMUNICATION NETWORKS

    Methods, systems, and devices for providing one or more virtual networks for a plurality of services are disclosed. The device may include a secure access node coupled to a wide area communication network and a premises communication network. The secure access node may have a node software platform, one or more node processors, a node storage device, and one or more node communication interfaces. Further, the secure access node may receive a plurality of data packets through one of the one or more node communication interfaces. The node software platform may execute on one of the node processors and may include a node deep packet inspection engine, a node rules generation engine, a node rule check and notification generation engine, a node service segregation engine, a node communication software application, and a node service adapter software application.

  • SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS

    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

  • Enforcing Universal Access Control in an Information Management System

    A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Method And System For Providing Location Aware Tracking And Services Via An IP Multimedia Residential Gateway

    In an IP multimedia gateway, locations corresponding to communicatively coupled communication devices are determined and transmitted to a service provider device (SPD) that provides services to the communication devices. Communication devices receive location based service profiles from the (SPD) based on the determined locations. Services content from the (SPD) is communicated with the communication devices and/or with the (SPD), based on the profiles. The determined locations are received from communication devices which may be local or remote. A device location map is generated to be displayed by communication devices. The gateway may be integrated in an STB/DTV that displays the determined locations. Content is communicated to communication devices based on their location. The (SPD) may provide content and/or control information for communication device services. Locations are associated with client devices for detecting cloned client devices where determined locations are different than associated locations and/or for restricting services based on location.

  • METHOD AND SYSTEM FOR PROVIDING PROGRAMMING GUIDE AND RECORDING INFORMATION VIA AN IP MULTIMEDIA GATEWAY

    An IP multimedia gateway (IMG) may be operable to determine capability and/or capacity of a client device to render graphics for a received programming guide. The IMG may be operable to convert the programming guide from a first format to a second format based on the determined capability and/or capacity of the client device. The converted programming guide may be communicated by the IMG to the client device. The IMG may be operable to determine a recording capability and/or capacity of the client device. A storage location may be determined by the IMG for storing the recording of the one or more of the video programs based on the determined recording capability and/or capacity of the client device. The client device may record the one or more of the video programs utilizing the converted programming guide and the determined storage location.

  • Interface Protocol and API for a Wireless Transceiver

    A wireless protocol may be implemented in a smart transceiver device that contains the physical (PHY) and media access control (MAC) layers of the wireless protocol stack. In various embodiments, a serial peripheral interface (SPI) based design may be used. Disclosed is an embodiment of a protocol which may be used to provide control and data transfer to and from the smart transceiver. In particular, an exemplary format of the protocol, the commands, and responses is disclosed. In a further embodiment, an application programming interface (API) is disclosed. The API may provide hardware independent services that can be used to establish, maintain, and transport data to and from the system and the smart transceiver device. In particular, an exemplary and non-limiting set of services, function calls, configuration methods, events, and parameters is disclosed.

  • ULTRA-LOW COST SANDBOXING FOR APPLICATION APPLIANCES

    The disclosed architecture facilitates the sandboxing of applications by taking core operating system components that normally run in the operating system kernel or otherwise outside the application process and on which a sandboxed application depends on to run, and converting these core operating components to run within the application process. The architecture takes the abstractions already provided by the host operating system and converts these abstractions for use by the sandbox environment. More specifically, new operating system APIs (application program interfaces) are created that include only the basic computation services, thus, separating the basic services from rich application APIs. The code providing the rich application APIs is copied out of the operating system and into the application environment--the application process.

  • Apparatuses, Methods and Systems for a Social Networking Application Updater

    Software on a client device receives a notification from a server of the availability of an update for an application that is a multi-user social networking application. The software determines whether the state for a live process has been saved by the server. The software saves the state for a live process associated with the application if the state of the live process is not saved. The software kills the live process. Then the software downloads at least one file associated with the update and modifies at least one system database key or value associated with the application. The software launches the application as updated. And the software loads the state into the application as updated.

  • MECHANISM FOR FACILITATING EFFICIENT BUSINESS RULES MANAGEMENT AND DATA PROCESSING

    In accordance with embodiments, there are provided methods and systems for facilitating efficient business rules management and data processing. A method of embodiments includes generating, at a first computing system, configuration settings to customize business rules to process data transactions. The business rules are processed by a business rules engine at a second computing system. The method includes customizing one or more business rules by applying one or more configuration settings to the one or more business rules, and facilitating the business rules engine residing on the second computing system to process one or more data transactions based on the one or more customized business rules. The one or more customized business rules guide processing of the one or more data transactions and provide information relating to how one or more business rules are matched with the one or more data transactions.

  • FLEET MANAGEMENT SYSTEM

    A method of implementing an automated diagnostic checklist for materials handling vehicles comprises detecting, by a processor on a materials handling vehicle, an error in operation of the materials handling vehicle and initiating an automated diagnostic check of a component of the materials handling vehicle in response to detecting the error. The method also comprises obtaining error event information by the processor, from across a vehicle controller area network (CAN) bus, where the obtained error event information is related to at least one condition of the materials handling vehicle and wirelessly transmitting the obtained error event information to a server having software thereon for specifically monitoring materials handling vehicles. The error in operation of the materials handling vehicle is repaired in response to receiving the wirelessly transmitted error event information obtained automatically from the CAN bus.

  • PROCESS AND SYSTEM FOR CREATING A COMPATIBILITY RATING USED BY ENTREPRENEURS TO ALLOW THEM TO SELECT BUSINESS OPPORTUNITY PROVIDERS

    The present invention generally relates to computer implemented methods for providing a compatibility rating. In particular, the present invention relates to a process that is computer implemented in which an entrepreneur obtains a score (e.g., a numerical expression) of their probability of having a prosperous and profitable experience with a business opportunity, franchise, direct sales company, or independent business idea provider (hereinafter referred as a `business opportunity provider") based on shared compatibility.

  • Identifying Relevant Data from Unstructured Feeds

    A system and method of providing data to a mashup application may involve receiving a request from a mashup application and supplying first data to the mashup application in response to the request. Mashup information can be received from the mashup application, wherein the mashup information indicates an inclusion of the first data with second data in the execution of the mashup application. The mashup information may be stored and analyzed to identify relationships between previously unrelated data.

  • SYSTEMS AND METHODS FOR ONLINE INSURANCE FINANCIAL PLANNING

    A computer system receives and stores information relating to actual past financial results, expected future trends in financial results, and anticipated effects of initiatives intended to change the expected trends. The system processes the information and generates first and second forecast data. The first forecast data indicates forecast financial results without considering the effects of the initiative. The second forecast data indicates forecast financial results that reflect expected results of the initiatives. The first and second forecast data are stored and subsequently displayed to users.

  • SYSTEMS AND METHODS FOR DYNAMIC COMPOSITION OF BUSINESS PROCESSES

    Systems and associated methods for dynamic, selection of services for business processes are described. Systems and methods manage problems related to service selection for business processes in a shared environment and manage the end-to-end QoS requirements for multiple business processes that access a shared environment. A solution is provided to such problems by discovering set(s) of service designs/selections using a combinatorial selection technique, such as for example a population-based selection technique. The systems and methods described herein can automatically determine changes to the system, determine a new set of service design selection solutions, and reconfigure the system accordingly.

  • SCALABLE DISTRIBUTED COMPUTE BASED ON BUSINESS RULES

    A method, apparatus, system, article of manufacture, and computer-readable storage medium provide the ability to dynamically modify a distributed computing system workflow. A grid application dynamically receives configuration information including business rules that describe execution profiles. Channels based on the one or more execution profiles are defined. Each channel is configured to execute a work request in a distributed grid compute system (based on an execution profile). A first work request is received from a requestor and includes an identity of the requestor. The first work request is evaluated and the identity of the requestor is applied to direct the first work request to the appropriate channel.

  • SERVICE DELIVERY NETWORK

    A service delivery network provides a variety of services to a caller placing a call to the network through a vehicle communication system. The network includes automatic call routing, and has access to one or more databases with various caller services. These databases include, but are not limited to, traffic, POI databases and routing engines. A system administration manager associated with the network is capable of identifying calls based on a vehicle identification number (VIN) associated with a call, and can store logs of each call, including the identifying VIN.

  • THIRD PARTY INFORMATION TRANSFER

    A method allowing a professional service provider to access client data stored in an online account without storing confidential account information by the professional service provider. In particular, the service provider may register the relationship with the client in a third party information transfer framework where the client approves such registration and download the data from the online account using the confidential account information in a temporary manner. The client data may be stored in a repository available to the service provider based on the relationship registration. In an example, a professional tax preparation software may include functionality to check for newly downloaded client data within the third party information transfer framework, notifying a tax accountant (i.e., the service provider), and may provide a one click access to import the client data directly into the client tax return.

  • EFFICIENT SYSTEM FOR REALIZING BUSINESS PROCESS FAMILIES USING MODEL-DRIVEN TECHNIQUES

    The present invention provides a system and method for developing a set of business process definitions sharing the common business intent as a business process family using model-driven techniques. The present invention minimizes on development time and resources thus leading to a cost effective system and method for developing business process families. The invention enables to create a business process family which can be easily configured to behave as a specific business process thus meeting the needs of a set of apriori known situations. The invention supports configuration process at different stages (i.e. design time, and run time) of the business process application and also support extension of the configuration structure at different stages (i.e. design time, and run time). The invention enables to create a business process family which can be easily extended to meet the needs of an as yet unseen situation.

  • SECURE ACCESS CONTROL SYSTEM

    Secure access control system in banking or similar operations includes, at least a server (1) or host element in communication with a banking environment (5), a biometric device (2), a client element (3) and the communication elements (4) between the server element (1) and the client element (3), the elements being configured in such a way that an "applet" component built into the server element (1) initiates the control process (41) requesting the authentication (42) of the biometric device (2), performing the authentication by a certificate of the biometric device. T biometric device requests the biometric data (43), the data being verified by comparison with the biometric data recorded in a prior process and generating a password (OTP) which is sent to the server element (1) for validation, the banking environment (5) being informed thereof and responding with the user customized environment (49) if the authentication is positive, the environment being displayed in the client element (3).

  • IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING THE SAME

    An image display apparatus for receiving and processing a broadcast signal and a method for operating the same are disclosed. The method includes displaying a home screen including a plurality of card objects, displaying a broadcast image and a favorite channel object representing favorite channels in a broadcast card object representing a broadcast image among the plurality of card objects, and displaying a favorite channel list including favorite channel items on the display, upon selection of the favorite channel object.

  • FAULT LOCALIZATION USING CONDITION MODELING AND RETURN VALUE MODELING

    Disclosed is a novel computer implemented system, on demand service, computer program product and a method that leverages combined concrete and symbolic execution and several fault-localization techniques to create a uniquely powerful tool that automatically detects failures and localizes faults in PHP Web applications. The fault-localization techniques evaluated combine variations on the Tarantula algorithm with a technique based on maintaining a mapping between executed statements and the fragments of output they produce, mapping of conditional results, and values returned from function calls. These techniques have been implemented in a tool called Apollo, and evaluated by localizing 75 randomly selected faults that were exposed by automatically generated tests in four PHP applications. Our findings indicate that, using our best technique, 87.7% of the faults under consideration are localized to within 1% of all executed statements, which constitutes an almost five-fold improvement over the Tarantula algorithm.

  • SYSTEM FOR SAFE MONEY TRANSFER

    The present invention provides a system for safe money transfer, which transfers money from a secure bank account, comprises a mediation server receiving a request for approval from an requester to transfer the money and generating a request message including the request for approval; an approval terminal receiving the request message from the mediation server, generating an approval for request to approve the request for approval and sending the approval for request to the mediation server by an approver; and a security transaction server receiving the approval for request from the approval terminal via the mediation server, thereby allowing the money to be transferred. Preferably, the system further comprises a request terminal sending the request for approval to the mediation server by the requester; and an accounting part proceeding with transferring the money if the security transaction server sends the request for approval to the accounting part.

  • BUSINESS RISK SYSTEM AND PROGRAM

    A system and program captured in a computing device for managing the risk of a new business opportunity. The system and computing device accept data and creates plans to optimally reduce the risk of new business opportunities and then uses the resulting data to create management reports that can be both viewed or integrated into existing management reporting systems. A training module can be integrated with the system. The entire system can be operated via the cloud so as to allow users to interface the system remotely.

  • Security Validation of Business Processes

    Implementations of methods of the present disclosure include providing a process model based on the process, the process model comprising a plurality of tasks, receiving user input at a computing device, the user input specifying one or more security requirements, the user input relating each of the one or more security requirements to at least one task of the plurality of tasks, generating, using the computing device, a formal model of the process based on the process model and the one or more security requirements, the formal model being based on a specification meta-language, processing the formal model using a model checker that is executed on the computing device to determine whether violation of at least one of the one or more security requirements occurs in the process, generating an analysis result based on the processing, and displaying the analysis result on a display.

  • ATTRIBUTE INFORMATION PROVIDING SYSTEM

    A system which implements a method for providing attribute data. A request is received from a user device via a network for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. A data record including L attributes of the subscriber is read from a database, L being at least 2. The data record is provided to the user device via the network. A selection of M attributes of the L attributes is received from the user device via the network, M being less than L. A virtual record including the M attributes selected from the data record is generated, the virtual record including a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device via the network, wherein the virtual ID token includes the VID.

  • METHODS AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING RESTRICTED CONTENT

    A method and computer program product for managing restricted content, such as confidential or classified content, using content signatures are provided. A registry is established within an indexed archive system for content signatures of restricted files. Participants enroll in the registry and submit content signatures of all their files to the registry. The registry compares the submitted content signatures to those stored previously in the registry. The registry initiates a control action whenever there is a match between a participant's content signature and a previously stored content signature of a file to which the participant does not have access rights. When there is no match, the participant retains access to the restricted file.

  • VIRTUAL-MACHINE-BASED APPLICATION-SERVICE PROVISION

    Embodiments of the present invention are directed to application-service provision by application-service-provider centers to remote application-service consumers, including small businesses, medium-sized businesses, and other similarly-sized institutions and organizations, as well as to users of individual computers, such as home computers. Rather than executing applications at an application-service-provider center, the applications are instead distributed to remote client sites for execution by virtual machines controlled and managed by an application-service-provider center. Execution of the applications by virtual machines at remote client sites alleviates constraints and bottlenecks associated with communications between client computers and remotely executing applications, while providing management capabilities and security that allow the application-service center to manage application execution as if the remotely executing applications were executing within the application-service center.

  • Intelligent Data Caching

    Methods, program products, and systems implementing intelligent data caching are disclosed. A client can send a request for data to a server. The request can include a query and a query context. The query can retrieve more data than can be displayed in a current page. The query context can specify a quantity of data records that can be displayed in the current page. The client can receive from the server two sets of data in response to the request. The first set of data can include row identifiers of data records that satisfy the query. The second set of data can include data records that can be displayed in the current page. The client can store the two sets of data in one or more buffers (e.g., two buffers) and update buffer(s) when different data records are displayed (e.g., when a user scrolls through pages).

  • METHOD FOR THE EXTRACTION, COMBINATION, SYNTHESIS AND VISUALISATION OF MULTI-DIMENSIONAL DATA FROM DIFFERENT SOURCES

    The invention relates to a method for the automatic combination of multi-dimensional data depending on manipulations at the level of their dimensions in a computer environment that comprises computer equipment capable of accessing multi-dimensional data sources. The method comprises the following steps: a) providing a first multi-dimensional data source; b) providing at least a second multi-dimensional data source, at least said second multi-dimensional data source being such that each data includes key values and non-key values in the different dimensions; c) identifying actions carried out using a user interface on representations of some dimensions of the sources; d) depending on said actions, combining the data sources by using the key values of each data of the second source(s) in order to establish associations between the multi-dimensional data of the first source and the multi-dimensional data of the second source(s) and to obtain combined multi-dimensional data, the combination being carried out as follows: i) adding to the multi-dimensional data of the first source at least a portion of the non-key values of the corresponding data of the second source(s); and ii) arranging the added non-key values with the pre-existing values for the same combined multi-dimensional data. The invention also relates to associated methods for the combination and enrichment of data and for the manipulation of the visualisation of resources.

  • REPRESENTING AND MANIPULATING RDF DATA IN A RELATIONAL DATABASE MANAGEMENT SYSTEM

    Techniques for generating hash values for instances of distinct data values. In the techniques, each distinct data value is mapped to hash value generation information which describes how to generate a unique hash value for instances of the distinct data value. The hash value generation information for a distinct data value is then used to generate the hash value for an instance of the distinct data value. The hash value generation information may indicate whether a collision has occurred in generating the hash values for instances of the distinct data values and if so, how the collision is to be resolved. The techniques are employed to normalize RDF triples by generating the UIDS employed in the normalization from the triples' lexical values.

  • Extended Database Search

    Methods, program products, and systems implementing integrated repository of structured and unstructured data are disclosed. An integrated environment is provided for accessing, structured data (e.g., data of a relational database) and unstructured data (e.g., data stored in a text or binary file), including creating, managing, modifying, and searching the structured data and unstructured data. The integrated environment can include an integrated user interface, a set of commands and application programming interface (API), and storage for a relational database and a document repository. The integrated environment can include a database abstraction layer that allows database operations on both the structured data and the unstructured data.

  • METHOD AND SYSTEM FOR PROVIDING CONFERENCING SERVICES

    An approach is provided for supporting multi-media conferencing. Textual information (e.g., text associated with a presentation) is received for display during a conference session to multiple participants. For a particular participant, configuration information corresponding to the participant specifies language assistance for the textual information. Language assistance involves augmenting the textual information according to the configuration information for comprehension of the textual information by the particular participant. In one embodiment, the augmented textual information includes language translation of the textual information. Additionally, the augmented textual information can encompass definitions of terms, including acronyms. The augmented textual information is forwarded for display to the participant during the conference session.

  • SYSTEM FOR AND METHOD OF PROVIDING MOBILE APPLICATIONS MANAGEMENT

    A system for and method of providing mobile device management. The system and method may include identifying, to a customer, a mobile management system that is communicatively coupled to a customer system associated with the customer via a first network and communicatively coupled to a plurality of mobile devices associated with the customer via a second network, storing, on the mobile management system, a plurality of template mobile applications, receiving, from the customer system, modification data associated with one of the plurality of template mobile applications via the first network, modifying the one of the plurality of template mobile applications based on the modification data, and transmitting, to the plurality of mobile devices, the modified one of the plurality of template mobile applications via the second network.

  • METHOD AND SYSTEM FOR ANALYZING INVESTMENT INFORMATION

    An information processing apparatus and associated method for analyzing investment information. An input unit receives a financial request and one or more investment variables relating to the financial indicator and a description vector unit generates at least two vectors containing the one or more investment variables based on the financial request. A description vector similarity unit then calculates a similarity value by comparing the at least two vectors and an investment analysis unit analyzes the similarity value and the financial request, and determines investment advice based on results of the analysis.

  • LONG TERM WORKFLOW MANAGEMENT

    A workflow may be moved from one provider to another provider by extracting the metadata from an executing workflow describing the workflow state as part of dehydrating the workflow, and transferring the metadata to a second workflow and rehydrating the workflow at a second provider. An automated workflow manager may determine when to move the workflow and may facilitate moving with or without human intervention. When a workflow is moved from one provider to another, the workflow state may be moved without transferring executable code that executes the workflow.

  • Communication System and Method Between a Home Buyer, Seller, Strategic Business Source, and Lender

    A computerized system and method are presented for exchanging information between a buyer, a seller, a lender, and a strategic business source. The system permits sellers, lenders and strategic business sources to input buyers that are then submitted for activation. The buyers use the system to obtain information about items, while the sellers, lenders, and strategic business sources make consistent contact with the buyer in order to work with the buyer. Information about the buyers is shared with the sellers, lenders, and strategic business sources. A business plan is input into the system for the financial institution employing the lender while another business plan is input for the seller institution employing the seller. Activity on the computerized system is calculated for compliance with the business plan. Feedback is provided to management relating to whether the business plan is being met.

  • ANALYSIS OF IT RESOURCE PERFORMANCE TO BUSINESS ORGANIZATION

    A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings.

  • GENERATING CUSTOMER-SPECIFIC VEHICLE PROPOSALS BASED ON VEHICLE FINANCE PAY-OFF INFORMATION RECEIVED FROM A THIRD-PARTY ENTITY

    Methods, systems and computer program products for generating customer-specific vehicle proposals based on ongoing vehicle finance pay-off information received from a third party entity. The embodiments of the invention herein disclosed provide for efficient identification of potential customers based on their current vehicle and the ongoing financial obligation related to the current vehicle. A replacement vehicle is identified and a vehicle proposal, such as a sales or lease proposal, is generated for one or more of the identified potential customers.

  • SYSTEMS, METHODS AND APPARATUS FOR AUTHENTICATING ACCESS TO ENTERPRISE RESOURCES

    Systems, apparatus, methods and articles of manufacture provide for controlling access to one or more enterprise resources, including one or more functions of an enterprise device, or other computing device, based on information about one or more activities of a user. Some embodiments provide for determining an intuitive challenge question having a corresponding response, such as an intuitive password.

  • Method and System for Electronic Delivery of Essential Mail Items

    A delivery server, and a method of operating same for providing an trusted electronic mail service for the delivery of items to a subscriber. An associated database contains subscriber details. The server receives from the subscriber a nomination of at least one service provider from which the subscriber wishes to receive electronic mail items. The nomination is stored in the database in association with the subscriber details. A trusted communications channel is established between the delivery server and a service provider computer system, for example via the Internet or other public network. The delivery server receives essential mail data from the service provider via the communications channel, and verifies that the subscriber wishes to receive a corresponding electronic mail item, by comparison with subscriber details and nominations stored in the database. In the event that the verification is successful, the delivery server delivers the electronic mail item to the subscriber.

  • SYSTEM AND METHOD FOR ADVERTISING LAST MINUTE AVAILABILITY OF SERVICES

    A system for connecting businesses with a customer community stores business registration information associated with the businesses, including the type of service offered by each business, and customer registration information including services of interest and contact information. A server receives information from a business via a communication interface that an offer is available for a limited time at a discount price, and sends information on the offer to a plurality of customers for whom the offer is relevant, based on stored customer information. Interested customers receiving the offer reply to the offer through the system, the system sends the replies to the business, and the business is charged a predetermined fee for connecting the customers to the business based on the number of replies to the offer received by the business through the system.

  • SYSTEM AND METHOD FOR ADVERTISING LAST MINUTE AVAILABILITY OF SERVICES

    A system for connecting businesses with a customer community stores business registration information associated with the businesses, including the type of service offered by each business, and customer registration information including services of interest and contact information. A server receives information from a business via a communication interface that an offer is available for a limited time at a discount price, and sends information on the offer to a plurality of customers for whom the offer is relevant, based on stored customer information. Interested customers receiving the offer reply to the offer through the system, the system sends the replies to the business, and the business is charged a predetermined fee for connecting the customers to the business based on the number of replies to the offer received by the business through the system.

  • AUTOMATICALLY CREATING BUSINESS APPLICATIONS FROM DESCRIPTION OF BUSINESS PROCESSES

    An application builder tool creates business applications from user provided business descriptions. The application builder is customized using metadata and the metadata may be extended. The metadata provides a set of business terms to the user and the information required to generate an application from those terms. The user either selects terms from the list or enters new business terms to describe the business problem they want the application to automate. The application builder analyzes the terms the user provides and uses the metadata associated with those terms to select, generate and combine business application components. The result is a functioning business application.

  • System and Method For Intelligent Job Hunt

    A system, computer readable storage medium, and computer-implemented method performs an intelligent job hunt to determine a sorted set of job openings relevant to a user's career goals. An intelligent job hunt engine uses user profile information to query a job openings index for job's relevant to the user. Results of the query are filtered and sorted according to their relevance to different career goals. A job readiness evaluator determines readiness scores indicative of the user's preparedness for reaching a career goal. Specific action items are generated based on the user's interaction with the sorted job openings and the user's job readiness scores.

  • Software Protection Using an Installation Product Having an Entitlement File

    Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product. Also, techniques for facilitating security compliance of a computer program product include providing an encoded version of a computer program product, and providing an installation product builder for the computer program product, wherein the installation product builder creates an installation product in a computer storage medium using a client identity and the encoded version of the computer program product during a registration process, and wherein the created installation product comprises an entitlement file to facilitate security compliance of the computer program product.

  • Method and Apparatus for Graphical Presentation of Firewall Security Policy

    A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall.

  • IDENTITY ASSERTION FRAMEWORK

    Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service (STS) is configured to receive a request for a first token from a consumer and to issue the first token to the consumer. The first STS is associated with a first security domain, and the first token is issued according to a first issuing policy of the first security domain. A service provider within a second security domain receives the first token and makes a determination whether the first token is invalid in the second security domain. A second STS receives the first token from the service provider, determines that the first token was issued by the first STS, and validates the first token according to a federation policy between the first security domain and the second security domain.

  • SYSTEMS, METHODS AND APPARATUS FOR AUTHENTICATING ACCESS TO ENTERPRISE RESOURCES

    Systems, apparatus, methods and articles of manufacture provide for controlling access to one or more enterprise resources, including one or more functions of an enterprise device, or other computing device, based on information about one or more activities of a user. Some embodiments provide for determining an intuitive challenge question having a corresponding response, such as an intuitive password.

  • Network Connecting Device and Method

    A network connecting device includes: a network device for connecting to the network; a profile generation determination section for determining whether or not to generate a profile including information necessary for forming a connection with the network; a profile generation section for generating the profile when the profile generation determination section determines to generate the profile; a profile management section for managing the profile generated by the profile generation section; and a network connection section for controlling the network device and connecting to the network, based on the profile managed by the profile management section.

  • Scalable Distributed Web-Based Authentication

    Web-based authentication includes receiving a packet in a network switch having at least one associative store configured to forward packet traffic to a first one or more processors of the switch that are dedicated to cryptographic processing if a destination port of the packet indicates a secure transport protocol, and to a second one or more processors of the switch that are not dedicated to cryptographic processing if the destination port does not indicate a secure transport protocol. If a source of the packet is an authenticated user, the packet is forwarded via an output port of the switch, based on the associative store. If the source is an unauthenticated user, the packet is forwarded to the first one or more processors if the destination port indicates a secure transport protocol, and to the second one or more processors if the destination port does not indicate a secure transport protocol.

  • METHODS AND APPARATUS FOR DYNAMIC CUSTOMIZATION OF CLINICAL WORKFLOWS

    Methods and apparatus for dynamic customization of clinical workflows are disclosed. An example method includes receiving a script that implements one or more actions of a clinical workflow from a first healthcare entity that utilizes an electronic clinical information system, wherein the electronic clinical information system aggregates healthcare information from a plurality of healthcare entities including the first healthcare entity; loading the script into a dynamic module core framework that interacts with a runtime environment to execute application bundles; and publishing the script of the dynamic module core framework to the runtime environment such that the clinical workflow is installed into the electronic clinical information system dynamically at runtime.

  • AUTHENTICATING A PROCESSING SYSTEM ACCESSING A RESOURCE

    Provided are a method, system, and article of manufacture for authenticating a processing system accessing a resource. An association of processing system identifiers with resources, including a first and second resources, is maintained. A request from a requesting processing system in a host is received for use of a first resource that provides access to a second resource, wherein the request is generated by processing system software and wherein the request further includes a submitted processing system identifier included in the request by host hardware in the host. A determination is made as to whether the submitted processing system identifier is one of the processing system identifiers associated with the first and second resources. The requesting processing system is provided access to the first resource that the processing system uses to access the second resource

  • METHODS AND APPARATUS TO MANAGE INSTANCES OF AN ENTERPRISE CLINICAL INFORMATION SYSTEM

    Methods and apparatus to manage instances of an enterprise clinical information system are disclosed. An example apparatus includes an instance tracker to obtain information related to a first instance of a clinical information system associated with a first healthcare entity of the clinical information system, wherein a plurality of instances of the clinical information system are installed in association with a plurality of healthcare entities of the clinical information system; an extractor to extract information related to a first application of the first instance of the clinical information system associated with the first entity and to extract information related to a second application of a second instance of the clinical information system associated with a second entity of the clinical information system; a dependency calculator to calculate dependency data of the first and second applications, wherein the dependency data indicates whether the first application is dependent on the second application; and an updater to, when the dependency data indicates that the second application is dependent on the first application, update the second application in response to an update to the first application

  • Methods And Systems For Providing A Feedback User Interface For An Enterprise Social Network

    A method for providing an ongoing feedback user interface for an enterprise social network including users associated with an entity. The method can include receiving ongoing feedback from a first user. The ongoing feedback can comprise at least one comment about a second user of the enterprise social network and a name of the second user, the at least one comment is associated with one or more actions performed by the second user in a given time period. The ongoing feedback associated with the second user can be stored in one or more databases associated with the enterprise social network. In response to a request from the second user, the ongoing feedback can be transmitted to display the ongoing feedback on the user system associated with the second user.

  • Integrated Enterprise Software and Social Network System User Interfaces Utilizing Cloud Computing Infrastructures and Single Secure Portal Access

    A software-based method and system to provide a secure user interface on multiple and diverse electronic computing devices with a customized and secure dashboard feature. The systems and methods simultaneously integrate internally generated software utilities of an enterprise with externally accessed software operating in a `cloud computing` environment. The systems and methods can be used in management and operations that use computer based software, data management, creative processes and communication systems. The systems and methods reduce the requirement for additional programming to integrate or interchange equivalent and independently developed software for use within an enterprise. The systems and methods permit social network communications between members of an enterprise and an external community. The security features of the user interface portal permit collaborations between parties in an external community and enterprise members that can develop new processes that remain proprietary to the enterprise and parties of an external community.

  • SYSTEM AND METHOD FOR MANAGEMENT OF A PROGRAM THROUGHOUT ITS LIFECYCLE IN AN ORGANIZATION

    A system for facilitating management of one or more programs throughout their lifecycle in an organization is provided. The system comprises a Customer Relationship Management (CRM) module to create one or more programs, an Order Management System (OMS) module to create one or more tracks, and a program management module to create one or more projects. The system further comprises a resource allocation module for allocating resources for executing the one or more programs. The system further comprises a finance budgeting module for budgeting revenue, costs and profitability of the one or more programs. The system further comprises a program module that displays details of the one or more programs, the one or more tracks, and the one or more projects to one or more authorized users. The system further comprises a central repository to store data associated with the one or more programs.

  • SYSTEM AND METHOD FOR MANAGEMENT OF A PROGRAM THROUGHOUT ITS LIFECYCLE IN AN ORGANIZATION

    A system for facilitating management of one or more programs throughout their lifecycle in an organization is provided. The system comprises a Customer Relationship Management (CRM) module to create one or more programs, an Order Management System (OMS) module to create one or more tracks, and a program management module to create one or more projects. The system further comprises a resource allocation module for allocating resources for executing the one or more programs. The system further comprises a finance budgeting module for budgeting revenue, costs and profitability of the one or more programs. The system further comprises a program module that displays details of the one or more programs, the one or more tracks, and the one or more projects to one or more authorized users. The system further comprises a central repository to store data associated with the one or more programs.

  • ASSET MARKETING NETWORK BUSINESS METHOD AND MACHINE FOR USE IN CONDUCTING THE SAME

    A method of conducting an asset marketing network business, and a machine for conducting the same, is disclosed, which includes the steps of hosting an asset marketing network website and registering asset marketing network members, including asset posting member and asset buying members, where asset marketing network members are allowed access to the asset marketing network website. The machine stores data associated with an asset, including controlled asset posting data and uncontrolled asset posting data. The machine can be used to allow the asset buying member access to the controlled asset posting data, in response to receiving approval from the asset posting member to allow the asset buying member access to the controlled asset posting data. The machine can be used to store and release prequalification data associated with the asset buying member.

  • METHOD FOR EXTENDING BUSINESS SYSTEMS TO A MOBILE WORKFORCE

    Systems, software, and methods for reliable wireless communication are provided. In one aspect, a computer program control device, called a node, is configured to be transmitted from a first device for receipt and processing on a second, disparate device. The node comprises a collection of managed objects or managed object representations that is effective to control said disparate device. In one exemplary illustrative non-limiting implementation, the node is configured to control the processing of multiple data types.

  • Automated Political Risk Management

    A risk management method and system for facilitating analysis and quantification of risk associated with politically exposed persons is disclosed. A computerized political risk management system maintains a database relating individuals to politically sensitive positions and world events. A rating system is used to assess risk based upon criteria such as a position held, historical data and/or interpretation of world events. The system can generate a risk quotient or other rating based upon a weighted algorithm applied to the criteria. The risk quotient is indicative of risk associated with an account. Actions commensurate with a risk quotient can be presented to an institution to help the institution properly manage risk associated with a politically exposed person. A log or other stored history can be created such that utilization of the system can mitigate adverse effects relating to a problematic account.

  • PRODUCTS AND PROCESSES TO FACILITATE FINANCING IN A VIDEO GAME

    According to an embodiment, players can obtain funding to assist them in developing and creating virtual assets and game environments. In return the player can provide a benefit to the funding source. Funding sources include taxes, fees, licenses, bond issuance, loans, investors, commercial paper, convertible debt, bills, notes, debt issuance, promissory notes, venture capital, the issuance of private shares, transforming the game environment into a public company through an initial public offering, or through a follow on offering such as the issuance of common stock, preferred stock, and treasury stock.

  • PRODUCTS AND PROCESSES TO FACILITATE FINANCING IN A VIDEO GAME

    According to an embodiment, players can obtain funding to assist them in developing and creating virtual assets and game environments. In return the player can provide a benefit to the funding source. Funding sources include taxes, fees, licenses, bond issuance, loans, investors, commercial paper, convertible debt, bills, notes, debt issuance, promissory notes, venture capital, the issuance of private shares, transforming the game environment into a public company through an initial public offering, or through a follow on offering such as the issuance of common stock, preferred stock, and treasury stock.

  • FUNDING SYSTEM FOR A VIDEO GAME

    According to an embodiment, a video game permits players to provide funding to other players. Such funding may be used to develop and create virtual assets and game environments. In return the receiving player can provide a benefit to the funding source. Funding sources include taxes, fees, licenses, bond issuance, loans, investors, commercial paper, convertible debt, bills, notes, debt issuance, promissory notes, venture capital, the issuance of private shares, transforming the game environment into a public company through an initial public offering, or through a follow on offering such as the issuance of common stock, preferred stock, and treasury stock.

  • FUNDING SYSTEM FOR A VIDEO GAME

    According to an embodiment, a video game permits players to provide funding to other players. Such funding may be used to develop and create virtual assets and game environments. In return the receiving player can provide a benefit to the funding source. Funding sources include taxes, fees, licenses, bond issuance, loans, investors, commercial paper, convertible debt, bills, notes, debt issuance, promissory notes, venture capital, the issuance of private shares, transforming the game environment into a public company through an initial public offering, or through a follow on offering such as the issuance of common stock, preferred stock, and treasury stock.

  • ELECTRONIC COMMERCE TRANSACTIONS WITHIN A MARKETING SYSTEM THAT MAY CONTAIN A MEMBERSHIP BUYING OPPORTUNITY

    The present invention is directed to a system and method for providing complete electronic commerce ("E-Commerce") transactions and solutions for a marketing company's products via the World Wide Web, including facilities for signing up new customers and recruiting, training and supporting new Independent Business Owners through an interactive online process. In another aspect, the present invention relates to the combination of a marketing business with a membership buying opportunity using both electronic commerce and face-to-face transactions. The present invention is also directed to a system and method for combining a marketing business with a membership buying opportunity, so that Independent Business Owners participating in the marketing plan can introduce customers to a membership buying opportunity and earn bonuses or commissions based on the purchases by those members, while Members in the buying opportunity can consume products or, at their option, qualify to become Independent Business Owners.

  • ELECTRONIC COMMERCE TRANSACTIONS WITHIN A MARKETING SYSTEM THAT MAY CONTAIN A MEMBERSHIP BUYING OPPORTUNITY

    The present invention is directed to a system and method for providing complete electronic commerce ("E-Commerce") transactions and solutions for a marketing company's products via the World Wide Web, including facilities for signing up new customers and recruiting, training and supporting new Independent Business Owners through an interactive online process. In another aspect, the present invention relates to the combination of a marketing business with a membership buying opportunity using both electronic commerce and face-to-face transactions. The present invention is also directed to a system and method for combining a marketing business with a membership buying opportunity, so that Independent Business Owners participating in the marketing plan can introduce customers to a membership buying opportunity and earn bonuses or commissions based on the purchases by those members, while Members in the buying opportunity can consume products or, at their option, qualify to become Independent Business Owners.

  • ELECTRONIC COMMERCE TRANSACTIONS WITHIN A MARKETING SYSTEM THAT MAY CONTAIN A MEMBERSHIP BUYING OPPORTUNITY

    The present invention is directed to a system and method for providing complete electronic commerce ("E-Commerce") transactions and solutions for a marketing company's products via the World Wide Web, including facilities for signing up new customers and recruiting, training and supporting new Independent Business Owners through an interactive online process. In another aspect, the present invention relates to the combination of a marketing business with a membership buying opportunity using both electronic commerce and face-to-face transactions. The present invention is also directed to a system and method for combining a marketing business with a membership buying opportunity, so that Independent Business Owners participating in the marketing plan can introduce customers to a membership buying opportunity and earn bonuses or commissions based on the purchases by those members, while Members in the buying opportunity can consume products or, at their option, qualify to become Independent Business Owners.

  • COMMUNICATION MANAGEMENT SYSTEMS AND METHODS

    A computer system that is adapted for: (A) displaying a geographical map on a display screen; (B) displaying a plurality of icons on the geographical map, each of which generally represents the current location of at least one individual; (C) allowing a user to select a group of the icons; and (D) after the user selects the group of icons, providing messaging functionality for allowing the user to send a common message to the respective portable computing devices of at least substantially all of the individuals who correspond to the selected group of icons. In particular embodiments, the system allows the user to send the message by executing a single activity, such as selecting a single button. The system may also be configured to approximate the current location of an individual based on the individual's current travel itinerary.

  • Enterprise Product Management System and Method

    A comprehensive enterprise product management system to effectuate efficient product time to market. The system includes a process model and a data model. The process model consists of entities that represent typical concepts in a trade setting and relationships among these entities. The data model represents the complexity of a product, including defining the entities that comprise the product and the relationship among these entities. The process model and the data model accommodate the dynamic characteristics associated with both product definition and channels of trade.

  • SYSTEM AND METHOD FOR ENSURING COMPLIANCE WITH ORGANIZATIONAL POLICIES

    A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.

  • SYSTEM AND METHOD FOR ENSURING COMPLIANCE WITH ORGANIZATIONAL POLICIES

    A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.

  • SYSTEMS AND METHODS PROVIDING BUSINESS DATA VIA A TELEVISION BASED ON A BUSINESS CONTEXT

    According to some embodiments, a stream of television information to be displayed on a television may be received. In substantially real time, the received television information may be automatically analyzed to determine a business context. Based on the determined business context and business data stored at a remote business server, an interaction with a viewer may be arranged via the television.

  • Consistent set of interfaces derived from a business object model

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction.

  • Business constructs

    Various systems, processes, tools and techniques are provided for managing and processing data within a computing environment including a data warehouse component. Certain embodiments of the business construct of the invention can provide an interim stage for mapping data prior to loading the data into the data warehouse. When embodied as standard interface files, each of the business constructs can represent a business object that is of importance to a corporate entity or other enterprise.

  • Method and system for storing and distributing social and business contact information online

    An information management and distribution method and system for updating contact information over a network. A plug-in associated with a cloud-based back-end unit interacts with a Web application. A virtual card comprising a set of pluggable user interface components associated with the plug-in can be displayed in a user interface associated with the Web application. The contact information with respect to a user can be updated and automatically distributed to other users associated with the Web application that is configured with the virtual card plug-in module. The back-end unit can be employed to keep track of the contact information in a database and provide management functions associated with the data via a Web services application programming interface. A hard copy version of the virtual card can also be rendered utilizing a variable data composition engine and a rendering technology.

  • Managing consistent interfaces for business document message monitoring view, customs arrangement, and freight list business objects across heterogeneous systems

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a business document message monitoring view, a customs arrangement, and/or a freight list business object.

  • Managing consistent interfaces for business objects across heterogeneous systems

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a cost model, a current account contract, and/or a collateral constellation business object.

  • Creating parallel control flows in business process models

    A system may include a composition engine that is configured to include a receiving engine that is configured to receive a series of states and transitions from an object lifecycle. The composition engine may include a computation engine that is configured to compute actions from the transitions and to compute preconditions and effects for the actions from the states. The composition engine may include a relations engine that is configured to compute relations between the actions and a parallel process engine that is configured to generate a parallel process fragment that includes at least two of the actions based on the relations between the actions.

  • Managing consistent interfaces for automatic identification label business objects across heterogeneous systems

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to an automatic identification label, an automatic identification label device, and/or an automatic identification label device observation business object.

  • Contact management system and method

    In an embodiment of a method of providing contact information, the method includes creating a contact record in a contact management system, where a process associated with a subject of the contact record and/or a recipient of data associated with the contact record is included in creating the contact record. A unique serial number is generated corresponding to the contact record and the serial number is conveyed to the recipient. A request by an application is received for the contact record from the contact management system corresponding to the serial number and data associated with the contact record is transmitted to the application.

  • CAPITAL ASSET PLANNING SYSTEM

    A capital asset planning system for selecting assets for improvement within an infrastructure that includes one or more data sources descriptive of the infrastructure, one or more databases, coupled to the one or more data sources, to compile the one or more data sources, one or more processors, each coupled to and having respective communication interfaces to receive data from the one or more databases. The processor includes a predictor to generate a first metric of estimated infrastructure effectiveness based, at least in part, on a current status of the infrastructure, a second metric of estimated infrastructure effectiveness based, at least in part, on a user-selected, proposed changed configuration of the infrastructure, and a net metric of infrastructure effectiveness based, at least in part, on said first metric and said second metric. The system also includes a display, coupled to have the one or more processors, for visually presenting the net metric of infrastructure effectiveness, in which the assets for improvement are selected based, at least in part, on the net metric of infrastructure effectiveness.

  • SYSTEM AND METHOD FOR TRAVEL ROUTE PLANNING USING SAFETY METRICS

    Systems and methods are described to receive a safety preference; calculate a temporary route; analyze a portion of the temporary route to determine whether the portion is sufficiently safe based on the safety preference; modify the portion of the temporary route when the portion is not sufficiently safe; and present the temporary route. Other systems and methods are described.

  • ROUTE PLANNING USING LOCATION/TIME ENCODED DATA FROM LOCATION AWARE SNOWPLOWS

    Techniques are described for using geographic location data of snowplows to update a snow depth associated with a section of a surface street. The route of the snowplow may be tracked continuously which allows the snow depth of the street to be reset in real-time. The updated snow depth may then be used to generate a cost of travelling on the street. The travelling cost may then be used to plan a route through the region. Alternatively, the cost may be graphically displayed on a map to permit a user to determine which surface streets to avoid. In another embodiment, the cost of travelling on a particular street may be changed by the attributes of the vehicle that will navigate the snow-covered roads, driver's experience, or the geographic terrain of a road. This new cost may then be used, for example, to plan a route or display roads to avoid.

  • METHODS AND SYSTEMS FOR PLANNING APPLICATION DEPLOYMENT

    According to one example, there is provided a method of deploying applications in a computer system. The method comprises obtaining, for each of a plurality of computer applications, a set of application characteristics, assigning, based on the obtained characteristics, each of the plurality of applications to one of a set of predetermined application models, and determining, based in part on the obtained characteristics and in part on application model compatibility data, a set of hardware characteristics, a virtual server distribution plan, and an application distribution plan.

  • APPLICATION CONFIGURATION FRAMEWORK FOR ENTERPRISE RESOURCE PLANNING APPLICATION INSTALLATION

    A configuration application utilizes an application configuration framework to create a configuration questionnaire to dynamically manage an enterprise resource planning (ERP) application installation process. The configuration application imports an ERP system's metadata to configure the ERP application installation through the application configuration framework. The configuration application requests question parameters from a configuring user to configure the ERP application installation according to the metadata. Subsequently, the configuration application creates a configuration questionnaire for the ERP application installation based on the question parameters.

  • ENHANCED MULTIPLE RESOURCE PLANNING AND FORECASTING

    A system configuration and techniques for optimizing schedules and associated use predictions of a multiple resource planning workflow are disclosed herein, applicable to environments such as radiologist scheduling in a teleradiology workflow. In one embodiment, a series of computing engines and components are provided to allow detailed forecasting and the generation of customized recommendations for scheduling and other resource usage scenarios. This forecasting can factor resource efficiencies, changes in resource demand volume, resource specialties, resource usage preferences, expected future events such as the removal or addition of resources at future times, and other resource availability or usage changes. The forecasts may be further enhanced through the use of historical data models and estimated future data models. Additionally, a calendar and other tools may be presented through a user interface to allow forecast and scenario customization based on selection of a series of future dates.

  • POWER USAGE PLANNING FOR A VEHICLE

    A method for providing route plans for a plug-in hybrid electric vehicle (PHEV) includes: receiving a destination from a user of the PHEV; determining a route from a current location of the PHEV to the destination; determining locations of one or more external power sources that can provide power to recharge batteries of the PHEV and that are located along the route; forming, with a computing device, a travel plan that includes at least one of: planned recharging stops selected from the locations, modes of operation for the PHEV along the route, and an order in which power provided by the external sources is used by the PHEV.

  • ADVANCED PLANNING SYSTEM

    A production planning system for allocating production capacity to meet a demand includes an operational module and a simulating module. The operational module is for receiving demand inputs, calculating a consolidated demand based on the demand inputs, calculating and storing a production capacity, and creating a production plan. The simulating module includes a data retriever, a simulated data handler, and a simulating planner. The data retriever is for retrieving and storing consolidated demand and capacity data from the at least one operational processor. The simulated data handler is for receiving a simulated demand input and creating a simulated consolidated demand by adding the simulated demand input to the retrieved consolidated demand. The simulating planner is for creating a simulated production plan based on the simulated consolidated demand.

  • PLANNING ALLOCATION OF TIME-FREQUENCY RESOURCES IN WIRELESS OFDMA COMMUNICATION SYSTEMS

    A time-frequency resource allocation planner for planning allocation of time-frequency resources to sustain communication links from a common transmitter (TX) to multiple receivers (RX.sub.1, . . . , RX.sub.K) in a wireless OFDMA communication system includes a resource block selector configured to select a set (RBS) of time-frequency resource blocks (RB) for transmission of one packet for each communication link. A communication link quality measure provider is configured to determine a gain-to-interference-plus-noise ratio measure (G.sub.k) for each communication link. A transmit power and transmit rate estimator, connected to the resource block selector and the communication link quality measure provider, is configured to jointly estimate, within the selected set of time-frequency resource blocks, transmit power (P.sub.k) and transmit rate (R.sub.k) of the packets as functions of determined gain-to-interference-plus-noise ratio measures, to at least approximately minimize expected transmitter energy consumption.

  • SYSTEM AND METHOD OF ADAPTIVE LOGISTICS PLANNING

    A system and method of logistics planning. The method includes storing configuration parameters related to time period planning and reorder point planning in a supply chain. The method further includes receiving demand data corresponding to a demand measurement for an item in the supply chain. The method further includes comparing the demand data and the configuration parameters. The method further includes selecting one of time period planning and reorder point planning for the item as a result of the comparison. In this manner, reordering for items may be adaptively selected between time period planning and reorder point planning in accordance with the actual (measured) demand for the items.

  • ONBOARD FLIGHT PLANNING SYSTEM

    According to the application, a method for generating a flight route of an aircraft by an aircraft based computer system is disclosed. The method comprises the execution the following steps, which are executed by the aircraft based computer system. A mission specific data subset is received from a ground system. It is checked whether there are predefined routes from a departure airport to a destination airport. If it is determined that predefined route are available which are in accordance with over-flight permissions the predefined routes are used as a set of candidate routes for deriving a flight route. Otherwise, a set of proposed flight routes is generated which comprises at least one proposed flight route. Over-flight permissions are checked for the set of proposed flight routes. The steps of generating a set of proposed flight routes and of checking the over-flight permissions are repeated until at least one proposed flight route is found to be in accordance with the over-flight permissions. The one or more flight routes or routes which are in accordance with the over-flight permissions are used as a set of candidate routes for deriving a flight route. A flight route is derived from the set of candidate routes.

  • SECURITIZATION OF SALES PARTICIPATION CERTIFICATES

    The invention relates to financial products that provide a return that is a function of future sales/revenues, preferably gross sales/revenue, over a specified period of time. One embodiment of a method for creating such a financial product includes providing standard forms to an issuer and underwriter and standard terms to an issuer and investors. The terms to the issuer include providing capital to the issuer in exchange for a return that is a function of future sales over a specified period of time. The process further includes creating instruments representing investment in the financial product. The process creates the instruments in sufficient numbers and in appropriate denominations to facilitate trading in the financial product.

  • METHOD OF COMPARING TOTAL COST OF TIRE OWNERSHIP

    A method of comparing the total cost of ownership between different tires is provided. More particularly, a method for comparing the total cost when certain information, such as selling price, is not available for one of the tires is provided. The method can be used, for example, to determine the amount by which a tire must be discounted to account for performance differences relative to other tires.

  • METHODS AND SYSTEMS FOR USING MULTIPLE DATA SETS TO ANALYZE PERFORMANCE METRICS OF TARGETED COMPANIES

    New and improved methods and systems for modeling the performance of selected company metrics. Multiple, nontraditional sets of objective data along with mathematical analytical techniques are used to provide transparency and visibility into company performance relating to the particular metrics. Company inflection points and changes in strategy may be identified. The performance of a company and/or the performance of a selected industry or industry sector may be analyzed.

  • METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING FILES

    A method, a secure device and a computer program product for securely managing files. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server via a host, the host connected to the server through a telecommunication network, upon receiving a request for using a file stored on the secure device, processing the request at the secure device according to an updated use permission associated to the file, where the updated use permission is obtained by instructing at the secure device to establish a connection between the secure device and the server via the host and updating at the device the use permission associated to the file, according to permission data sent from the server through the established connection.

  • Information System Security Based on Threat Vectors

    A security system is provided. The system comprises a computer system, a memory accessible to the computer system, a data store, and an application. The data store comprises a threat catalog, wherein the threat catalog comprises a plurality of threat vectors, each threat vector comprising a plurality of fields, wherein each field is constrained to carry a value selected from a predefined list of enumerated values. The application is stored in the memory and, when executed by the computer system receives a threat report, wherein the threat report comprises an identification of at least one threat vector, determines a correlation between the at least one threat vector received in the threat report with the threat vectors comprising the threat catalog, and, based on the correlation, sends a notification to a stakeholder in an organization under the protection of the security system.

  • METHOD AND SYSTEM FOR APPLICATION-BASED POLICY MONITORING AND ENFORCEMENT ON A MOBILE DEVICE

    A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy enforcement code into a previously un-monitored software application package that is installable on a mobile device, and executing the monitoring and policy enforcement code during normal use of the software application by a user of the mobile device.

  • DEPLOYMENT OF BUSINESS PROCESSES IN SERVICE-ORIENTED ARCHITECTURE ENVIRONMENTS

    A computer-implemented business process deployment system and method are disclosed. The system includes memory which stores a design tool which receives a business process description and generates a deployment package composite based thereon. The business process description includes a set of business process activities for a business process, each of the business process activities in the set depending on abstract services for implementing the business process activity. An abstract bindings repository stores mappings between the abstract services and corresponding real services employed by an associated real service employing system. The deployment package composite is configured to bind the abstract service dependencies to the real services in the abstract bindings repository to generate a deployable business process composite that is deployable in the associated real service employing system. A processor implements the design tool.

  • Optimal Source Interface Selection

    Aspects of the subject matter described herein relate to selecting a source interface with which to establish a connection. In aspects, a profile for each network location a host has seen is maintained in a data store. The profile includes information about the network interfaces available to a source host at the network location. This information indicates, among other things, the reliability of each interface of the source host. Based on the profile, an interface is selected with which to establish a connection. If the interface is unsuccessful in establishing the connection, the interface is de-prioritized and another interface may be selected.

  • METHOD AND SYSTEM FOR CREATING AND FACILITATING THE TRADING OF A FINANCIAL PRODUCT

    A method and system for intra-period estimation of index value includes the steps of providing an intra-period estimation of index value software program in a computer readable medium that is maintained in a host computer. Information is received concerning a financial investment from a data contributor, and the information includes data reported on a predetermined basis. A value is determined for each financial investment using the information. Additional information concerning the financial investment is received that includes observable data regarding each financial investment. An intra-period index is calculated using the additional information that is used in valuation of the financial activity.

  • MONITORING ADVERTISEMENT IMPRESSIONS

    A targeted in-game advertising system is provided where advertising content may be delivered to a video game network environment. Advertisements may be delivered through the tagging of advertising assets in the video game environment according to one or more characteristics including user geographical location, personal preferences, a personal profile, video game preferences or video game genre. Methodologies for tracking advertising impressions are also provided based on monitoring the video game environment to determine the quality of impression to which the user is exposed in the video game environment.

  • AUTOMATICALLY CONVERTING TEXT TO BUSINESS GRAPHICS

    A facility for generating a graphic image is described. The facility receives from a user a body of text whose creation is not subject to any rules or prototypes. The facility discerns from the body of text a textual organization. The facility then generates a graphic image conveying the discerned textual organization.

  • SYSTEM AND METHOD FOR MANAGING CAMPAIGN EFFECTIVENESS BY A MERCHANT

    Disclosed herein is a method is provided for managing campaign effectiveness by a merchant. The method comprising: initiating a campaign by one or more merchants, accessing transaction data from one or more financial institutions, extracting metadata associated with the transaction data in accordance with at least one rule, analyzing the metadata to identify transaction data associated with the campaign and the one or more merchants, analyzing the transaction data associated with the campaign and the one or more merchants and providing information associated with the campaign to the merchant.

  • SYSTEMS AND METHODS FOR OFFER SCORING

    Disclosed herein is a method for providing users with saving opportunities of interest. The method includes developing a predictive model of user purchase behavior, evaluating a plurality of available savings opportunities from a savings opportunity data base using the model of user purchase behavior, selecting from the plurality of savings opportunities one with the highest likelihood of acceptance and communicating the selected savings opportunity to the user.

  • MOBILE DYNAMIC ADVERTISEMENT CREATION AND PLACEMENT

    A system for targeted delivery of advertising including the steps of: (a) receiving a navigation request from a mobile communication facility; (b) receiving an indicator input comprising (i) a geographical location in which the user is situated and (ii) queries or accesses to content associated with a plurality of other mobile communication facilities within the geographical location; (c) receiving a business rule; (d) receiving rendering capability data corresponding to a rendering capability of the mobile communication facility; (e) dynamically creating an advertisement based at least in part on the navigation request, the indicator input, the business rule, and the rendering capability data; and (f) transmitting the advertisement to the mobile communication facility for display thereon.

  • PRODUCT DRIVEN APPROACH TO TECHNOLOGY PROVISIONING, OPERATIONS, AND BILLING

    Systems and methods for a product driven approach to technology provisioning, operations, and billing are provided. Some embodiments provide an Information Technology (IT) business architecture built around the product driven methodology. This architecture can be designed to optimize the demand side provisioning of technology products to meet business intent and the execution of supply side assembly and implementation lifecycle. A technology model can be used that recursively decomposes services and products into various components. As a result, the technology model allows for effective and efficient provisioning, pricing, and impact assessment of the organization's technology to thereby drive the efficiency of scale and the automation of the provisioning, the finance, and the operation businesses. Moreover, by representing everything in technologies and products, including people, within the technology model, then determining the cost of the product and tracking usage provides an effective consumption-based Bill of IT.

  • SYSTEMS AND METHODS TO PROCESS LOYALTY BENEFITS

    A system and method to provide a universal loyalty currency, facilitate exchange of loyalty benefits, and allow payments using loyalty benefits. A method includes: receiving registration information to associate account information of a payment account with at least one loyalty account to enable conversion of first loyalty benefits to second loyalty benefits; receiving, for a transaction, an authorization request identifying the account information and requesting the use of the second loyalty benefits to fund at least a portion of the transaction; and processing the transaction using the second benefits converted from the first loyalty benefits hosted in the loyalty account and funds from the payment account.

  • INDUSTRY SPECIFIC BRAND BENCHMARKING SYSTEM BASED ON SOCIAL MEDIA STRENGTH OF A BRAND

    A brand monitoring platform (BMP) for brand benchmarking based on a brand's social media strength is provided. The BMP acquires input information on the brand and identifies industries related to the brand and competing brands. The BMP acquires social media information related to the brand and the competing brands from multiple social media sources via a network, dynamically generates categories in one or more hierarchical levels in each of the industries based on an independent analysis of the social media information, and sorts the social media information into the categories using a sorting interface. The BMP generates an aggregate score using an audience score determined by measuring an aggregate reach of the brand and the competing brands based on weighted audience score metric parameters, and an engagement score determined by measuring interaction between the brand and the competing brands and their followers based on weighted engagement score metric parameters.

  • SYSTEM AND METHOD OF OBTAINING MERCHANT SALES INFORMATION FOR MARKETING OR SALES TEAMS

    Disclosed herein is a method of obtaining merchant sales information for marketing or sales teams. Including accessing transaction data from one or more financial institutions and extracting metadata associated with the transaction data in accordance with at least one rule. The metadata is then analyzed to identify transaction data associated with one or more merchants. The transaction data associated with the one or more merchants is provided to the marketing or sales teams.

  • SYSTEMS AND METHODS FOR AN INTEGRATED ONLINE PORTAL AND MARKETPLACE FOR EVENT-RELATED ITEMS

    The present disclosure is directed to systems and methods for integration of systems associated with ticketing, advertising, membership, social networking, merchandizing, and/or similar commercially valuable functions. An integrated marketplace system, referred to variously as an integrated system or integrated portal, may comprise or communicate with modules for retail services, social networking, marketing information, ticketing sales, merchandise sales, membership services, or any other type and form of module. In some embodiments, the systems and methods discussed herein allow teams, bands, event operators or other attraction providers to sell tickets direct to consumers or fans, reducing fees and costs due to ticket resellers, while retaining customer information for future targeted marketing. Accordingly, teams, bands, artists, or other attractions may utilize the integrated platform to provide a fan- or consumer-centric experience with ticket sales and merchandise offers made dynamically based on analyzing user behavior, past purchasing behavior, and/or social networking data.

  • SYSTEMS AND METHODS FOR MONITORING AGRICULTURAL PRODUCTS

    The present invention relates to systems and methods for monitoring agricultural products. In particular, the present invention relates to monitoring fruit production, plant growth, and plant vitality.

  • ENERGY MANAGEMENT SYSTEM AND METHOD

    A method of managing at least one network device at a site includes providing a web-based control selector to manage a detection module to control the at least one network device at the site. The method includes enabling the detection module in response to an enabled setting of the web-based control selector, and initiating a change in an operating condition of the at least one network device at the site in response to the enabled detection module and based on a detected presence of a user at the site. The method proceeds by disabling the detection module in response to the disabled web-based control selector.

  • COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE CONTENT SHARING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT

    In embodiments of the present invention improved capabilities are described for securely sharing computer data content that allows for the secure un-sharing of the content. The facility to un-share content may be implemented through a secure exchange server, where the content is being shared along with a secure protection feature that when altered results in the un-sharing of the content. This secure un-sharing facility may be used to securely share content beyond the secure protective facilities of an enterprise, out to users in other companies, into the public space, to users not intended to get the content, and the like, where the sender maintains control to access of the content no matter where or to who the content has been distributed. In this way, the secure sharing of content is made to be easy across corporate boundaries at the user level and at the individual document level.

  • SYSTEMS AND METHODS FOR CONTENT EXTRACTION

    Systems and methods are presented for content extraction from markup language text. The content extraction process may parse markup language text into a hierarchical data model and then apply one or more filters. Output filters may be used to make the process more versatile. The operation of the content extraction process and the one or more filters may be controlled by one or more settings set by a user, or automatically by a classifier. The classifier may automatically enter settings by classifying markup language text and entering settings based on this classification. Automatic classification may be performed by clustering unclassified markup language texts with previously classified markup language texts.

  • Portable Device Application Quality Parameter Measurement-Based Ratings

    A development environment simulates conditions combining device states, events, hardware configurations, and usage scenarios, and applies specific rating criteria to arrive at individual quality parameter ratings. Ratings are provided for quality parameters such as user experience, cost awareness, battery friendliness, responsiveness, global readiness, device independence, application stability. For example, battery friendliness depends on criteria such as battery life in a specified usage scenario, whether unused peripherals are powered, whether application program interfaces designated as power-hungry are avoided, whether darker color themes can be chosen over lighter colors, and whether batching is used for network data communications. Some rating criteria are application-category-specific. For example, security is rated differently for a Finance application than a Music application. The development environment provides specific warnings to indicate ways in which portable device applications and other applications can improve the ratings they receive. Ratings can be published in an application marketplace.

  • METHOD AND APPARATUS TO ACCELERATE AND IMPROVE EFFICIENCY OF BUSINESS PROCESSES THROUGH RESOURCE ALLOCATION

    The present invention is directed to a computer-implemented method, program storage device and system to enable data-driven communications to facilitate business processes. Real-time requests for information, services, or the like can be solicited in a way that those selected to provide responses have certain attributes, and the supplier is selected for the solicitation automatically and instantaneously notified of the request based on automatic selection of those attributes. The notification is instantaneously communicated using more than one channel of communication, potentially in a mode that the potential supplier has indicated is a more likely way of actually and instantly receiving the request. The system further provides at least one mechanism by which all of the selected suppliers can instantly respond to the request, which is then communicated to the requestor.

  • Generating Test Cases for Covering Enterprise Rules and Predicates

    Techniques, an apparatus and an article of manufacture for generating test cases for covering enterprise rules and predicates. A method includes obtaining a web application and a specification of at least one enterprise rule, constructing a link graph that captures at least one navigation path in the web application, and performing a traversal of the web application guided by the link graph to generate an executable test case that drives the web application along one of the at least one navigation paths in which the at least one enterprise rule is covered to determine the web application's conformance to the at least one enterprise rule, wherein the executable test case is a sequence of one or more test steps, each test step representing an action to be performed on the web application and/or a verification of the application state.

  • ENABLING MULTI-TENANCY FOR A COMMERCE SERVER

    A method and system for enabling multi-tenancy in a commerce server is provided. The method includes receiving software comprising an operating system, integrated development environment (IDE) software, commerce server middleware software, and database software. A virtual image instance of operating system, the IDE software, and the database software is provisioned to a virtual instance. User IDs for access to the operating system instance are generated. Workspaces are generated and associated with the user IDs. The commerce server middleware software is configured such that the user IDs, hosts, and ports are mapped to commerce server services associated with the commerce server middleware software. The database software is configured such that the virtual image instance is enabled to accept multiple concurrent logins associated with the user IDs.

  • GATEWAY CONSUMPTION FRAMEWORK

    According to some embodiments, a method and apparatus are provided to display to a developer, a list of business application user interface templates. a selected user interface template from the displayed list of business application user interface templates is received. Business logic definition parameters are also received. Based on the selected user interface template and the received business logic definition parameters, potential services available to be consumed by a business application from a suite of enterprise applications is determined and an indication of the list of potential services to the developer device is transmitted.

  • LOCAL SECURE SERVICE PARTITIONS FOR OPERATING SYSTEM SECURITY

    Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (LSSP), provides security services to other partitions. The service partitions (LSSPs) host those high assurance services that require strict security isolation, where the service can be shared across partitions and accessed even when the user is not connected to a network. The LSSP also can certify the results of any computation using a key signed by a TPM attestation identity key (AIK), or other key held securely by the hypervisor or a service partition. The LSSPs may be configured to provide trusted audit logs, trusted security scans, trusted cryptographic services, trusted compilation and testing, trusted logon services, and the like

  • Processing Data Feeds

    Exemplary embodiments allow performance of stream computations on real-time data streams using one or more map operations and/or one or more update operations. A map operation is a stream computation in which stream events in one or more real-time data streams are processed in a real-time manner to generate zero, one or more new stream events. An update operation is a stream computation in which stream events in one or more real-time data streams are processed in a real-time manner to create or update one or more static "slate" data structures that are stored in a durable manner.

  • SYSTEM AND METHOD FOR NETWORK CAPACITY PLANNING

    A method and system for network capacity planning are provided. The method includes: collecting utilization data related to a plurality of network resources on the network; determining a peak period for each of the network resources based on the utilization data; determining at least one key performance indicator (KPI) over the peak period for each of the network resources; aggregating each of the KPIs for each of the plurality of network resources; and outputting the aggregated KPIs. The system includes a data source module configured to collect utilization data related to a plurality of network resources; a peak period module configured to determine a peak period for each of the network resources based on the utilization data; a peak KPI module configured to determine at least one KPI over the peak period for each of the plurality of network resources; a KPI aggregation module configured to aggregate the KPIs for each of the network resources; and a processor module configured to output the aggregated KPIs.

  • LOGICAL CONTINGENCY ANALYSIS FOR DOMAIN-SPECIFIC LANGUAGES

    Embodiments relate to validating logical statements in code for domain specific languages. An aspect includes parsing logical statements and annotating constraint type logical statements with specific constraint annotations from the logical grammar of the domain specific language. A non-contradiction graph is built using specific constraint annotations constrained to represent cases satisfying the logical statements and is solved to find a case that satisfies the logical statement or prove that no such case exists, thus locating a contradiction. The non-contradiction graph is negated to form a non-tautology graph constrained to represent cases violating the logical statements and the non-tautology graph is solved to find a case that violates the logical statement or prove that no such case exists, thus locating a tautology. A report is provided regarding at least one case satisfying the logical statement and at least one case violating the logical statement whereby the logical statement is validated.