­
­
­
­

Inventi Impact - Human Resource

Patent Watch

  • Computer-implemented methods and systems for electronic document inheritance

    A computer-implemented method of managing electronic documents includes steps of providing a first electronic document, the first document including a plurality of first document content elements; providing a second electronic document, the second document including a plurality of second document content elements; defining a parent-child relation between the first document and the second document to form a hierarchy of electronic documents that includes the first and second electronic documents; defining an override relation to bind a selected first document content element to a selected second document content element, the override relation specifying an override type that determines whether the selected second document content element should be replaced by, appended to the selected first document content element or removed, and enforcing the at least one override relation binding the selected first document content element to the selected second document content element.

  • Contact center business modeler

    A method and apparatus are provided for automatic call distributors that route calls based in part on timely business information. The method includes providing a simulation model for calculating information and using this information from the model together with key process indicators information to generate decisions for routing calls.

  • Method and apparatus for creating an offline service-oriented architecture based application from an online service-oriented architecture based application

    Disclosed is a method and apparatus for automatically creating an offline enterprise application from an online enterprise application by importing the data from the online enterprise application to an offline system, including importing user interface (UI) metadata, enterprise services repository (ESR) data and application data from the online enterprise application and generating the UI and enterprise services from the imported UI metadata and ESR data respectively. The created offline enterprise application switches automatically between offline mode and online mode.

  • Method and apparatus for managing messaging identities

    A method and apparatus for use in a computer system comprising an email system that generates and receives email messages. The email system manages a first plurality of email messages comprising at least some of the email messages generated and received by the email system. The email system also has a global address catalog that comprises information and provides an index into the first plurality of email messages. The computer system further comprises an extension system that interfaces with the email system and manages a second plurality of email messages comprising at least some of the email messages generated and received by the email system. The method comprises creating an extender catalog, for indexing into the second plurality of email messages that comprises at least some information that is different than the information in the global address catalog.

  • Configuring and allocating software product technical services

    The present invention extends to methods, systems, and computer program products for configuring and allocating software product technical services. A service policy configuration defining one or more service models for the developing software product is received. A software product taxonomy, including one or more themes and corresponding technical services, for the developing software product is received. A service profile, including context on how the entity intends to utilize the developing software product, is received. The entity is authorized to utilize technical services associated with the developing software product in accordance with one of the service models in response to receiving the service profile. In other embodiments, a service request selection is made from a menu that lists themes and technical services associated with a software product. The service request is allocated to the identified service provider based on request allocation criteria. An entity is at least notified of a received answer.

  • System and methods for constructing personalized context-sensitive portal pages or views by analyzing patterns of users' information access activities

    The present invention relates to a system and methodology to assist users with data access activities and that includes such activities as routine web browsing and/or data access applications. A coalesced display or montage of aggregated information is provided that is focused from a plurality of sources to achieve substantially one-button access to user's desired web or data source information/destinations in order to mitigate efforts in retrieving and viewing such information. Past web or other type data access patterns can be mined to predict future browsing sites or desired access locations. A system is provided that builds personalized web portals for associated users based on models mined from past data access patterns. The portals can provide links to web resources as well as embed content from distal (remote) pages or sites producing a montage of web or other type data content. Automated topic classification is employed to create multiple topic-centric views that can be invoked by a user.

  • Method and system for business process management

    A process management system comprises a process model, a process engine and a process user interface. The process model stores predefined configurable process metadata components of one or more business management processes. The process engine configures the process metadata components. The process engine also generates user interface contents for a specific management process based on a set of the process metadata components relevant to the specific management process. The process user interface presents the user interface contents for configuration of the process metadata components, and for conducting the specific management process using the generated user interface contents.

  • Apparatus and method for visualizing the relationship between pluralities of sets

    A computer readable storage medium includes executable instructions to associate two or more data sets with two or more vertices in a Venn graph. An intersection of the two or more data sets is associated with a vertex in the Venn graph. A plurality of outliers is associated between the two or more data sets and the intersection of the two or more data sets with a plurality of vertices disposed between the two or more vertices and the vertex in the Venn graph.

  • Access and synchronization with enterprise applications using remote hosted solution

    A hosting center that is remote from a plurality of customer environments is provided so that users can interact with data from the user's selected customer environment. The data interaction includes bi-directional synchronization of data between that of the hosting center and that of the user's selected customer environment.

  • Apparatus and method for generating queries and reports

    A computer readable storage medium includes executable instructions to extract data model object information and report data values from data model objects in at least one semantic abstraction to define indexed fields. A search query is received. The search query is applied against the indexed fields to define matching data model objects and matching report data values. A proposed abstract query with at least one matching data model object and a corresponding semantic abstraction is generated.

  • Apparatus and method for transporting business intelligence objects between business intelligence systems

    A computer readable medium includes executable instructions to create a first export file that defines attributes and relationships associated with a first business intelligence object. A second export file that characterizes a second business intelligence object associated with the first business intelligence object is formed. The first export file and the second export file are combined into a composite export entity. The composite export entity is distributed.

  • Systems and methods for discovering customer center information

    A method for discovering customer center information includes receiving a plurality of customer center information from a plurality of respective information sources, and correlating the plurality of customer center information to determine an identity of a customer center agent accessing customer center resources.

  • Communication connectivity via context association, advertising sponsorship, and multiple contact databases

    Communication connectivity via context association is provided by associating targeted subscriber contact information with a key at a subscriber database. At a data center, the keys are associated with unique characteristics or aliases (contexts) of the subscribers, thereby facilitating context searching. A caller initiates a connection to a subscriber by providing a subscriber's context. The context is located and associated key identified. The key is resolved in the subscriber database, and the call routed. Use of the key allows subscriber connectivity without revealing, to the caller or to the data center, sensitive contact information. Through a caller database, call initiation occurs by subscriber alias identification in a caller's communication device; thereby foregoing inclusion of sensitive contact information within the caller's communication device. Communication connectivity can be advertiser sponsored, with advertisements accompanying messages selected by matching profile information of targeted subscribers with participating advertiser provided profile information of desired targeted subscribers.

  • Apparatus and method for report sharing within an instant messaging framework

    A computer readable medium includes executable instructions to facilitate an instant messaging conversation between a first computer and a second computer on a network. A first request for a report specified by the user of the first computer is processed. A first portion of the report is returned to a first output device of the first computer and a second output device of the second computer. An interaction signal characterizing an interaction with the first portion of the report is processed to produce a second portion of the report. The second portion of the report is routed to the first output device of the first computer and the second output device of the second computer.

  • Integrated system and method for validating the functionality and performance of software applications

    The system and method presented provides a multi-phase, end-to-end integrated process for testing application software using a standard software testing tool. The system and method involve integrating the functional, automated regression and performance phases of software application testing by leveraging deliverables at each phase so that the deliverables may be efficiently reused in subsequent test phases. Deliverables such as functional and technical test conditions and manual test scripts are used as inputs for each phase of the integrated tests. The use of leveraged requirements-based deliverables between test phases significantly reduces much of the repetitive testing typically associated with functionality and performance testing and minimizes repetition of testing errors discovered in earlier test phases. This integrated system and method for validating the functionality and performance of software applications by leveraging deliverables provides enhanced efficiencies, test procedure consistency throughout multiple test phases, consistent test results and high quality software applications.

  • LDAP grouping for digital signature creation

    A method and apparatus for grouping Light Weight Directory Access Protocol (LDAP) entries for signature generation. In one embodiment, the method includes grouping attributes of one or more repository entries to form a collection of values based on a pre-determined grouping policy. The method further includes generating a digital signature for the collection to authenticate any of the values in the collection.

  • Apparatus and method for providing employee benefits and/or employee benefits information

    A computer-implemented method, including storing or processing information regarding a benefit provided to an employee pursuant to an employee benefit relationship between the employee and a benefit provider established prior to, pursuant to, or during, a first employment relationship between the employee and a first employer, storing or processing information for providing or maintaining the benefit pursuant to or during a second employment relationship between the employee and a second employer, receiving a request for information regarding the benefit, processing the request for information regarding the benefit with a processing device, generating a message in response to the processing of the request for information regarding the benefit, and transmitting the message to a communication device associated with the employee, a benefit beneficiary, a second employer, or a benefit administrator, via, on, or over, the Internet and/or the World Wide Web.

  • Computerized predictive maintenance system and method

    A computerized system for performing predictive maintenance on an item of equipment includes a desired configuration database, an actual configuration database and a data processor. The data processor determines if an actual configuration complies with a desired configuration. The data processor determines an upgrade requirement for upgrading the actual configuration to the desired configuration if the actual configuration is noncompliant. The data processor further defines an interim solution that eliminates delay in the execution of the upgrade requirement on the item of equipment.

  • Reducing human overhead in text categorization

    A unique multi-stage classification system and method that facilitates reducing human resources or costs associated with text classification while still obtaining a desired level of accuracy is provided. The multi-stage classification system and method involve a pattern-based classifier and a machine learning classifier. The pattern-based classifier is trained on discriminative patterns as identified by humans rather than machines which allow a smaller training set to be employed. Given humans' superior abilities to reason over text, discriminative patterns can be more accurately and more readily identified by them. Unlabeled items can be initially processed by the pattern-based classifier and if no pattern match exists, then the unlabeled data can be processed by the machine learning classifier. By employing the classifiers in this manner, less human involvement is required in the classification process. Even more, classification accuracy is maintained and/or improved.

  • Method of running cable from a duct to a device

    Embodiments provide a method of running cables from an already-installed cable duct to devices. According to the method, a portion of a duct from which it is desirable for cable to be dropped is selected upon consideration of a first location of a first device to which a connection is desired. The method also includes punching a first aperture in the duct proximate the first portion, snaking a first cable from the duct through the first aperture, and connecting the first cable to the first device.

  • Establishment and maintenance of collaborative communication associations based on multiple contextual criteria

    A method, system, and computer program for dynamically setting up collaborative associations between a group of users, computing resources, and/or communication devices, where the constituents of the collaborative association are chosen based on a variety of contextual criteria. The dynamic collaboration enabler component determines the explicit identities of the parties that should be a part of the collaboration. The group of individual entities involved in the collaboration can change dynamically during the lifetime of the collaboration, based on appropriate changes in the contextual data. Such contextual data refers to both state variables associated with the collaboration software or infrastructure itself, or to the state of entities external to the collaboration. The duration of the collaborative association is specified either explicitly or through a set of context related conditions. The dynamic context enabler can detect when the set of termination conditions is satisfied and then automatically remove the collaborative association.

  • System and method for employing decision activities for providing inferences in a process execution environment

    A set of decision activities can be provided to a business process management and design software tool. The tool can be used to define various processes that contain one or more activities linked by transitions. During process design time, a business analyst can identify process-relevant data of the process to be presented to the end users. The relevant data can be rendered to the end users at runtime, along with a set of possible options for the activities in a process instance. Upon receiving a decision of the user, the process instance can follow the selected transition to a different activity. Over time, the system can capture the decisions taken by users and enter the data associated with these decisions into a data classifier. In doing so, the software tool can generate suggestions, provide probabilities, automate and distribute workloads, flag abnormalities and deviations and generally improve process design and management.

  • Database system and method with improved locks

    A method for handling database locks includes detecting a new query from an administrator for a set of database records. Next, it is determined whether the administrator has any chance of being authorized to acquire a new lock. If so, an attempt is made to acquire the new lock and, on the failure to acquire, the administrator is informed that the lock has already been acquired by a prior administrator. Optionally, the new administrator is also provided with identifying information of the prior administrator and contact information for the prior administrator. The new administrator is therefore pre-screened to determine whether there is any chance to acquire a new lock to reduce the chance that an unauthorized new administrator could lock the set of database records. Also, should the new administrator be authorized but not able to access the set of database records due to a prior lock, the new administrator can be informed of the identity and contact information concerning the holder of the prior lock.

  • Method and system of managing a business process

    A method of managing capacity in a business process on demand for providing a service to a service requester. The method comprises the steps of providing a business process having one or more service inputs, at least one service output, at least one capacity constraint having a capacity level and a queue located ahead of the capacity constraint having an upper queue threshold and a lower queue threshold. The method further comprises gathering with a performance monitoring subsystem a set of business process data, and adjusting with a capacity management subsystem the capacity level of the capacity constraint in response to the set of business process data gathered by the performance monitoring subsystem.

  • Apparatus and method for data charting with an extensible visualization library

    A computer readable storage medium includes executable instructions to define an abstraction layer disposed between a business intelligence application and a set of visualization libraries. The abstraction layer provides an application programmer interface for the business intelligence application to the set of visualization libraries. A visualization settings model is defined within the abstraction layer. The visualization settings model describes a visualization that can be rendered by a visualization library in the of visualization libraries.

  • Tracking removal or processing of debris material

    A method of performing debris clean-up following a disaster event can include creating an electronic load ticket for a pre-registered debris transporter to transport a load of debris from a site of debris origin to a site where the load of debris is to be emptied from the transporter; following transport of the load of debris to the second site, reading, from the electronic information storage device and to a portable computing device, the information uniquely identifying the debris transporter and the electronic load ticket; and upon verification that no alteration has been made to the transporter, receiving at the portable computing device information describing the load of debris that has been transported. In some implementations, the electronic load ticket includes information identifying the geographic location of debris origin, and is electronically stored on a portable electronic information storage device that contains information uniquely identifying the debris transporter.

  • Cooperative location based tasks

    A method for providing location dependent information to a user for selective colleague assistance. The method on a Client Wireless Component includes the steps of receiving location data from a plurality of Global Positioning System GPS satellites and transmitting the location data to an Active Calendar Component. The method further includes on an Active Calendar Component the steps of receiving Client Wireless Component location data and determining if within a threshold distance a Colleague item list exists for user completion.

  • Creation of highly available pseudo-clone standby servers for rapid failover provisioning

    Near clones for a set of targeted computing systems are provided by evaluating different configurations of the targeted computing systems including lists of installed hardware components and installed software components; determining a subset of components in common among the different configurations; determining an initial pseudo-clone configuration including the subset of components and excluding components which are not in common among the different target hardware configurations; for each of the targeted computing systems, producing a finish-out workflow of installation steps and components to be installed into an incompletely configured computer system according to the pseudo-clone configuration to produce an operational clone system; and outputting the pseudo-clone configuration and the workflow to a provisioning management system for subsequent realization of a pseudo-clone backup computing system and further subsequent realization of one or more operational clone systems.

  • Techniques for automatically provisioning a database over a wide area network

    Techniques for provisioning databases for users on a wide area network such as the Internet include a first party managing one or more database systems. Second parties subscribe to database services supported by the database systems managed by the first party. The first party provides, over a network, to database applications controlled by the second parties, access to the database services to which the second parties are subscribed. The database systems may use database appliances hosting both database process(es), and non-database process(es) tailored to the needs of the database process(es). A user is therefore able to obtain database resources from an Internet Database Service Provider (IDSP) without the user incurring the full costs of database administrator(s), dedicated database equipment facilit(ies), or even dedicated database device(s), depending on usage. Meanwhile, the IDSP incurs minimum staffing loads because of various self-service tools Costing model and automatic billing features are also described.

  • Medical diagnostic system acquisition and financing method and apparatus

    The present technique is associated with financial analysis of a transaction for medical resources. The technique allows a client to interact with a remote financial analysis system via a network interface, and to enter and transmit client data associated with a desired transaction to the financial analysis system for a transaction analysis. Accordingly, the client receives multiple transaction options tailored to the desired transaction and the client data.

  • System, method, and computer program product for managing and analyzing intellectual property (IP) related transactions

    A system, method, and computer program product for processing data are described herein. The system maintains first databases of patents, and second databases of non-patent information of interest to a corporate entity. The system also maintains one or more groups. Each of the groups comprises any number of the patents from the first databases. The system, upon receiving appropriate operator commands, automatically processes the patents in one of the groups in conjunction with non-patent information from the second databases. Accordingly, the system performs patent-centric and group-oriented processing of data. A group can also include any number of non-patent documents. The groups may be product based, person based, corporate entity based, or user-defined. Other types of groups are also covered, such as temporary groups. The processing automatically performed by the system relates to (but is not limited to) patent mapping, document mapping, patent citation (both forward and backward), patent aging, patent bracketing/clustering (both forward and backward), inventor patent count, inventor employment information, patent claim tree analysis, and finance. Other functions and capabilities are also covered, including the ability to utilize hyperbolic trees to visualize data generated by the system, method, and computer program product, and to track, analyze, and report on information related to intellectual property (IP) transactions, including license and related agreements.

  • Care funding and care planning system

    A system, method, and computer program product for processing data are described herein. The system maintains first databases of patents, and second databases of non-patent information of interest to a corporate entity. The system also maintains one or more groups. Each of the groups comprises any number of the patents from the first databases. A care funding and care planning system (10) generates a care plan option report (192) for a care receiver. The system (10) includes a client computer (14) having an input data map (16) for receiving and storing care-receiver data (13) including predetermined, critical categories of care-receiver information. A system processor (36) processes the care-receiver data (13) through knowledge management software (12) to evaluate and select from the care-receiver data (13) at least physical functional status (72), cognitive and sensory status (74), prospective functional status (76), living environment status (84), and long-term care resource status abstractions (88). A meta needs-resource weighting engine (56) assigns care-receiver specific values (160A) to the care-receiver data abstractions (72). A dynamic data base (48) allocates values to the weighted care-receiver data abstractions (72). A report generator (58) produces a care plan options report (192) for the care receiver.

  • Methods and systems for compliance monitoring knowledge base

    A knowledge base and methods for use in connection with a policy compliance monitoring system operative to determine exceptions to policies expressed by computer-executable policy statements. The system allows establishment, codification, and maintenance of enterprise policies, monitors electronic transactions of the enterprise from various and possibly heterogeneous data sources, detects exceptions to established policies, reports exceptions to authorized users such as managers and auditors, and/or provides a case management system for tracking exceptions and their underlying transactions. The knowledge base comprises extractor files that are utilized for extracting information from data sources for utilization in policy compliance monitoring, a mapper for normalizing data from the data sources against a system ontology and storing normalized data in a monitoring database, and computer-executable compliance policy statements used by a transaction analysis engine. The policy statements represent predetermined policies of the enterprise that apply to data stored in the monitoring database.

  • Grants management system

    A system and method for managing grants received from one or more sponsors is proposed. The grants management system receives a transaction request and retrieves data associated with the transaction request from a data cube. The grants management system then determines, from the perspective of the sponsors, if the transaction request satisfies administrative and financial requirements imposed by the sponsors. If the administrative and financial requirements are satisfied, the transaction request is admitted.

  • Identifying clinical trial candidates

    In general in one aspect, one or more clinical study candidates are identified by consolidating health care information for a consumer, applying the consumer's health care information to a rules engine, identifying a consumer as eligible to participate in one or more clinical studies, and presenting an opportunity to participate in the study to the consumer.

  • Employee-based payroll

    A method for providing payroll services to an employer includes obtaining employee data for an employee of the employer, wherein the employee data is used by a payroll system, obtaining employer tax data of the employer, wherein the employer tax data is used by the payroll system, and managing a payroll and taxes of the employer using the payroll system, wherein managing the payroll of the employer comprises issuing a direct deposit paycheck by the payroll system based on the employee data and employer tax data, wherein managing the payroll of the employer and taxes of the employer is provided by the payroll system without cost to the employer.

  • Accelerated process improvement framework

    The present invention relates to a method and related system for assisting and expediting an organization production of a more mature product. The method and system may include implementation of processes using a combination of both electronic hardware and software and implementation locally or over a network such as an intranet or the Internet. In another embodiment, the method may be implemented using a document management system to administer files related to the steps in the method. These files may assist a user in the creation of required documentation. A document management tool may be integrated with the document management system to associate documentation with steps in the method. A navigator tool may be employed to create a graphical display of the steps in the method using data contained in the files. Another embodiment of the present invention uses WebDAV-based communication to coordinate access to multiple document repositories.

  • System for project preparing a procurement and accounts payable system surface

    A system for coordinating a project for designing, implementing, and using a general procurement and accounts payable (GP/AP) system for a customer. A playbook database is created and includes templates of information relating to designing, implementing, and using the GP/AP system. The templates are particularized for the customer. A playbook summary view is generated from the playbook database. The playbook summary view displays a folders and views section, a task title display and selection area, a summary task creation button, and a detailed task creation button, which visually appear together in an undivided display area within the playbook summary view. Communication is between team members of a team and the playbook database via a server coupled to the playbook database and an intranet coupled to both the server and the team members. The team members have responsibility for the designing and implementing of the GP/AP system.

  • SYSTEMS AND METHODS FOR DETECTING AND INVESTIGATING INSIDER FRAUD

    Systems, methods, and apparatus, including computer programs encoded on computer storage media, for detecting insider fraud. One method includes identifying one or more insider threat detection rules for an enterprise and obtaining behavioral data for an enterprise insider from multiple behavioral data sources. The enterprise is associated with a plurality of enterprise insiders, and the behavioral data describes at least one action of the first enterprise insider. The method further includes determining a threat score for the first enterprise insider based on the behavioral data for the first enterprise insider and one or more of the insider threat detection rules and initiating, when the threat score satisfies a threat threshold, one or more protective actions.

  • Providing a modified Non-Communication application interface for presenting a message

    A computationally implemented method includes, but is not limited to: determining which of a plurality of end users are to be presented with a message, the plurality of end users having access to one or more non-communication applications through one or more non-communication application interfaces; and providing a modified non-communication application interface for accessing at least one of the one or more non-communication applications to one or more end users who have been determined to be presented with the message, the modified non-communication application interface including at least a channel to access the message. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure

  • Providing a modified non-communication application interface for presenting a message

    A computationally implemented method includes, but is not limited to: determining which of a plurality of end users are to be presented with a message, the plurality of end users having access to one or more non-communication applications through one or more non-communication application interfaces; and providing a modified non-communication application interface for accessing at least one of the one or more non-communication applications to one or more end users who have been determined to be presented with the message, the modified non-communication application interface including at least a channel to access the message. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.

  • METHOD AND APPARATUS FOR GATHERING, CATEGORIZING AND PARAMETERIZING DATA

    A computationally implemented method includes, but is not limited to: determining which of a plurality of end users are to be presented with a message, the plurality of end users having access to one or more non-communication applications through one or more non-communication application interfaces; and providing a modified non-communication application interface for accessing at least one of the one or more non-communication applications to one or more end users who have been determined to be presented with the message, the modified non-communication application interface including at least a channel to access the message. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.

  • Multi-Modal Automation for Human Interactive Skill Assessment

    A method for screening applicants by a screening entity includes the steps of remotely accessing a screening entity's multi-modal pre-screening tool by a candidate using an Internet-accessible device, the pre-screening tool comprising audio and visual elements operable to communicatively interact with the candidate, and carrying out an interactive skills assessment of the candidate by communicating at least one cue to the candidate from the screening entity, requiring the candidate, upon receiving the at least one cue, to simultaneously interact with the pre-screening tool and, based upon this interaction, communicate a verbal response to the cue, recording the candidate's verbal response with the pre-screening tool and storing the verbal response in a database profile associated with the candidate and accessible by the screening entity, and analyzing the candidate's recorded response by the screening entity and carrying out a quality and criteria judgment to determine the hiring potential of the candidate.

  • FLEXIBLE SECURITY BOUNDARIES IN AN ENTERPRISE NETWORK

    A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.

  • FCS SMART TOUCH FOR C LEVEL EXECUTIVES

    Graphical business intelligence tool. An example of a method for providing graphical business intelligence (BI) tool with a touch screen user interface includes receiving user authentication information and displaying one or more briefing books. The method includes displaying one or more chapters associated with the one or more briefing books. The method includes displaying maps, images and layouts associated to the one or more chapters. The method includes presenting Business Intelligence reports that take input from the maps, the images and, the layouts. The method includes allowing the one or more briefing books, chapters, measures, features, BI Reports to be configured. The method also includes creating graphical representations of dimensions used by a vertical, enabling graphical navigation capabilities in the graphical BI tool, calibrating the touch screen user interface with the graphical BI tool, and deploying the graphical BI tool with the touch screen user interface.

  • FLEXIBLE SECURITY REQUIREMENTS IN AN ENTERPRISE NETWORK

    A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.

  • METHOD AND SYSTEM FOR PROVIDING A SEGMENT BASED DIFFERENTIATED CUSTOMER EXPERIENCE SOLUTION

    A method for providing a segment based differentiated customer service solution. The method comprises a step of first receiving information about online status of a customer. The method includes providing one or more personalized offers based on the received information. Further, a remote financial advisor application for facilitating interaction between the customer and an advisor in an advisement session is invoked and financial analysis related to the purchase of one or more personalized offers is provided to the customer. The purchase of the personalized offer is then provisioned which comprises completing transaction details for the purchase. The method also includes facilitating the provision of real-time advice to the customer through a remote advisement session.

  • TEMPLATE PROCESSING ENGINE FOR BUSINESS SYSTEMS

    A template processing engine is used for generating and/or modifying reports in business systems. The template processing engine receives predefined templates and structured data from the business system, enables a user to select a template, clones appropriate template rows or columns, and adds them to an output report. The output report may be displayed to the requesting user, printed, emailed, or stored based on user request or default parameters.

  • INDEPENDENT ANNUITY PLACEMENT SYSTEM AND METHOD

    A system and method for facilitating annuity transactions between annuity purchasers and providers via an annuities placement program accessible to the purchasers and providers. Purchasers enter quote solicitation information used by the annuity providers to establish a quote for an annuity Annuity providers enter a quote in response to the quote solicitation information, and the quote is provided to the purchaser via the annuities placement program. The quote is customized to the annuity purchaser's quote solicitation information. Multiple quotes from multiple providers may be presented to the purchaser for ease of quote comparison. To facilitate such transactions, a discretionary group is established to be a contract holder for each participating annuity provider. A master group contract is established for each of the participating providers, each of which is written by a respective one of the participating annuity providers to the discretionary group to allow the discretionary group to be the contract holder for annuities purchased by the annuity purchasers. In response to an annuity purchase, a certificate of participation is issued to the purchaser from the provider under the terms of the master group contract of that annuity provider, which reflects annuity terms customized to the annuity purchaser.

  • FINANCIAL COMPUTER SYSTEM THAT DETERMINES AND REPORTS TRANSACTIONS IMPACTED BY ORGANIZATIONAL CHANGES

    A financial computer system in response to receiving a business object to be changed, a change type, and a effective date of the change, identifies all first transactions directly associated with the business object and identifies all second transactions not directly associated with the business object but that may be posted to the business object in the future. The system then displays the first transactions and the second transactions in a user interface.

  • DOCUMENT ACCESS MANAGEMENT METHOD AND SYSTEM

    This disclosure provides a document access method and system. The document access method and system are based on a social network model which interconnects members of the social network as a function of trust. This framework provides a basis for documents to be accessed by members which are not directly specified by a document's owner, while providing a certain degree of document security.

  • System And Method For Hosting A Social Network That Enables Granular Management Of The Privacy Of Posted Information

    A system and method for hosting a social network that enables entities to particularly manage the privacy level of content posted on the social network. This may enable an entity to distribute news, congratulations, accolades, invitations, and/or other internal information within the social network to members, employees, students, investors, and/or other parties.

  • Prioritization of Resources based on User Activities

    A computing system generates resource data that represents a resource. The content of the resource data is dependent on a ranking of resources in a set of resources. The ranking of the resources in the set of resources is dependent on interactions between users in a set of users and the resources in the set of resources. The ranking of the resources in the set of resources also is dependent on a degree to which each user in the set of users is related to a user.

  • METHOD, SYSTEM, AND PROGRAM FOR AN IMPROVED ENTERPRISE SPATIAL SYSTEM

    Disclosed is a method, system, and program for providing access to spatial data. A request for data is received. Enterprise and third party data are integrated. The integrated data is processed. Spatially referenced results are generated using the processed data. The spatially referenced results are returned in response to the request.

  • MANAGING APPLICATION INTERACTIONS WITH ENTERPRISE SYSTEMS

    Networked services may interface with enterprise systems of an organization to access data in the enterprise systems. A networked service may be able to retrieve, manipulate, and store data in the enterprise systems. Once a networked service interfacing with enterprise systems has been created, developers may create apps or applications that call one or more networked services to access data in the enterprise systems. The apps may provide basic functionality, such as generating a user interface in a specific device using a specific industry standard platform for incorporating data from enterprise systems accessed by a linked service. Networked services may also contain modules for tracking calls or invocations of the service together with an identifier of an associated application and user, in addition to other data. This data may be recorded in a database and shared to compensate parties based on actual usage of the services and/or apps.

  • PEER-TO-PEER IDENTITY MANAGEMENT INTERFACES AND METHODS

    Peer-to-peer (P2P) application programming interfaces (APIs) that allow an application to create, import, export, manage, enumerate, and delete P2P identities are presented. Further, the management of group identity information is provided. APIs abstract away from low level credential and cryptographic functions required to create and manage P2P identities. This management includes retrieval and setting of a friendly name, generation of a cryptographic public/private key pair, retrieval of security information in the form of an XML fragment, and creation of a new name based on an existing identity.

  • COMPUTERIZED METHOD FOR ANALYIZING INNOVATION INTERRELATIONSHIPS WITHIN AND BETWEEN LARGE PATENT PORTFOLIOS

    The method of the present invention provides a labor and time saving ability to determine interrelationships within patents determined by searching, via a computer system, through patent fields to see if one or more particular pieces of alphanumeric data are common to any of the patents in the database in which the field indicia are located. Such commonality is searchable in backward or forward direction, or both, from, for example, one patent of particular interest. The method allows for presentation of families of interrelated patents within minutes rather than hours, weeks or longer by utilizing computer based technology. Further, the methodology allows for determinations of interrelationships within desired degrees of separation by manipulation of the indicative data to be searched.

  • COMMUNICATION MONITORING AND MANAGEMENT SYSTEM

    Embodiments of the invention relate to systems, methods, and computer program products for managing electronic communications and, specifically, monitoring electronic communications received from numerous communications sources associated with a user, identifying that certain ones of the communications are priority communications and communicating notice of the priority communications to the user. The priority communication may be identified by user defined criteria, such key words, phrases, key topics, key names and the like; timeframe of the communication; user-defined priority rules; business performance indicators/metrics and the like. Communication of the notice may provide for communicating a priority communication alert to the user or communicating the notice to a network-accessible communication monitoring portal.

  • VISITOR MANAGEMENT SYSTEMS AND METHODS

    Various apparatus, methods, techniques and systems are disclosed for admitting, tracking, monitoring and processing data about visitors and vehicles that visit an access-controlled environment. A network having one or more greeting stations and a number of linked answering stations collects and manages data concerning visitors and/or vehicles in the access-controlled environment, and can manage or assist individuals in managing granting access to the access-controlled environment, monitoring visitors and vehicles present in the access-controlled environment, limiting movement and access to certain areas in the access-controlled environment and generating records and other data about each visit. Some embodiments of the network are also adaptable for use in providing traveler assistance and consular services for various types of individuals.

  • Enforcing Universal Access Control in an Information Management System

    A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Apparatuses, Methods and Systems for a Social Networking Application Updater

    Software on a client device receives a notification from a server of the availability of an update for an application that is a multi-user social networking application. The software determines whether the state for a live process has been saved by the server. The software saves the state for a live process associated with the application if the state of the live process is not saved. The software kills the live process. Then the software downloads at least one file associated with the update and modifies at least one system database key or value associated with the application. The software launches the application as updated. And the software loads the state into the application as updated.

  • Apparatuses, Methods, and Systems for an API Call Abstractor

    A social networking application manager ("SNAM") initializes a set of modules for an application with their most updated versions. SNAM then iterates through the following operations. SNAM obtains the specification attributes for an updated version of the application. SNAM then obtains specification attributes for each module. SNAM compares the specification attributes of the modules with the specification attributes of the application to identify incompatible specification attributes. SNAM identifies the least compatible module. And SNAM replaces the least compatible module with a version of the module that results from decrementing a version number for the module. This iteration continues until there are no more incompatible specification attributes.

  • Preventing Conflicts of Interests Between Two or More Groups Using Applications

    To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an "ethical wall" to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.

  • SYSTEM AND METHOD FOR COMMUNICATION, PUBLISHING, SEARCHING AND SHARING

    A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.

  • Notifying Users of File Updates on Computing Devices Using Content Signatures

    A method, computer program product, and apparatus for managing file updates using content signatures that use file identicality properties are provided. A method and computer program product are provided for the notification of receipt of a new version of the old file using content signatures that take advantage of file identicality properties. Content signature application modules and registries exist within information source clients and centralized servers to support the notification methods. An apparatus is provided that associates a file it has received, that is a new version of an old file, with previously stored content signatures in an indexed archive system. The information source clients that have the previously stored content signatures are then identified. These information source clients are then notified that the new version of the file exists.

  • Information Source Agent Systems and Methods for Backing Up Files To a Repository Using File Identicality

    A system, method, and computer program product for storing back-up files using file identicality properties are provided. A system is provided that intercepts file information from files while they are being stored to a back-up system. The files are intercepted with a file gathering interface that is in communication with one or more information source clients. The system includes an indexing engine to index file data contents of the intercepted file, a metadata engine to manage metadata concerning the intercepted file, and a triage engine to manage the file gathering interface, the indexing engine, and the metadata engine. Methods are provided for the interception of files being sent to a back-up system that take advantage of file identicality properties.

  • SYSTEMS AND METHODS FOR DYNAMIC PROCESS MODEL RECONFIGURATION BASED ON PROCESS EXECUTION CONTEXT

    Methods and systems to dynamically reconfigure an instance of a process model based on process execution context are described. In one example, a system includes a context engine, a rules engine, and a business process engine. The context engine maintains context information related to a business process model. The context information is dynamically updated continuously. The rules engine produces decisions based on information from the context engine. The rules engine evaluates decision points within an instance of the business process model using a relevant context obtained from the context engine. The rule engine also receives changes in context dynamically from the context engine, and re-evaluates decision points based on the context changes. The business process engine executes the instance of the business process model and can dynamically alter the instance during execution based on decisions generated by the rules engine.

  • METHOD OF AND SYSTEM FOR CAPTURING INTEREST EARNED ON THE MONETARY VALUE OF TRANSFERRED MONETARY RIGHTS MANAGED ON AN INTERNET-BASED MONETARY RIGHTS TRANSFER (MRT) NETWORK SUPPORTED BY A REAL-TIME GROSS SETTLEMENT (RTGS) SYSTEM

    Method of capturing interest associated with a whole or partial amount of money possessed or controlled by an owner/holder and held in a first account maintained by a home financial institution, associated with a monetary rights transfer (MRT) network operably connected to the infrastructure of the Internet and a real-time gross settlement (RTGS) system, and the home financial institution or an external financial institution associated with the MRT network, maintaining a second account, interest bearing, for the owner/holder of the amount of money to capture interest.

  • SYSTEM AND METHOD FOR MANAGING DYNAMICALLY CREATED GROUPS

    A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module..

  • METHOD AND SYSTEM FOR PERFORMING DEPLOYMENT MANAGEMENT

    A system, method, computer program product are shown for automatically performing deployment activities that can handle deployments for any-sized organization, even for deployments at the enterprise level. According to some approaches, modeling is performed to generate a model of the components in the computing environment. Dependency graphs can be generated for the deployment, and used to then automatically perform the deployment.

  • AUTOMATED USER REGISTRATION AND COURSE ENROLLMENT IN LEARNING MANAGEMENT SYSTEM (LMS)

    A system and associated method for automatically registering at least one applicant for a respective Learning Management System (LMS) course. The method creates a course data file from a course record stored in a database, and an order data file from an applicant order for a purchase of a LMS course. The course record and the applicant order are associated via a sale course code that represents specifics of the purchase of the LMS course. The method enrolls an individual student in the LMS course identified in the applicant order by registering the individual student with a corresponding user record in the database and updates transaction logs in the database according to a result of the enrollment.

  • Risk Governance Model for an Operation or an Information Technology System

    A computer system assessing risks for a joint venture. A risk, e.g., a technology or operational risk, may be associated with an infrastructure or an application that supports one or more operations of the joint venture, where the infrastructure or application may encompass an information technology system for the joint venture. A risk assessment computer system obtains risk information for identified risks in the information technology system, where the joint venture may support separate operations for first and second partner businesses on the information technology system. Identified risks may be owned by the joint venture or by one or more partner businesses and assigned accordingly. The risk assessment computer system may prioritize identified risk according to risk scores. When a control that is associated with a high priority risk category is not installed, a mitigation plan may be tracked to eliminate a high risk control gap.

  • SCHEDULING RESOURCES FROM A MULTI-SKILL MULTI-LEVEL HUMAN RESOURCE POOL

    Each work item from a group of work items is categorized as either complex or intense, and a unique work requirement statement is derived for each work item based on whether it is complex or intense. A unique resource value statement is assigned to different human resources. Past performances of the human resources are analyzed against completed work items in order to adjust the unique resource value statement, thus creating updated human resource value statements. An optimized work requirement statement is created by recalculating the unique work requirement statement for each work item based on the updated human resource value statements. A schedule for automated allocation of human resources to functional areas of an enterprise activity environment and scheduling of work items to the functional areas is formulated based on the optimized requirement statement for each work item in the group of work items.

  • FLEXIBLE COMPENSATION HIERARCHY

    A user interface for modifying a decision-making hierarchy in workplace automation software is described. In an example embodiment, a hierarchy system includes a first electronically represented hierarchy that includes a first set of rules and associations governing interaction of personnel and performance of tasks of an organization. A second electronically represented hierarchy includes a second set of rules and associations that are different from the first set of rules and associations, wherein the second set of rules includes one or more rules governing allotment of compensation to one or more persons of the organization. A first compensation module is adapted to provide a user option to selectively modify the second hierarchy in accordance with one or more privileges associated with the user as defined by the second hierarchy while the system is online. The example flexible hierarchy system further includes one or more machine-readable instructions running on the first compensation module, wherein the instructions are adapted to enable an authorized user to make one or more changes to compensation of a person. Additional instructions facilitate selectively displaying a user interface with one or more controls for enabling an authorized user to move a hierarchy representation of one or more subordinate users to a different position in the hierarchy.

  • MULTIFUNCTIONAL GAMING PLATFORM

    A method of playing a game by a group of players by using a gaming platform is provided. The group of players consists of at least two players. The gaming platform comprises an electronic device coupled to a gaming accessory. The method comprises: (A) selecting a first player from the group of players. The first selected player is called a chooser, wherein each remaining player in the group of players is called a guesser. The method further comprises: (B) the chooser selects a first secret answer to a first posted question; (C) the first secret answer to the first posted question is recorded; (D) at least one guesser places a bet that is configured to correctly guess the recorded first secret answer; and (E) the recorded first secret answer to the first posted question is revealed.

  • Method and System for Securing Academic ERP Database using Datasource Proxy

    A secured academic ERP system comprises an ERP database storing data for an academic institution, an application server for authenticating users and generating requests to access the ERP database for the users, a security system that accesses a user permissions table that maps the users to permitted organizations within an academic institution and modifying the requests to limit the requests to the permitted organizations for the users making the requests, and a datasource for receiving the modified requests and passing those requests to the ERP database. This system extends security beyond the traditional role-based data security model to support the finer granularity security at the level of the content. This is achieved without the need for a new database architecture or the use of separate databases for different organizations.

  • System and Method for Remote Patient Monitoring and Assessment to Facilitate Patient Treatment

    A system and method for remote patient monitoring and assessment to facilitate patient treatment are provided. The system includes at least one portable computing device (such as a smart cellular telephone) operated by a caregiver, which generates a plurality of user interface screens for allowing the caregiver to enter information relating to a patient's medical condition and treatment of the patient. The system compares a parameter of the information entered by the caregiver to a pre-defined threshold to determine whether the parameter is acceptable, and displays an alert screen on the portable computing device if the means for comparing the parameter determines that the parameter is unacceptable. A central server in communication with the portable computing device via a network receives the information entered by the caregiver, and electronically generates a report summarizing the patient's medical condition and treatment given to the patient by the caregiver.

  • GENERATING ASSESSMENT DATA

    Methods and systems described herein implement data generation for purposes such as data-driven assessment of an application, a process, or a system. In one implementation, seed data having one or more characteristics is received. Once received, the seed data is repeatedly transformed to generate a desired volume of an assessment data having the one or more characteristics associated with the seed data.

  • METHODS AND APPARATUS FOR DETERMINING AND USING HUMAN CAPITAL METRICS AS MEASURES OF ECONOMIC VALUE OF PERSONS TO AN ORGANIZATION

    Disclosed are methods, apparatus, and systems, including computer program products, implementing techniques for determining and using human capital metrics as measures of the economic value of persons to an organization. The financial state and performance of an organization can be characterized accordingly. One or more data resources storing data associated with one or more persons are accessed. A plurality of fields of the data are selected as cost data of the one or more persons, including direct expenses associated with the one or more persons and indirect expenses associated with the one or more persons. The selected data is retrieved from the one or more data resources. A human capital metric is calculated in accordance with the retrieved data, including summing the cost data to determine a total cost for the one or more persons. A report including the calculated human capital metric is generated and provided.

  • USER INTERFACES FOR NAVIGATING STRUCTURED CONTENT

    User interfaces for navigating structured content. In one example embodiment, a user interface for navigating structured content includes a grid and a plurality of multi-dimensional cells each having a unique position in the grid. Each cell is configured to display only a first dimension of structured content before selection and display one or more additional dimensions of structured content upon selection.

  • Protecting Documents Using Policies and Encryption

    A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard drive of a computer. A document in motion is a document that is passing through a policy enforcement point. The policy enforcement point can be a server (e.g., mail server, instant messenger server, file server, or network connection server).

  • GENERATING CANDIDATE INCLUSION/EXCLUSION COHORTS FOR A MULTIPLY CONSTRAINED GROUP

    A computer implemented method, program product, and/or system allocate human resources to a cohort. At least one attribute held by each member of a group of human resources is identified. A request is received, from a planned cohort, for multiple human resources that collectively possess a set of predefined attributes, wherein no single human resource possesses all of the predefined attributes. The set of human resources that satisfies the request is identified and assigned to the planned cohort.

  • Business Process Diagram Visualization Using Heat Maps

    System and method for displaying information regarding a business process. A diagram of the business process may be displayed on a display. The diagram may include a plurality of icons connected by lines, where each of the icons represents a respective step in the business process and the lines indicate flow paths between the steps. Historical data regarding the business process may be received. The historical data may be analyzed to determine information regarding steps and/or flow paths in the business process. Graphical indications associated with one or more icons and/or lines in the diagram may be displayed. The graphical indications may visually indicate characteristics of corresponding steps and/or flow paths in the business process. For example, the graphical indications may indicate lengths of time, costs, or other characteristics associated with various ones of the steps. The graphical indications may indicate path traversals of ones of the flow paths.

  • USING MASKING PROPERTIES FOR MANAGEMENT OF A DYNAMIC IDENTITY TEMPLATE AS A PART OF A MARKETING AND SALES PROGRAM FOR UNIVERSAL LIFE STAGE DECISION SUPPORT

    Methods and systems for using masking properties for management of a dynamic identity template as a part of a marketing and sales program for universal life stage decision support. While masking private data, a user-defined template can be shared (pushed) to other networks, and template fields can be dynamically populated (pulled) from other networks; thus a template can grow in extensible dimensions, as well as become automatically updated. Also disclosed are techniques for be-friending based on identity template field matching, and for matching user's needs to service providers by collecting user input in profiles, creating multi-axis match objects from the profiles, and applying heuristics to create scored matches between profiles. Techniques include defining extensible profile fields, launching automated agents, and recording reported action. Users may create and manage permissions to permit other users or third party agents to populate both private and shared information in a user-defined identity profile.

  • Hiring Decisions Through Validation Of Job Seeker Information

    The present methods and systems relate to means for job seekers to provide more detailed information to prospective employers to aid in job hiring decisions. The means comprises validation of job history, education, and skills information provided by the job seeker, which can comprise third party support and feedback. The means further comprises a display of information that comprises the relative strength of the validation, as well as possible means of further validation for the prospective employer to use. The means further comprises a skills assessment that is taken by the job seeker at a time of the seekers time and place convenience, but that can be validated at the place of employment. The means also provides the job seeker with information about how they could improve their employment prospects.

  • USER TERMINAL DEVICE AND SERVICE PROVIDING METHOD THEREOF

    A method for providing a service in a user terminal device, which includes downloading a service hub program, installing the service hub program, generating an icon container corresponding to the service hub program, and displaying the icon container on a screen. If the icon container is selected, a list regarding an application program corresponding to the service hub program and a list regarding an icon of the application program are received from the server, and an icon regarding each application program included in the list regarding the application program corresponding to the service hub program is displayed according to the list regarding the icon of the application program.

  • USER INTERFACES FOR NAVIGATING STRUCTURED CONTENT

    User interfaces for navigating structured content. In one example embodiment, a user interface includes a grid, a header row of cells each positioned in a separate column of the grid, a header column of cells each positioned in a separate row of the grid, a plurality of multi-dimensional cells each having a unique position in the grid, and a viewport that displays only a portion of the grid. Upon of reception an indication that the portion of the grid displayed within the viewport should simultaneously scroll both horizontally and vertically, the multi-dimensional cells of the grid are configured to scroll simultaneously within the viewport both horizontally and vertically, and the header row cells and header column cells of the grid are configured to scroll in a synchronous manner so as to remain visible in the viewport and remain aligned with the rows and columns of multi-dimensional cells.

  • DIMENSIONAL DATA EXPLORER

    A dimensional data explorer for an enterprise system is disclosed. Dimensional data exploration includes providing a list of dimensions by which aggregated data in a report can be disaggregated and reaggregated. Aggregated data comprises a set of measures that have been aggregated for each object of a set of objects. Dimensional data exploration further includes providing the aggregated data disaggregated and reaggregated using a dimension from the list of dimensions.

  • OPTIMIZING A QUERY

    A method of optimizing a query is provided herein. The method includes determining a cost estimate for a query. The method further includes determining a budget for optimizing the query based on the cost estimate. Additionally, the method includes determining a complexity of the query based on the budget. The method also includes determining a strategy based on the complexity. The strategy specifies a limit to a search space enumerated during optimization of the query. Further, the method includes optimizing the query based on the strategy.

  • SYSTEM AND METHOD FOR QUALITY CONTROL IN A HIGH VOLUME TALENT ACQUISITION

    A system and method for quality control in a high volume talent acquisition is disclosed. In one embodiment, a system for quality control in a high volume talent acquisition includes a processor, a quality talent acquisition database for storing a plurality of candidate e-dossiers and historical data associated with fraudulent practices used in the talent acquisition, memory operatively coupled to the processor and the quality talent acquisition database, and a quality talent acquisition module communicatively coupled to the processor and the quality talent acquisition database. The quality talent acquisition module includes a selection module for selecting one or more prospective candidates from the plurality of candidate e-dossiers, a fraud and non-compliance module for obtaining information associated with fraudulent practices, an e-dossier compilation module for compiling the candidate e-dossiers and a sampling module for sampling on a real-time basis the selected one or more candidates.

  • METHOD AND SYSTEM FOR PRE-POPULATING JOB ASSIGNMENT SUBMISSIONS

    A method for pre-populating an end of shift submission by an employee of a transportation company. The method comprises executing software encoded on a machine readable storage medium by a CPU at a client associated with the employee to implement a Graphical User Interface (GUI) to supply particulars relating to a work shift for a member of a crew during a particular transportation trip. The GUI including a plurality of information capture fields for displaying particulars of the shift. The method comprises identifying among a plurality of data records, a data record associated with the particular trip, receiving data elements at the client derived from the record associated with the particular trip and pre-populating the information display fields with the respective data elements. Allowing the employee to edit one or more of the pre-populated information display fields.

  • METHOD AND SYSTEM FOR ASSESSING PENALTIES ASSOCIATED WITH AN EMPLOYEE WITHOUT A JOB ASSIGNMENT

    A method for managing the application of penalties to employees of a company. The method comprises executing software encoded on a machine readable storage medium by a CPU to implement a job assignment monitoring function, the job assignment monitoring function monitoring events occurring in the course of a job assignment procedure during which a server arrangement communicates with a remote client over a data network to present an employee at the remote client with a job proposal, detecting among the monitored events a penalty triggering event and in response to the detecting, determining a penalty to be applied to the employee on the basis of the penalty triggering event. The method further comprises recording in an employee record stored in a database, data derived from the determining to register the penalty applied to the employee.

  • SERVER AND SERVICE PROVIDING METHOD THEREOF

    A service providing method of a server is provided. The method includes registering a service hub according to a service request; setting a service hub program corresponding to the service hub; receiving a request for the service hub program from a user terminal device belonging to an organization associated with the service hub; providing the service hub program to the user terminal device; and providing an application program corresponding to the user terminal device and the service hub program to the user terminal device.

  • USER TERMINAL DEVICE AND SERVICE PROVIDING METHOD THEREOF

    A method for providing a service in a user terminal device, in which the user terminal device downloads a service hub program, installs the service hub program, generates an icon container corresponding to the service hub program, displays the icon container, receives an input selecting the icon container, displays an application icon included in the icon container, and deletes a program and data installed in the user terminal device according to a change in status of the user terminal device

  • AUTOMATICALLY CREATED REPORT GENERATOR FOR MANAGING INFORMATION TECHNOLOGY SERVICE PROJECTS

    Reports to manage service projects may be generated by an automatically generated project report generator software tool. The project report generator software tool is automatically created from an object-based model of work products in a project, wherein the object-based model is executable by a machine and comprises a plurality of work product object and a recording of at least some relationships between the object, wherein each work product object represents a document that contains information about the service project. One or more reports can be generated by the project report generator software tool during the lifetime of the service project, wherein the report is generated using the object-based model and at least some of the information in documents represented in the object-based model.

  • ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS

    An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions.

  • Financial Instrument Transferable from an Employer to an Employee

    According to one embodiment, a method for administering a financial instrument includes storing a balance of an employee retirement plan account created for an employee and owned by an employer of the employee. The employee retirement plan account includes one or more variable investments. The balance of the employee retirement plan account is based, at least in part, on an initial deposit into the employee retirement plan account from a deduction from wages paid by the employer to the employee. The method also includes storing a minimum positive growth rate. The method further includes updating the stored balance of the employee retirement plan account based on market performance of the one or more variable investments. The method further includes calculating a protected value, and, upon occurrence of one or more events, transferring ownership of the employee retirement plan account from the employer to the employee.

  • ACTIVE POLICY ENFORCEMENT

    A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.

  • METHOD AND SYSTEM FOR ROOT CAUSE ANALYSIS OF DATA PROBLEMS

    A method and system comprising an issue report module to receive a data problem report indicative of the occurrence of a data problem during the performance of a process. The data problem report includes at least one descriptor to identify a problematic data item and may include at least one activity descriptor to identify a particular process activity during which the data problem was encountered. A root cause analysis engine performs automated root cause analysis based on the at least one descriptor of the problematic data item, to identify at least one potential cause of the data problem. The system may include at least one memory having stored thereon data dependency information which comprises, with respect to each of a plurality of entity attributes, information regarding process elements and/or process activities which contribute to the provisioning of data items which are instances of the respective entity attribute, automated root cause analysis being based on the data dependency information. The system may include a data issue repository comprising information regarding earlier data problem reports and respective results of root cause analyses.

  • INJECTION MOLD

    An injection mold is adapted for ejecting out an insert-molding product and an injecting waste material connected with the insert-molding product one after another in turn. The injecting mold includes a fixed mold and a movable mold movably engaged with the fixed mold to define a chamber for molding the insert-molding product and a sprue channel for molding the injecting waste material therebetween. In the process of ejecting the insert-molding product and the injecting waste material out of the injection mold, The injection mold has at least one product ejector pin used to make the insert-molding product separated from the injecting waste material and then eject the insert-molding product out of the injection mold firstly, and at least one delay ejector pin used to eject the injecting waste material out of the injection mold after the insert-molding product are ejected out of the injection mold.

  • METHOD AND APPARATUS FOR USING SERVICE REPRESENTATIONS TO ALIGN INFORMATION TECHNOLOGY WITH THE STRATEGY OF AN ENTERPRISE

    A service-oriented architecture for enterprise project management integrates business processes, human resources and project management within an enterprise or across the value chain network. A representation having direction and attributes is provided to show the dependencies between a business value layer and a project-portfolio layer, and between the project-portfolio layer and resources. The representation is mapped to a Web Services representation in UDDI, Web Services interfaces, and Web Services based business processes through rope hyper-linking.

  • Border Management Solution

    An integrated border management solution providing a balance between facilitating the movement of people and commerce with the requirements of immigration, customs, and other border-focused law enforcement. The facilitation aspect of the solution includes processing of arrivals and departures, as well as processing requests triggered by forms and applications such as requests for visas, asylum or customs declarations. The enforcement aspect of the solution includes border enforcement alerts and communication, as well as a comprehensive, integrated investigation and intelligence workbench. The border management solution is based upon a border management business architecture defining the structure for developing a border management solution in terms of its capabilities and the interrelationships of those capabilities. The border management solution according to the present invention may be implemented as an integrated whole or as component parts to a border management solution.

  • SYSTEM FOR CONCURRENT OPTIMIZATION OF BUSINESS ECONOMICS AND CUSTOMER VALUE

    A computer-implemented system and method for an airline to enhance customers' experience. A computer-implemented service is operated that delivers to a customer an option to upgrade on up to n of m selected products, where n is less than m. Information is recorded in a data store, pertaining to said option. In addition, a system is operated to define each of the n chosen products, whereby after each of the n chosen products is defined, the customer can be upgraded to said chosen product. The information pertaining to said defined products is recorded in a data store.

  • SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL CUSTOMERS

    A system and method for identifying potential customers is provided. Information in a proprietary data repository of a company may be analyzed to thereby determine a first set of textual terms. Publicly available information related to the existing customer set may be analyzed to thereby determine a second set of textual terms. Terms in the first and second sets may be associated with scores. A customer profile may be generated based on the textual terms and associated scores. Potential customers may be identified based on the buyer profile. Other embodiments are described and claimed.

  • CONFERENCE CALL MANAGEMENT

    A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call.

  • Inspecting Code and Reducing Code Size Associated to a Target

    Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system.

  • SYSTEM FOR CONCURRENT OPTIMIZATION OF BUSINESS ECONOMICS AND CUSTOMER VALUE

    A computer-implemented system and method to provide options on products to enhance customers' experience. A computer-implemented system is operated that delivers to a customer an option to utilize up to n of m selected products, where m and n are whole numbers and n is less than or equal to m. Information is recorded in a data store, pertaining to said option. In addition, a system is operated to define each of the n chosen products, whereby after each of the n chosen products is defined, the customer can utilize said chosen product. The information pertaining to said defined products is recorded in a data store.

  • MULTI-ROLE BASED ASSIGNMENT

    A method and system to effectively apply the real time resource information into process models at design time. When process models are being prepared, an optimal list of candidate roles for each task within the process is presented. This list is generated dynamically based on the characteristics of the underlying resources within the roles. Further, the same information, along with historical data related to past performance at a resource level, can be leveraged during process simulations for optimal resource allocations.

  • CONTENT AGGREGATION METHOD AND APPARATUS FOR ON-LINE PURCHASING SYSTEM

    The method comprises processing plural product information records from the product information sources into one or more groups based on which product information records are likely to correspond to the same product, correlating a unique product ID corresponding to the product associated with each of said groups to identify the product, comparing each identified product to categories of a taxonomy to determine a category for the identified products in the taxonomy, and determining attributes for each categorized product based on the product information records corresponding to each group, creating product specifications based on the determined attributes and storing the product specification in the corresponding determined categories of the taxonomy.

  • SYSTEM AND METHOD FOR KNOWLEDGE RETRIEVAL, MANAGEMENT, DELIVERY AND PRESENTATION

    The present invention is directed to an integrated implementation framework and resulting medium for knowledge retrieval, management, delivery and presentation. The system includes a first server component that is responsible for adding and maintaining domain-specific semantic information and a second server component that hosts semantic and other knowledge for use by the first server component that work together to provide context and time-sensitive semantic information retrieval services to clients operating a presentation platform via a communication medium. Within the system, all objects or events in a given hierarchy are active Agents semantically related to each other and representing queries (comprised of underlying action code) that return data objects for presentation to the client according to a predetermined and customizable theme. This system provides various means for the client to customize and "blend" Agents and the underlying related queries to optimize the presentation of the resulting information.

  • Policy Performance in an Information Management System

    In an information management system, policies are optimized before they are associated to a device in order to increase evaluation speed or reduce space requirements, or both. Optimization techniques may include common subexpression elimination, constant folding, constant propagation, comparison optimization, dead code or subexpression removal, map or lookup table generation, policy rewriting, redundant policy elimination, heuristic-based policy ordering, or policy-format transformation, and combinations of these.

  • THREE DIMENSIONAL BUILDING CONTROL SYSTEM AND METHOD

    The system helps facility managers and other users to efficiently navigate through a building or complex of buildings, and quickly gather information for (and control) individual building systems or groups of systems. A method includes displaying an image representing at least a portion of a building, wherein at least part of the image is a three-dimensional representation; and displaying a representation of a device associated with the building, wherein the representation of the device is selectable through the user interface.

  • Documenting Processes of an Organization

    A method and system for documenting processes and controls of an organization involve storing information describing the processes of the organization in a database and then accessing the database with a suitable user interface application. Preferably the user interface application is a web browser and the data in the database is provided to users as a series of web pages. Using the user interface application, users can review the documented processes, report errors, request changes, generate reports, and so forth. Users with suitable access privileges can modify the data in the database using the user interface application. An external auditor can audit the processes and controls of the organization from his own office by accessing the database over a network such as the Internet.

  • SYSTEMS AND METHODS FOR DISPLAY OF CONTROLS AND RELATED DATA WITHIN A STRUCTURE

    The system helps facility managers and other users to efficiently navigate through a building or complex of buildings, and quickly gather information for (and control) individual building systems or groups of systems. A method includes displaying an image representing at least a portion of a building; and displaying a gradient indicator representing a parameter associated with a zone of the building, wherein the gradient indicator is displayed with the image in accordance with the zone for the parameter.

  • TOOL FOR MANAGER ASSISTANCE

    A computer implemented method, system, and/or computer program product generate an optimal training policy and an optimal promotion policy to accommodate an upcoming project. Required new job positions are identified for an upcoming project. A skillset matrix, which describes a current skill level of each worker in a work unit, and a promotion matrix, which describes historical evaluations of how well each worker achieved predefined goals of past projects, are generated. The skillset matrix is utilized to create an optimal training policy that identifies which workers are in need of additional training in order to qualify for one or more of the identified new job positions, and the promotion matrix is utilized create an optimal promotion policy that identifies which workers will be candidates for being promoted into one or more of the identified said new job positions.

  • TOOL FOR MANAGER ASSISTANCE

    A computer implemented method, system, and/or computer program product generate an optimal training policy and an optimal promotion policy to accommodate an upcoming project. Required new job positions are identified for an upcoming project. A skillset matrix, which describes a current skill level of each worker in a work unit, and a promotion matrix, which describes historical evaluations of how well each worker achieved predefined goals of past projects, are generated. The skillset matrix is utilized to create an optimal training policy that identifies which workers are in need of additional training in order to qualify for one or more of the identified new job positions, and the promotion matrix is utilized create an optimal promotion policy that identifies which workers will be candidates for being promoted into one or more of the identified said new job positions.

  • METHOD FOR PERSONALIZED GUIDANCE FOR REFERENCE DATE DEPENDENT INVESTMENTS

    A system and method is provided to generate personalized savings recommendation and/or needed assignments of reference-date dependent investments. Recommendations and assignments are based on differences between a investor profile and an ideal representative that was used to construct the investments. The system provides a configurable increasing level of financial service based on a Methodology Publisher's configuration for reference date based investments. A forecast simulation system is provided for each investor with various optimizers by the Methodologically Publisher to provide various level of financial services and portfolio recommendations for reference date dependent investments. Reports may be provided to investors illustrating progress toward goals and highlighting distribution of potential risky outcomes. An online inter-active mode may allow an investor to provide further profile information and customize a solution to their needs.

  • Method and Apparatus for Electronic Collection, Translation, Grouping, and Delivery of Wage Assignment Information

    This disclosure describes a system that electronically collects, translates, groups, and delivers wage assignment in-formation from at least one initiator to at least one recipient via an accumulator. An initiator initially receives the wage assignment information. Then, an accumulator collects the wage assignment information from at least one initiator, such as a government agency. The accumulator then translates the wage assignment information into a format compatible with electronic data interchange (EDI), such as the ANSI X12 standard. The accumulator then groups the EDI wage assignment information into specific files, batching the files based upon one data field contained within the wage assignment information data set, such as a recipient. The accumulator then delivers a batched EDI wage assignment file to each respective recipient. Once the EDI wage assignment file is received by the recipient, the wage assignment may then be implemented.

  • SYSTEMS AND METHODS FOR DETERMINING AN AVERAGE RETIREMENT AGE INDEX

    Systems and methods for determining an average retirement age index, the index including a year and week. The method determines a wealth at death of an average couple for a first retirement age. If wealth at death is greater than zero, the retirement age is decreased by one and the wealth at death value is recalculated. This process continues until the wealth at death value is less than zero, at which point the year of the retirement age index is determined by adding one to the current year of the retirement age. The week of the retirement age index is determined by: dividing the opposite of a wealth at death value for the year prior to the year of the average retirement age index by a wealth delta and multiplying the result by fifty-two.

  • HEALTH CARE FINANCING SYSTEM AND METHOD

    A method and related computer program product for determining eligibility of a patient to receive health care financial assistance. An embodiment discloses receiving patient data comprising data suitable for applying for health care financial assistance; receiving credit information derived from a credit report of the patient; comparing at least a portion of the patient data and at least a portion of the credit information to respective portions of qualification criteria for each of a plurality of health care financial assistance plans stored in a database within a computer memory; determining if the comparison satisfies the qualification criteria for at least one of the plurality of health care financial assistance plans; and providing notification of eligibility for every one of the plurality of health care financial assistance plans in which the comparison satisfied the qualification criteria.

  • Method and System for Consumer Centred Care Management

    The present invention relates to self care and care management. In one form, the invention provides a method for self-managed consumer centred cooperative care including the steps of: (a) the consumer registering their characteristics, (b) creating at least one cooperative care plan for addressing at least one of the needs and objectives of the consumer, (c) creating at least one action for the at last one cooperative care plan, (d) the consumer registering information for one or more other participants having roles chosen from the group including at least one of, (i) care providers, (ii) associates of the consumer, (iii) co-carer, (iv) primary care manager, (v) cooperative care plan manager, or combinations thereof, (e) the consumer, the primary care manager appointed by the consumer, or the cooperative care plan manager appointed by the consumer or the primary care manager, allocating at least one of the actions to one or more respective participants for implementation of the cooperative care plan, and (f) the consumer or the primary care manager appointed by the consumer, assigning permissions to the participants based on their role and any allocated actions, wherein steps (a) to (f) are automated.

  • Determination of Appraisal Accuracy

    A method for determining the accuracy of an appraisal report using a computer implemented application, including pre-validating an appraisal report to determine whether a first set of rules has been satisfied, the appraisal report including N fields to be completed, the first set of rules comprising completion of a pre-determined number of N fields; proceeding to a post-validating step if the first set of rules is satisfied; post-validating an appraisal report to provide an evaluation thereof, the evaluation including a plurality of risk categories including risk level indicators, and a risk-based overall score.

  • Domain aware time-based logins

    A method may comprise determining, in an operating system instance, that a login access is being attempted by a user at an access time on an object. A domain identifier associated with the user may be determined. A set of one or more domain identifiers may be accessed that may be associated with the object and that identify one or more domains. One or more domain isolation rules may be accessed and evaluated that may be associated with the operating system instance for permitting an attempted login access to the object based on whether a domain identifier associated with the user is one of the domain identifiers in the set of domain identifiers associated with the object for during a time period. A permit or deny indication may be returned based on whether or not login access is permitted on the object at the access time.

  • Apparatuses, methods and systems for a social networking application updater

    Software on a client device receives a notification from a server of the availability of an update for an application that is a multi-user social networking application. The software determines whether the state for a live process has been saved by the server. The software saves the state for a live process associated with the application if the state of the live process is not saved. The software kills the live process. Then the software downloads at least one file associated with the update and modifies at least one system database key or value associated with the application. The software launches the application as updated. And the software loads the state into the application as updated.

  • Importing language extension resources to support application execution

    A computer readable storage medium includes executable instructions to provide a registration service that is configured to accept a registration, where the registration includes a first address and a description of available language extension resources of a resource provider. The computer readable storage medium further includes executable instructions to import, based on the registration, the available language extension resources from the resource provider to support execution based on the available language extension resources. The executable instructions to import use inter-process communication.

  • Customization verification

    Results of an execution of a function including customizable steps, may be verified. Multiple of steps of the function, may be determined and may the customizable steps that have been customized. Results may be determined based on an execution of the function, wherein the execution uses values provided as inputs to the function. A result view for verifying the one or more results may be provided, the result view may include the steps of the function, the values corresponding to the inputs, and the results.

  • Systems and methods for enabling trust in a federated collaboration

    Systems and methods consistent with the present invention enable explicit and multilateral trust across a community of federated servers via a network. A trusted third party establishes a framework of policies and procedures governing a federation. Organizations joining the federation submit to an audit process of internal policies and procedures to ensure compliance with the policies and procedures of the federation. Upon successful completion of an audit, an organization may receive a digital certificate containing the digital public key of the organization and indicating approval of the trusted third party. The organization may then use the associated digital private key for signing security assertions associated with a request for resources from another federation service provider. The service provider may trust the assertion from the organization based on trust placed in trusted third party by the service provider and the trust placed in the organization by the trusted third party.

  • Intelligent job matching system and method including negative filtration

    A job searching and matching system and method is disclosed that gathers job seeker information in the form of job seeker parameters from one or more job seekers, gathers job information in the form of job parameters from prospective employers and/or recruiters, correlates the information with past job seeker behavior, parameters and behavior from other job seekers, and job parameters and, in response to a job seeker's query, provides matching job results based on common parameters between the job seeker and jobs along with suggested alternative jobs based on the co-relationships and based on ratings and preferences provided by the job seeker and provides negative filtration of undesirable jobs based on job seeker input and in response to queries from the system in order to efficiently and accurately accommodate job seeker perception. In addition, the system correlates employer/recruiter behavior information with past employer/recruiter behavior, parameters and information concerning other job seekers, which are candidates to the employer, and resume parameters, and, in response to a Employer's query, provides matching job seeker results based on common parameters between the job seeker resumes and jobs along with suggested alternative job seeker candidates based on the identified co-relationships and specifies job seekers to be eliminated from displayed results.

  • Processing queries against combinations of data sources

    The invention includes a computer readable medium with executable instructions to receive a query based on nested semantic abstractions for corresponding data sources. Data source specific queries are constructed based on the query by executing the query against the nested semantic abstractions. Each data source specific query is associated with an underlying data source described by a nested semantic abstraction. The data source specific queries are executed to produce results and the results are returned.

  • Career and employment services system and apparatus

    Systems, methods, distributed networks, and computer-readable media are provided that relate to recruiting and employment. Background information associated with talent-capability attributes is received from talent. Job description information is received from employers. Prospective matches are identified between employers and candidates, and employers and candidates are given an opportunity to exchange information.

  • Career and employment services system and apparatus

    A computer readable medium embodying instructions executable by a processor to perform a method for hosting components implemented in different computer readable languages within one process. The method includes instantiating a container within a single process, creating a hosting environment for each of a plurality of components, and wherein loading the components by respective environments and wherein the hosting environments are objects instantiated within the container and within the one process, and wherein the plurality of components are implemented in respective a computer readable language, and instantiating a container communication framework object within the container and the one process for processing serialized messages of the components, wherein specific language adapters convert data types of the components to a common implementation, wherein the messages of the plurality of components are processed within the container.

  • Distributed computing systems and system components thereof

    In one embodiment of the present invention, a replicated state machine comprises a proposal manager, an agreement manager, a collision/back-off timer and a storage reclaimer. The proposal manager facilitates management of proposals issued by a node of a distributed application for enabling coordinated execution of the proposals by all other nodes of the distributed application. The agreement manager facilitates agreement on the proposals. The collision/back-off timer precludes repeated pre-emptions of rounds in attempting to achieve agreement on the proposals. The storage reclaimer reclaims persistent storage utilized for storing at least one of proposal agreements and the proposals.

  • Method for building predictive models with incomplete data

    A method that imputes missing values while building a predictive model. A population of solutions is created using a data set comprising missing values, wherein each solution comprises parameters of each of the predictive models and the missing values of a data set. Each of the solutions in a population is checked for fitness. After the fitness is checked, the solutions in a population are genetically evolved to establish a successive population of solutions. The process of evolving and checking fitness is continued until a stopping criterion is reached.

  • Optimizing a language/media translation map

    A mechanism is provided for optimizing a language/media translation map. A user input is received comprising an input language/media selection, one or more output languages/medias selections, and a threshold for at least one of accuracy or throughput of one or more requested language/media translations. For each of the one or more requested language media translations, a determination is made as to whether an accuracy or throughput of a selected one of an automated translation system or a human resource translator is above the threshold for the at least one of accuracy or throughput. Responsive to the accuracy or throughput being above the threshold, either the selected one of the automated translation system or the selected one of the human resource translator is added to a multiple language/media translation map. An optimized multiple language/media translation map is then generated for use by a translation orchestration module in the data processing system.

  • People Risk Portal

    A computer server hosts a web portal used to customize and display data associated with personnel factors affecting business at a particular geographic location. The data may be collected covering a number of human resource factors, such as personal income, age, crime rate, education, corruption, healthcare and others and may be used to analyze problems such as recruitment, training, retention, etc. A portal allows access to the data for an individual location as well as presenting side-by-side comparison of multiple locations. The portal further allows a user to apply a custom weight to each factor according to the needs of a particular business, such as high tech or consumer products, to allow more meaningful analysis of the location or locations.

  • PERFORMANCE DRIVE COMPENSATION FOR ENTERPRISE-LEVEL HUMAN CAPITAL MANAGEMENT

    In embodiments of the present invention improved capabilities are described for a human resource management platform that includes applications targeted to solve a variety of human resource, compensation, and performance management problems. Applications of the human resource management platform include business applications such as performance driven compensation that may provide a single solution for driving employee performance and organizational success by automation of goal setting, performance measurement, and employee rewards by directly linking performance results to rewards.

  • AUTOMATIC BILL OF TALENT GENERATION

    A method and system comprising at least one database to store process model information comprising logical process model information and human resource dependency information. The human resource dependency information may indicate design-time dependence of process activities on respective human resource components and may comprise one or more role identifiers associated with at least some process activities and a set of role category identifiers associated with at least one of the role identifiers. The set of role category identifiers indicates a plurality of alternative role categories that are applicable to the corresponding role. The role mapping module is provided to receive user input to associate sets of role category editors with responding role identifiers. A bill generator may analyze the logical process model information and human resource dependency information in order to generate a human resource requirement bill that includes a listing of human resource roles and role categories required for performance of the process.

  • MANAGING RESOURCES FOR PROJECTS

    Project management is made easier and more effective by enabling a planner to define project roles for tasks of a project and then, separately search for actual resources that match the project roles.

  • BENEFIT MANAGEMENT SYSTEM AND METHOD

    A benefit management system and method provides a portal-based information management and collaborative business process application. Preferably, the system and method is focused at the benefit broker/consultant and is configured to capture employee benefit management data, such as demographic data and plan data. Further, preferably, one or more users are provided with customized user access to the centralized application for use in performing one or more various benefit plan management functions, such as, for example, marketing, plan design; enrollment; administration; and communication between one or more application users.

  • HUMAN RESOURCE ANALYTICS WITH PROFILE DATA

    A method, computer program product, and system for human resource analytics using profile data is described. The method includes receiving historical project data, wherein the historical project data includes at least one profile of at least one historical project team member. Psychometric data associated with the at least one historical project team member is received. Updated historical project data is generated, in which, at least in part, psychometric data associated with the at least one historical project team member is added to the at least one profile included in the historical project data.

  • Method and System for Determining Option-Adjusted True Interest Cost of Municipal Debt Instruments

    Embodiments are described for a system and method of controlling access to information in an organization by defining a hierarchical organizational structure of boxes, and security configuration comprising user records, security roles, rules to map users to boxes, and rules to grant roles to users via mapped boxes. Access control is applied in the context of a defined organizational structure using the effective set of access control policies computed in real time per each data access request from any given user.

  • SYSTEM AND METHOD FOR USING FILE HASHES TO TRACK DATA LEAKAGE AND DOCUMENT PROPAGATION IN A NETWORK

    The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation.

  • METHODS AND SYSTEMS FOR AUTHENTICATING USERS

    A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.

  • METHODS AND SYSTEMS FOR MANAGING EMPLOYEE-LIABLE EXPENSES

    A method for managing payments made as part of an employee-liable expense reimbursement program is described. A plurality of employees are enrolled in the program and submit requests for reimbursement for expenses related to a service provided to the employees by a service provider for which the employees are liable. The method includes receiving, by the computer system, requests for reimbursement and aggregating the requests for reimbursement scheduled for payment within a predefined time period and associated with the service provider. The method also includes generating an invoice that includes a payment amount to be paid to the employee for subsequent payment to the service provider. The method also includes automatically requesting funds from an employer of the plurality of employees for the payment amount included in the invoice and electronically transferring funds associated with the employer to the service provider or alternatively, to the employee for subsequent payment to the service provider.

  • Integrated Educational Stakeholder Evaluation and Educational Research System

    The present invention is a method, process, and system to (1) collect data, (2) compile the data, create new data, and analyze the data, and (3) provide an output based upon the data. The process is novel in the manner in which each of the aforementioned steps are performed as well as in its entirety due to the overall process/manner of operation. The invention uses engines with differing functions that fully integrate performance and behavioral/effort data pertaining to educational stakeholders, whereby data, statistics, and educationally related behaviors are used to capture and derive more accurate measures and/or measures of impacts influenced by and between any educational stakeholder.

  • METHOD, SYSTEM AND APPARATUS FOR EVALUATION OF EMPLOYEE COMPETENCIES USING A COMPRESSION/ACCELERATION METHODOLOGY

    A mechanism to evaluate the value of employee competencies across a business entity is provided. Managers provide raw interpretations of employee competencies in a variety of selected competency areas. The raw evaluations of employee competencies are weighted and stored according to an organizational utility of each competency to the business entity, arriving at an adjusted competency value for each competency. Depth of an employee's competency in a particular area is evaluated by selecting the highest adjusted competency value for an employee and then compressing that highest adjusted competency value in order to level initial assessments of an employee's strongest skill This compressed value is augmented by one or more accelerators based upon the assessments of the employee's other competencies. The result is an overall domain competency rating for the employee that can then be used for comparison against other employees in the business entity.

  • Methods and Apparatus for Facilitating Immigration Transactions using an Accounting System for Allocating Employment Credits

    Methods, systems and apparatus for facilitating immigration transactions and investments are disclosed. Data is prepared for use in an immigration compliance report. One or more employment credits are reported as being allocated to an investment. The employment credits represent jobs created through investment in a first business entity that employs one or more employees that are simultaneously employees of the first business entity and a second business entity. The one or more employees that are simultaneously employees of the first business entity and a second business entity are identified as holding jobs created by the investment in the first business entity.

  • METHOD AND SYSTEM FOR ANALYZING AND OPTIMIZING DISTRIBUTION OF WORK FROM A PLURALITY OF QUEUES

    A method and system for analyzing and optimizing the distribution of work from a plurality of queues includes storing historical data in a database. The historical data may include sets of different types of data items, each of the data items having an associated monetary value. The method further includes assigning a relative score to each of the data items within the sets and calculating a cumulative monetary value for each relative score, the cumulative monetary value being the summation of the monetary values for all items having relative scores up to and including the relative score. The method further includes determining the maximum cumulative monetary value calculated and its corresponding relative score. In one embodiment, the corresponding relative score is then used to determine which items to work in a set of queues that has not yet been worked.

  • METHOD OF SURVEILLANCE BY FACE RECOGNITION

    A method of surveillance by face recognition is disclosed. The method includes the steps of: first building up the face recognition database library in a storage medium comprising a plurality of face images; taking dynamic videos via an image capture device and showing the dynamic videos in the display device; performing face recognition to find the target face image in each dynamic video, and then determine the target face image as the matched or mismatched face image by comparing the target face image with the face images in the face recognition database library; and finally marking the matched and mismatched face images by different colored frames, respectively. Therefore, the method of the present invention can dynamically mark the target face images by images, colored frames and/or text to provide a solution of surveillance with high safety and efficiency.

  • Role-Based Content Rendering

    Systems and methods for rendering role-based content are described herein. The system includes a registration module configured to define an application role in a metadata driven framework for providing selective access to the content. The content may include data and content objects. The registration module may also be configured to associate content objects with the application role. The system may also include an authentication module configured to authenticate a user from a plurality of users. The user may be authenticated based on log-in credentials of the user. The authentication module may also determine the application role of the user. Additionally, the authentication module may identify one or more content objects based on the determined application role of the user. The content objects may be identified based on the application role of the user.

  • METHODS AND SYSTEMS FOR AUTHENTICATING USERS

    A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.

  • QUANTIFY AND MEASURE MICRO-BLOGGING FOR ENTERPRISE RESOURCES PLANNING (ERP)

    Embodiments of the invention provide systems and methods for presenting a quantitative view of a set of information made up a number of messages. For example, these messages can comprise emails, Short Message Service (SMS) messages, Multimedia Message Service (MMS) messages, Instant Messages, and/or any of a variety of other types of messages related to an application, process, resource, etc. of a system. Embodiments of the present invention provide for categorizing each of the messages, quantifying each category based on the messages therein, applying a weight to each of the quantified categories, plotting the weighted and quantified categories on a matrix, and presenting the matrix as a summary of the weighted and quantified categories. For example, the matrix may be presented in a dashboard, portal, or other element of a user interface of an application to which the messages are related.

  • MODELING CAREER PATH BASED ON SUCCESSFUL INDIVIDUALS IN AN ORGANIZATION

    A system and method for providing career-related information. An example method includes acquiring user information, wherein the user information includes an indication of a target career position or opportunity; obtaining aggregated information pertaining to workers who have attained the target career position; and employing the user information and the aggregated information to provide career-related information pertaining to one or more career paths. In the example method, a user questionnaire is employed to facilitate acquiring the user information. The step of obtaining aggregated information includes collecting anonymous information from profiles of the workers. The profile information may be retrieved from a Human Capital Management (HCM), performance management system, social network system, or other Enterprise Resource Planning (ERP) system component of an organization.

  • LOCATING HUMAN RESOURCES VIA A COMPUTER NETWORK

    A computer implemented method for a user of a network to locate one or more human resources, the method comprising the steps of: providing a record in a database for each of a plurality of human resources, the record including one or more keywords associated with the human resource; receiving from a first user a search request including one or more keywords; searching the records in the database to find matching records associated with one or more human resources with a keyword that matches a keyword in the received search request; and returning search results to the first user, the search results identifying the matching records.

  • RESOURCE PLANNING USING FULL TIME EQUIVALENTS

    Methods, apparatus, and computer readable media with executable instructions stored thereon for resource planning using FTEs are provided. Example methods of the present disclosure can include identifying full time equivalent (FTE) requirements of jobs, skills corresponding to the jobs, resources corresponding to the skills, and FTE capacity of resources [572]. Qualified resources are determined, by a computer, with respect to each job based on the corresponding skills of the resources relative to the skills corresponding to the jobs [574]. FTE capacity of qualified resources is allocated, by a computer, to jobs in a manner that maximizes FTE requirements of jobs having resources allocated thereto, such that a qualified resource is allocated to a job at most to the lesser of the FTE requirement of the job or the FTE capacity of the resource

  • JOB-BASED SUCCESSION PLANS AND A HIERARCHICAL VIEW OF THE SUCCESSION PLAN

    A system and method for facilitating succession management in an organization, such as an enterprise. The example method includes displaying, at a first level of a hierarchy, a first representation of a position and any incumbent assigned to the position, and illustrating, at a second level of a hierarchy, one or more second representations of one or more candidate successors to the position. The one or more candidate successors are grouped according to an indication of readiness associated with each of the one or more candidate successors. In a specific embodiment, a user option enables changing an indication of readiness assigned to a candidate successor by repositioning the candidate successor into a different readiness group within the hierarchy. Displayed data supporting candidate-readiness determinations includes data pertaining to performance history, experience, qualifications, or talent rating associated with each candidate successor.

  • VIRTUAL SYSTEMS FOR SPATIAL ORGANIZATION, NAVIGATION, AND PRESENTATION OF INFORMATION

    Organizing information around a specific spatial domain facilitates managing objects presented in visualization layers of the spatial domain. A first portion of a first program for organizing and mapping information around a specific spatial domain is executed by a first virtual system that is created in a program execution environment operable on a network server. In response to the first virtual system invoking a continuation, a second virtual system is created to execute a second portion of the first program. Invoking the continuation in the program execution environment facilitates each of the first and second virtual systems providing only the capabilities necessary to execute their respective portion of the first program. Optionally, executing the first program includes interpreting the first program with a second program.

  • SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL LEGAL LIABILITY AND PROVIDING EARLY WARNING IN AN ENTERPRISE

    A system for detection of potential legal liability is presented. The system uses factual information that has triggered liability based on any number of legal theories, and compares the words expressing those facts to customer and employee communications in order to identify potential liability to an enterprise by reviewing of the enterprise's emails. The system generates seeding information based on the factual information and words expressing certain sentiments, and provides the seeding information to a document fracturing engine which scans the email archives and identifies emails with words that potentially give rise to a liability risk. The identified emails may then be reviewed by authorized personnel so that appropriate proactive and/or corrective action may be taken before the legal liability occurs.

  • TOOLS AND METHODS FOR DETERMINING RELATIONSHIP VALUES

    Systems, apparatus, and methods for correlating two items of interest, based on a plurality of data items and characteristics. The data items may include objective and quantitative data, as well as subjective and qualitative data. In one implementation, the relationship of an individual to a metric is determined. The system, apparatus, and methods may store characteristics describing individuals generally, along with metrics relevant to an organization; receive a plurality of data items; extract information associated with the individual from the data items; determine a number of relationships between the data items, individuals, metric, and characteristics; and use the relationships to determine an overall relationship between the individual and the metric, based on the data and characteristics. In addition, related groups of characteristics may be identified. Similarly, the relationships between any individual, metric, sub-metric, group of characteristics, data item, data source, characteristic, or groups thereof may also be determined.

  • SYSTEM AND METHOD FOR STRATEGIC WORKFORCE MANAGEMENT AND CONTENT ENGINEERING

    The invention provides a system that automates workforce management tasks through the integrated use of structured content accessible from a database, a set of business logic rules engines as well as input from users via user interfaces. The invention also provides a methodology for creating engineered content that is accessible to a strategic workforce management system which manages human resources tasks.

  • HEALTHCARE PRIVACY VIOLATION DETECTION AND INVESTIGATION SYSTEM AND METHOD

    A method for detecting privacy violations of patient personal healthcare information (PHI) can include receiving audit logs from all systems within a healthcare facility. These audit logs are generated any time PHI is accessed. The Healthcare Privacy Violation Detection System (HPV-DS) compares these generate audit logs to prior access history of the employee or authorized user that generated the audit log. If any field in the generated audit log is different from the authorized user's prior access history, the risk of a privacy violation is assessed and a risk score is assigned. For audit logs that differ from past access history enough, an alert turned on and the audit log is flagged for administrators to review.

  • CALCULATING SPEED AND TRAVEL TIMES WITH TRAVEL DELAYS

    Computer program products, methods, systems, apparatus, and computing entities are provided for forecasting travel delays corresponding to streets, street segments, geographic areas, geofenced areas, and/or user-specified criteria. And from the forecasted travel delays, speed and travel times that take into account such travel delays can be determined.

  • Systems and Methods for Recruiting Candidates for Employment Opportunities

    Systems and methods for recruiting candidates for employment opportunities are disclosed. Systems and methods to create a talent pool of job candidates and identify the candidates within that pool who are potentially best qualified and be inclined to consider current job openings that has been matched to their aspirations for a career move. In particular, passive candidates, persons who are not actively looking for work, are targeted and monitored for indications that they may be interested in considering potential employment opportunities. Passive candidates are obtained from various sources, for example, a prehire or reference checking service.

  • TALENT PROFILE INFOGRAPHIC

    A system and method for example method for displaying enterprise data via a user interface display. An example method includes providing a first user option to select enterprise data to be displayed, yielding selected data in response thereto; employing a capsule to present a visualization or infographic characterizing at least a portion of the selected data; and providing a second user option to flip or rotate the capsule, thereby displaying additional enterprise data that is related to or representative of the selected data or portion thereof. In a specific embodiment, the first user option includes a slider bar that enables a user to specify a time frame to filter the enterprise data.

  • SCREW ASSEMBLING DEVICE

    An screw assembling device includes a supplying mechanism, a securing mechanism, a driving mechanism, and an assembling mechanism. The supplying mechanism supplies a number of screws sequentially. The securing mechanism holds a housing of an electronic device. The assembling mechanism is connected to the supplying mechanism and the driving mechanism. The assembling mechanism is driven by the driving mechanism to predetermined positions of the housing of electronic device and is configured for assembling the plurality of screws transmitted from the supplying mechanism to the predetermined positions of the housing of electronic device.

  • GUIDED PAGE NAVIGATION

    Configuring a set of guided documents for operation of a business activity based on a workflow for the activity, industry expertise, and a plurality of models of source data that is relevant to the business activity, wherein points of entry to access the guided documents are organized around one or more industry-specific data dimensions.

  • METHODS FOR PROVIDING REQUESTED DATA FROM A STORAGE DEVICE TO A DATA CONSUMER AND STORAGE DEVICES

    According to various embodiments, a method for providing requested data from a storage device to a data consumer may be provided. The method may include: determining a helper key for the data consumer; determining encrypted data corresponding to the requested data from a memory of the storage device; determining pre-processed data based on the encrypted data and the helper key, wherein the pre-processed data is encrypted and configured to be decrypted using a private key of the data consumer; and transmitting the pre-processed data to the data consumer.

  • MULTI-CHANNEL CUSTOMER SUPPORT AND SERVICE

    Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing service and support solutions to a user device. A system is described that provides user centric solution system by connecting a user device to multiple solution channels. This includes receiving symptom information from the user device and combining that information along with diagnostic information from the product to identify the problem. The system can also provide solution options to the user based on the availability of each support channel and the products' or services entitlements and support policies.

  • Gamification for Enterprise Architectures

    A gamification system to gamify an enterprise includes a gamification platform and a message broker. Users in the enterprise may participate as players in the gamification platform. Enterprise information systems of the enterprise may communicate events to the message broker. Gamification rules may be expressed in terms of events and game context. The gamification platform may reason over events in accordance with the gamification rules and the current context of game play in order to trigger a proper consequence.

  • TIME DERIVATIVE-BASED PROGRAM MANAGEMENT SYSTEMS AND METHODS

    Systems and methods for program management are presented. A user can perform analysis and evaluate levels of potential disruption or efficiency that exist in a program or a project thereof through one or more project metrics of a program. Understanding disruption and efficiency indices in a program can help evaluate the duration, location, reason, or severity of the disruption, and assist the program team to take appropriate measures to rectify or prevent the disruption. Disruption metrics in a program can be assessed based on computation of higher order time derivatives of one or more project metrics, such computation of at least a third order time derivative to reveal pattern or other characteristics of the disruption or efficiency or inefficiency in the program.

  • Identifying Scenarios and Business Units that Benefit from Scenario Planning for Operational Risk Scenario Analysis Using Analytical and Quantitative Methods

    Methods, computer-readable media, and apparatuses are disclosed for risk scenario analysis. Aspects of the embodiments disclose methods, computer readable media, and apparatuses for identifying scenarios for operational risk scenario analysis using analytical and quantitative methods. Additional aspects of the embodiments disclose methods, computer readable media, and apparatuses for identifying business units for performing risk scenario analysis using analytical and quantitative methods.

  • PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS

    Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.

  • METHOD AND APPARATUS FOR PROVIDING A USER WITH CONTEMPORANEOUS STRATEGY PROVIDER INFORMATION, PREFERENCES AND DECISIONS IN A COMPUTER IMPLEMENTED PLATFORM

    A method for contemporaneously displaying data on a screen; the method comprising the steps of: i. receiving a request for facilitating the selection of an executable operation from a list of possible operations ii. retrieving a first on line data related to a change in a value of the outcomes of executing said operation; iii. retrieving from a data repository a second data related to preferences, activities and performance of one or more strategy providers; and iv. contemporaneously transmitting the first data and the second data to a remote computerised device for making the first data and the second data contemporaneously available on a display of the remote computerised device.

  • MULTI-APPLICATION WORKFLOW INTEGRATION

    Techniques are described for managing interactions between workflows being performed by different applications, such as to enable a combination of multiple workflows in multiple applications of different types to aggregate varying capabilities available from the different types of applications. In some situations, an integrated workflow is created by separating portions of its functionality into multiple constituent workflows that is each performed by a different application and that initiate one or more inter-workflow interactions between the constituent workflows as they are performed (e.g., for one of the constituent workflows to, while it is being performed, invoke another constituent workflow in order to begin its performance). As one non-limiting example, the multiple applications of different types may include a least an enterprise business application program that provides various core business functions, and a desktop collaborative application program that provides various user activity management capabilities.

  • METHOD AND SYSTEM FOR PROVIDING DATA ACCESS VIA A COMMON ACCESS MANAGER CONFIGURED TO SUPPORT SECURITY FOR MULTIPLE DATABASE MANAGEMENT SYSTEM TYPES

    An approach for providing data access via a common access manager configured to support security for multiple database management system types is described. A request specifying access for a user to a feature associated with one of a plurality of database management system types is determined by a common access manager configured to support the database management system types. A first-level approval of the access request by a first-level approver is determined. The access request is forwarded to a second-level approver based on the first-level approval. A provisioning of the access to the feature for the user is initiated based on a second-level approval by the second-level approver.