Social media message delivery based on user location
    41.
    发明授权
    Social media message delivery based on user location 有权
    基于用户位置的社交媒体消息传递

    公开(公告)号:US09515975B2

    公开(公告)日:2016-12-06

    申请号:US15093288

    申请日:2016-04-07

    CPC classification number: H04L51/20 G06K9/00671 H04L51/10 H04L51/32 H04L67/18

    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.

    Abstract translation: 本文提供了延迟社交媒体消息的方法。 第一计算设备接收用户偏好。 第一计算设备检测用户的社交媒体消息。 第一计算设备确定用户不在物理位置。 第一计算设备基于社交媒体消息的内容与接收到的用户偏好的比较来确定是否延迟发布社交媒体消息。

    DEPLOYING APPLICATIONS IN A NETWORKED COMPUTING ENVIRONMENT
    42.
    发明申请
    DEPLOYING APPLICATIONS IN A NETWORKED COMPUTING ENVIRONMENT 有权
    在网络计算环境中应用应用

    公开(公告)号:US20160269257A1

    公开(公告)日:2016-09-15

    申请号:US15163803

    申请日:2016-05-25

    Abstract: An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.

    Abstract translation: 一种在联网计算环境(如云计算环境)中部署和管理应用程序的方法。 用户上传应用程序以部署在联网的计算环境中。 分析应用程序的元数据并将其与先前部署的应用程序的元数据进行比较。 使用比较,将一组结合先前部署的具有类似平台和中间件需求的应用程序结构呈现给用户。 用户可以选择用于部署应用程序的体系结构。 应用程序在部署后不断监控,如果需要,可以向用户呈现改进应用程序的替代架构。

    RAPID SERVICE ORCHESTRATION AND MANAGEMENT
    43.
    发明申请
    RAPID SERVICE ORCHESTRATION AND MANAGEMENT 审中-公开
    快速服务管理和管理

    公开(公告)号:US20160260157A1

    公开(公告)日:2016-09-08

    申请号:US14639174

    申请日:2015-03-05

    CPC classification number: G06Q30/0635 H04L67/10 H04L67/16 H04W4/60

    Abstract: An approach for managing services in a cloud computing service marketplace. In the approach, a request for a service offered within a cloud computing service marketplace is received. A processor validates the request to confirm the service is offered within the cloud computing service marketplace. A processor applies a marker for the request, wherein the marker enables the request to be tracked. A processor validates the request to confirm that a sender of the request corresponds to a user account. A processor selects a handler from a set of one or more handlers to execute the request based on the request for the service and the service being offered by the cloud computing service marketplace, wherein the handler is capable of executing a business logic technique. A processor executes the business logic technique for the request using the handler.

    Abstract translation: 一种在云计算服务市场中管理服务的方法。 在该方法中,接收对云计算服务市场中提供的服务的请求。 处理器验证在云计算服务市场中提供的确认服务的请求。 处理器对请求应用标记,其中标记使得能够跟踪请求。 处理器验证请求以确认请求的发送者对应于用户帐户。 处理器从一个或多个处理器的集合中选择一个处理程序,以便根据由云计算服务市场提供的服务和服务的请求来执行请求,其中处理程序能够执行业务逻辑技术。 处理器使用处理程序执行请求的业务逻辑技术。

    SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
    44.
    发明申请
    SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT 有权
    网络计算环境中的安全管理

    公开(公告)号:US20160248804A1

    公开(公告)日:2016-08-25

    申请号:US15142456

    申请日:2016-04-29

    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.

    Abstract translation: 提供了一种在虚拟化/网络化(例如,云)计算环境中寻址(例如,防止)检测到的网络入侵的方法。 在典型的实施例中,用户可以根据安全敏感度级别/分类的范围对环境/域的组件/系统进行分组。 用户可以进一步配置用于响应每个安全敏感度级别/分类的安全威胁的规则。 例如,如果在包含高度敏感的系统的网段中或附近检测到“高度危险”的安全威胁,则用户可以配置将自动隔离那些属于高安全级别的系统的规则。 这种方法允许对系统安全性/入侵防御进行更细粒度的优化和/或管理,该系统安全/入侵防御可以在系统级别而不是在域级别进行管理。

    Identity management in a networked computing environment
    45.
    发明授权
    Identity management in a networked computing environment 有权
    联网计算环境中的身份管理

    公开(公告)号:US09413833B2

    公开(公告)日:2016-08-09

    申请号:US13864569

    申请日:2013-04-17

    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.

    Abstract translation: 提供了一种用于虚拟化/联网(例如,云)计算环境中的用户身份管理的方法。 在典型的实施例中,分析服务器环境内的历史命令使用以确定针对云资源运行的命令的特性,以确定命中由某个用户执行的可能性的置信度。 这样的方法允许更有效的用户身份管理,以优化云安全性和系统管理。

    SOCIALLY GENERATED AND SHARED GRAPHICAL REPRESENTATIONS
    46.
    发明申请
    SOCIALLY GENERATED AND SHARED GRAPHICAL REPRESENTATIONS 有权
    社会生成和共享的图形表示

    公开(公告)号:US20160078652A1

    公开(公告)日:2016-03-17

    申请号:US14484730

    申请日:2014-09-12

    CPC classification number: G06T11/206 G06F3/0481 G06N99/005 G06Q30/02

    Abstract: According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.

    Abstract translation: 根据本发明的实施例,一个或多个计算机处理器显示非结构化数据。 一个或多个计算机处理器显示图形地表示非结构化数据的至少一部分的第一图表。 响应于第一图表不能满足用户定义的标准,一个或多个计算机处理器修改第一图表以生成以用户定义的方式图形地表示非结构化数据的至少一部分的第二图表。 在某些实施例中,非结构化数据包括不具有预定义数据模型和/或未以预定义方式组织的信息。

    Classifying files on a mobile computer device
    47.
    发明授权
    Classifying files on a mobile computer device 有权
    在移动计算机设备上分类文件

    公开(公告)号:US09003480B2

    公开(公告)日:2015-04-07

    申请号:US13799257

    申请日:2013-03-13

    Abstract: A client computer extracts contextual information associated with a file that is created. The client computer generates scores for the file by utilizing the contextual information that is extracted. The client computer assigns a value to the file, based on an aggregation of the scores that are generated. The client computer monitors activities on the client computer, wherein the activities trigger an event on the client computer. The client computer determines whether the event is in violation of one or more computer security policies on a server computer, wherein the one or more computer security policies require work-related files to be deleted or encrypted. The client computer classifies the file as personal data or work-related business data. The client computer secures the file, if the file is classified as work-related business data.

    Abstract translation: 客户端计算机提取与创建的文件相关联的上下文信息。 客户端计算机通过利用提取的上下文信息来生成文件的分数。 客户端计算机根据生成的分数的聚合为文件分配一个值。 客户端计算机监视客户端计算机上的活动,其中活动触发客户端计算机上的事件。 客户端计算机确定事件是否违反服务器计算机上的一个或多个计算机安全策略,其中一个或多个计算机安全策略要求删除或加密工作相关文件。 客户端计算机将文件分类为个人数据或与工作相关的业务数据。 如果文件被归类为工作相关业务数据,则客户端计算机将文件保护。

    ESTIMATING WAIT TIME FOR AN ESTABLISHMENT
    48.
    发明申请
    ESTIMATING WAIT TIME FOR AN ESTABLISHMENT 审中-公开
    估计设立的等待时间

    公开(公告)号:US20150019271A1

    公开(公告)日:2015-01-15

    申请号:US13939543

    申请日:2013-07-11

    CPC classification number: G06Q50/12 G06Q10/02 G06Q50/01

    Abstract: A computer collects resource reservation history for a resource for a plurality of reservation time blocks. The computer collects resource reservation wait time history for the resource for each reservation time block. The computer determines a number of patrons that utilized the resource during each reservation time block and creates a resource reservation wait time model. The computer receives a request for a resource reservation wait time estimate for a first reservation time block and collects a first plurality of social media content. The computer determines an estimated number of patrons that intend to utilize the resource during the first reservation time block based on at least the first plurality of social media content. The computer determines a first estimated wait time for the first reservation time block by comparing at least the estimated number of patrons to the resource reservation wait time model.

    Abstract translation: 计算机收集用于多个预留时间块的资源的资源预留历史。 计算机收集每个预留时间块的资源的资源预留等待时间历史。 计算机确定在每个预留时间块期间利用资源的顾客的数量,并创建资源预留等待时间模型。 计算机接收对第一预约时间块的资源预留等待时间估计的请求,并且收集第一多个社交媒体内容。 基于至少第一多个社交媒体内容,计算机确定在第一保留时间块期间预期利用资源的顾客的估计数量。 通过将估计的顾客数量与资源预约等待时间模型进行比较,计算机确定第一预约时间块的第一估计等待时间。

    IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
    49.
    发明申请
    IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT 有权
    网络计算环境中的身份管理

    公开(公告)号:US20140317263A1

    公开(公告)日:2014-10-23

    申请号:US13864569

    申请日:2013-04-17

    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.

    Abstract translation: 提供了一种用于虚拟化/联网(例如,云)计算环境中的用户身份管理的方法。 在典型的实施例中,分析服务器环境内的历史命令使用以确定针对云资源运行的命令的特性,以确定命中由某个用户执行的可能性的置信度。 这种方法允许更有效的用户身份管理,以优化云安全性和系统管理。

Patent Agency Ranking