Month of October 2013 - Page Number 5

Showing 41 - 50 of 413 from October 2013
Browse Prior Art Database
  1. 41.
    Disclosed is a method to improve the intelligence and capabilities of out of office notification tools. Enhancements include posting availability status to a number of social computing tools from a central place and reminding the user about passwords that might expire during the out of office period.
    IPCOM000232283D | 2013-Oct-30
  2. 42.
    Below mentioned technique describes how we can identify situational context metadata using external sources and use them to annotate the conversation. Later the same could be used to search and effectively retrieving the relevant results from the converstation.
    IPCOM000232282D | 2013-Oct-30
  3. 43.
    This article discusses an approach for data fetch optimization for Busy Dashboards. Using this approach, implementers of busy dashboards can significantly reduce resources for data fetch (like database connections), leading to better performance and faster loading/reloading of widget data.
    IPCOM000232281D | 2013-Oct-30
  4. 44.
    The challenge has a temporary solution when the user address the call over the speaker, this is an uncomfortable solution most of the times and becomes less feasible from the user experience perspective. Our features discloses an approach to use Accelerometer on the Smartphones to address the problem. When a user...
    IPCOM000232280D | 2013-Oct-30
  5. 45.
    This is similar to a tag cloud, but here essentially semantically signifcant diagram elements are shown even without tagging. By User preference, the background will be either blurred or not shown. The user may expand the cloud by selecting the element for which he want to expand the summary. The summaries can be...
    IPCOM000232279D | 2013-Oct-30
  6. 46.
    Current vulnerability management processes rely heavily on a vulnerability scoring mechanism called CVSS (Common Vulnerability Scoring Scheme). This scoring method takes a set of properties about a vulnerability (e.g. how easy it is to exploit, can it be exploited remotely, does it require authentication to...
    IPCOM000232278D | 2013-Oct-30
  7. 47.
    An extensible Java tool utilising a spreadsheet for managing complex system configuration parameters.
    IPCOM000232277D | 2013-Oct-30
  8. 48.
    Disclosed is a technology to remove the fan guards while protecting the users from hazard moving parts.
    IPCOM000232276D | 2013-Oct-30
  9. 49.
    Disclosed is a method to use Radio Frequency Identification (RFID) tags as a device to dissuade the theft of individual components from a larger system (e.g., computer, automobile, etc.). The RFID tags are affixed to susceptible components at the time of manufacturing and assembly, and the manufacturer maintains...
    IPCOM000232275D | 2013-Oct-29
  10. 50.
    Disclosed is a method, incorporated into Web applications, that allows applications to handle navigation events in a manner specific to the application, rather than allowing browser-specific behavior that might be inappropriate. The approach is to provide a JavaScript* method in the Document Object Model (DOM),...
    IPCOM000232274D | 2013-Oct-29