Month of October 2016 - Page Number 4

Showing 31 - 40 of 371 from October 2016
Browse Prior Art Database
  1. 31.
    For efficient shipping of more number of vehicles from one place to other place or country, high cube containers are used. Depending upon the types of vehicle, the shape and size will change. When size increases, then total loading capacity of containers may get affected. It might lead to lesser number of vehicles...
    IPCOM000248106D | 2016-Oct-26
  2. 32.
    A method is provided for understanding user commands, stripping of control flows, delaying and formulating complete command sections, before finally running an uninterrupted user script on multiple target endpoints with different shells (or without any shell) that are located more than 2 hops/nodes away from the user...
    IPCOM000248105D | 2016-Oct-26
  3. 33.
    Maintaining anonymity in hospitality service user preference requirements.
    IPCOM000248104D | 2016-Oct-26
  4. 34.
    This disclosure proposes a way to organise results from a search engine according to a user-defined white list of preferred sites. This allows a user to only display search results from sites that they are interested in. Users can opt to only show results from one site, or from a group of user-defined sites. Multiple...
    IPCOM000248103D | 2016-Oct-26
  5. 35.
    This article discusses a method and apparatus for enhancing the user experience related to configuration management using cognitive services. Cognitive services provide a way of extending search and enhancing the context describing configuration data. The enhanced context and search facilities simplify configuration...
    IPCOM000248102D | 2016-Oct-26
  6. 36.
    Transaction tracking technologies focus on tracking composite applications across multiple technologies, protocols, domains (middleware stacks) and operating systems. Tracking is often achieved by instrumenting targeted software with tracking agents which generate tracking events at strategic points in the...
    IPCOM000248101D | 2016-Oct-26
  7. 37.
    The properties assigned to a cursor are enhanced to also carry security credentials. This then can allow the cursor to interact with the systems it may 'mouseover' or are sensitive the presence of a cursor to allow security information to flow into the application via a cursor property.
    IPCOM000248100D | 2016-Oct-26
  8. 38.
    End-user monitoring software monitors end-user performance, end-user activity, and end-user response times. End-users are often Web Users using a Web client (Browser) to access remote systems and applications. Typically metrics relating to end-user activity and response times, including Web Page metrics, are...
    IPCOM000248099D | 2016-Oct-26
  9. 39.
    In electronic messaging systems, private information is often communicated to an individual or group of individuals. Whilst systems exist to prevent the redistribution of private information to third parties, the systems also prevent further collaboration on that information by the original recipients. A system is...
    IPCOM000248098D | 2016-Oct-26
  10. 40.
    Disclosed is a method of reduding the excessive power for system with CPU that is usually consumed, and thereby achieving the power saving without sacrificing performance.
    IPCOM000248097D | 2016-Oct-26