-
公开(公告)号:CA2326708C
公开(公告)日:2012-05-01
申请号:CA2326708
申请日:2000-11-23
Applicant: IBM
Inventor: BATES CARY L , DAY PAUL R , SANTOSUOSSO JOHN M
IPC: H04N21/472 , G06F3/048 , H04N5/445 , H04N21/462 , H04N21/47 , H04N21/482
Abstract: An apparatus, program product and method dynamically adjust the scroll rate used to scroll through the program information for various television programs available to a television viewer to provide a variable rate of scroll for program information presented to the television viewer. The scroll rate may be varied, for example, to emphasize certain program information relative to other program information, e.g., by slowing down the scroll rate to increase the visibility for important program information and speeding up the scroll rate to decrease the visibility of less important program information. Dynamic scroll rate adjustment may be utilized in a number of situations, including in connection with non-interactive electronic program listings, interactive electronic program guides, and electronic overlays, among others. Furthermore, dynamic scroll rate adjustment may be based upon a number of different characteristics of the television programs associated with the displayed program information, including for example, the frequency of access of different television programs, or sponsorship of certain television programs.
-
公开(公告)号:DE102012208751A1
公开(公告)日:2012-12-06
申请号:DE102012208751
申请日:2012-05-24
Applicant: IBM
Inventor: BRANSON MICHAEL J , SANTOSUOSSO JOHN M
IPC: G06F21/20 , G06F15/167
Abstract: Ein Sicherheitsmechanismus in einem Datenbankverwaltungssystem setzt als Metadaten gespeicherte Verarbeitungsbeschränkungen durch, um zu steuern, wie unterschiedliche Teile einer Mehrknotenanwendung das Zugreifen auf Daten einer Datenbank ermöglicht wird, um Datensicherheit bereitzustellen. Wenn eine Ausführungseinheit versucht, auf die Daten zuzugreifen, prüft der Sicherheitsmechanismus vorzugsweise die Datensicherheitsbeschränkungen auf Sicherheitsverletzungen hin, um sicherzustellen, dass die Knotenbedingungen für den Zugriff korrekt sind. Wenn der Sicherheitsmechanismus auf der Grundlage der Sicherheitsbeschränkungen feststellt, dass durch eine Abfrage von einer Ausführungseinheit eine Sicherheitsverletzung vorliegt, kann der Sicherheitsmechanismus ein Senden, Verzögern oder einen erneuten Versuch durchführen, um die Datensicherheit aufrechtzuerhalten. Die Knotenbedingungen hierin beinhalten Zeitbeschränkungen und Beziehungen mit anderen Spalten, Zeilen oder Teilen von Daten. Zum Beispiel kann die gemeinsame Ausführung mehrerer Verarbeitungseinheiten erlaubt sein, der Sicherheitsmechanismus jedoch durch die Verwendung von Metadaten in der Datenbank verbieten, dass diese Verarbeitungseinheiten gleichzeitig auf bestimmte Informationen zugreifen.
-
公开(公告)号:DE10121791B4
公开(公告)日:2004-11-25
申请号:DE10121791
申请日:2001-05-04
Applicant: IBM
Inventor: BATES CARY L , MAJD MAHDAD , SANTOSUOSSO JOHN M
Abstract: A browser renders a page for display according to user habits. When a user interacts with a page associated with a network address, an entry is made in a file that associates the element on the page of the user interaction with the network address. When the page is visited again, the file is checked to see if any entry exists. If an entry exists and the stored user interaction is still relevant for that page, the page is rendered so that the location the user interacted with is provided at the top of the display, or the element is re-arranged, as in the case of a table, or both re-positioning and re-arranging occurs. Such page rendering reduces the need for the user to scroll through the page to view the desired information.
-
公开(公告)号:DE102012224492A1
公开(公告)日:2013-07-11
申请号:DE102012224492
申请日:2012-12-28
Applicant: IBM
Inventor: BRANSON MICHAEL J , SANTOSUOSSO JOHN M , SCHULZ BRANDON W
IPC: G06F9/52 , G06F5/06 , G06F15/163
Abstract: Bei einer Anwendung des Stream-Computing können Daten zwischen Operatoren unter Verwendung von Tupeln übertragen werden. Der empfangende Operator kann jedoch diese Tupel nicht bewerten, wenn sie eintreffen, sondern muss stattdessen warten, um eine Gruppe von Tupeln d. h. ein Fenster zu bewerten. Ein Fenster wird üblicherweise ausgelöst, wenn ein Puffer, der dem empfangenden Operator zugehörig ist, eine maximale Fenstergröße erreicht oder wenn eine vorgegebene Zeitperiode abgelaufen ist. Ein Fenster kann außerdem ausgelöst werden durch Überwachen einer Tupelrate, d. h. der Rate, mit der der Operator die Tupel empfängt. Wenn die Tupelrate einen Schwellenwert übersteigt oder unter diesen abfällt, kann ein Fenster ausgelöst werden. Des Weiteren kann die Anzahl von Ausnahmen oder die Rate, mit der ein Operator Ausnahmen auslöst, überwacht werden. Wenn einer dieser Parameter einen Schwellenwert erfüllt, kann ein Fenster ausgelöst werden, wodurch ein Operator angewiesen werden kann, die Tupel zu bewerten, die in dem Fenster enthalten sind.
-
公开(公告)号:DE60103455T2
公开(公告)日:2006-01-12
申请号:DE60103455
申请日:2001-06-07
Applicant: IBM
Inventor: BATES CARY LEE , RYAN JEFFREY MICHAEL , SANTOSUOSSO JOHN M
Abstract: A portable phone is equipped with a position detector that detects the geographical position of the portable phone, and a telephone system may ring one or more land-based phones or portable phones according to the geographical position of the portable phone. One or more geographical regions are defined, with corresponding telephone parameters defined for each region. When a portable phone enters a defined region, exits a defined region, or changes between two defined regions, the function of one or more land-based phones or portable phones may change. The preferred embodiments thus allow changing the function of one or more other phones based on the self-detected geographical position of a portable phone. In this manner the convenience of using portable phones is greatly enhanced.
-
公开(公告)号:AT268094T
公开(公告)日:2004-06-15
申请号:AT01000198
申请日:2001-06-07
Applicant: IBM
Inventor: BATES CARY LEE , RYAN JEFFREY MICHAEL , SANTOSUOSSO JOHN M
Abstract: A portable phone is equipped with a position detector that detects the geographical position of the portable phone, and a telephone system may ring one or more land-based phones or portable phones according to the geographical position of the portable phone. One or more geographical regions are defined, with corresponding telephone parameters defined for each region. When a portable phone enters a defined region, exits a defined region, or changes between two defined regions, the function of one or more land-based phones or portable phones may change. The preferred embodiments thus allow changing the function of one or more other phones based on the self-detected geographical position of a portable phone. In this manner the convenience of using portable phones is greatly enhanced.
-
公开(公告)号:GB2500455B
公开(公告)日:2014-10-08
申请号:GB201300404
申请日:2013-01-10
Applicant: IBM
Inventor: SANTOSUOSSO JOHN M , BRANSON MICHAEL J , SCHULZ BRANDON W
-
公开(公告)号:CA2776127A1
公开(公告)日:2012-12-01
申请号:CA2776127
申请日:2012-05-07
Applicant: IBM
Inventor: BRANSON MICHAEL J , SANTOSUOSSO JOHN M
Abstract: A security mechanism in a database management system enforces processing restrictions stored as metadata to control how different pieces of a multi-nodal application are allowed to access database data to provide data security. The security mechanism preferably checks the data security restrictions for security violations when an execution unit attempts to access the data to insure the nodal conditions are appropriate for access. When the security mechanism determines there is a security violation by a query from an execution unit based on the security restrictions, the security mechanism may send, delay or retry to maintain data security. Nodal conditions herein include time restrictions and relationships with other columns, rows or pieces of information. For example, multiple processing units may be allowed to execute together, but the security mechanism would prohibit these processing units to access specific pieces of information at the same time through the use of metadata in the database.
-
公开(公告)号:DE60103455D1
公开(公告)日:2004-07-01
申请号:DE60103455
申请日:2001-06-07
Applicant: IBM
Inventor: BATES CARY LEE , RYAN JEFFREY MICHAEL , SANTOSUOSSO JOHN M
Abstract: A portable phone is equipped with a position detector that detects the geographical position of the portable phone, and a telephone system may ring one or more land-based phones or portable phones according to the geographical position of the portable phone. One or more geographical regions are defined, with corresponding telephone parameters defined for each region. When a portable phone enters a defined region, exits a defined region, or changes between two defined regions, the function of one or more land-based phones or portable phones may change. The preferred embodiments thus allow changing the function of one or more other phones based on the self-detected geographical position of a portable phone. In this manner the convenience of using portable phones is greatly enhanced.
-
公开(公告)号:CA2776127C
公开(公告)日:2020-04-14
申请号:CA2776127
申请日:2012-05-07
Applicant: IBM
Inventor: BRANSON MICHAEL J , SANTOSUOSSO JOHN M
IPC: G06F21/62
Abstract: A security mechanism in a database management system enforces processing restrictions stored as metadata to control how different pieces of a multi-nodal application are allowed to access database data to provide data security. The security mechanism preferably checks the data security restrictions for security violations when an execution unit attempts to access the data to insure the nodal conditions are appropriate for access. When the security mechanism determines there is a security violation by a query from an execution unit based on the security restrictions, the security mechanism may send, delay or retry to maintain data security. Nodal conditions herein include time restrictions and relationships with other columns, rows or pieces of information. For example, multiple processing units may be allowed to execute together, but the security mechanism would prohibit these processing units to access specific pieces of information at the same time through the use of metadata in the database.
-
-
-
-
-
-
-
-
-