摘要:
A method, computer program product and computer system for establishing an effective communication between two users in a virtual world, which includes measuring a communication capability for each of the users, and establishing a communication using a default type of communication, if a difference between the communication capabilities of the two users is not above a pre-determined threshold. The method, computer program product and computer system can further establish a communication using an alternate type of communication, if a difference is above the pre-determined threshold.
摘要:
A method, computer program product and computer system for establishing an effective communication between two users in a virtual world, which includes measuring a communication capability for each of the users, and establishing a communication using a default type of communication, if a difference between the communication capabilities of the two users is not above a pre-determined threshold. The method, computer program product and computer system can further establish a communication using an alternate type of communication, if a difference is above the pre-determined threshold.
摘要:
A method for reverse reading a computer program code to locate useful information includes receiving a selection of a line of the computer program code from a user, extracting one or more variables from the line of the computer program, searching the computer program code for one or more other lines of code that create and/or use the variables, and highlighting the other lines of code that create and/or use the variables.
摘要:
A method for verifying the validity of a hyperlink, and determining whether the domain name of the website that the user is directed to is valid. In one embodiment, the method identifies a hyperlink, a URL within the hyperlink and a domain name within the URL. The identified domain name is then assigned a page rank parameter. If the page rank parameter is below a threshold value, then the method compares the identified domain name to a list of well-known or high page rank domain names. A similarity parameter is then assigned to the identified domain name to indicate if the hyperlink is misleading. If the link is misleading, the method may implement some configurable remedial action, such as alerting the user or disabling the hyperlink.
摘要:
An apparatus, program product and method assess a spam risk associated with submission of a user's private information to an entity such as a web site. For example, the spam risk associated with an entity accessible over an electronic communications medium may be assessed by monitoring an account of a user for receipt of unsolicited communications from the entity in response to the user submitting private information solicited by the entity, and determining a spam risk for the entity based upon the monitoring.
摘要:
An apparatus and method automatically verifies online transactions, such as credit card charges, made by a customer of a bank or financial institution. A browser “plug-in” is used to monitor a first party use of the internet to detect online transactions and create transaction data. The transaction data is forwarded to the financial institution to correlate with transaction data received independently from the other party in the transaction. The financial institution can provide the customer with alerts, such as online purchase warnings, if there are problems or discrepancies between the data from the first party and the data provided by the second party. The transaction data can also be used in other ways to provide information to the financial institution's customers.
摘要:
In an embodiment, a subset of a document that includes data blocks is marked by begin ignore tags and end ignore tags. A subsequent spell check operation checks the spelling accuracy of a complement of the subset and ignores the spelling accuracy of the subset. In an embodiment, the data blocks are copied from selected origin locations in the document or another document to a buffer and then pasted from the buffer to the document. The data blocks are then marked to be ignored in response to an ignore spell check option associated with a paste command. In another embodiments, the data blocks are selected and marked in response to an ignore option associated with an edit command. In this way, spell checking of subsets of a document may be selectively enabled and disabled.
摘要:
A method, apparatus and computer-usable medium for executing, at an Entitlement Broker Service (EBS), a request from a requesting user for a protected computer resource that is available only to entitled users. Entitlement identifications are located using a Standardized Entitlement Credentials Data Store (SECDS) in the EBS. The SECDS contains entitlement identification in a standardized format that can be used to contact an Entitlement Source (ES) for entitlement information regarding the requesting user and the requested protected computer resource. The located entitlement information, for the requesting user, is then transmitted from the EBS to an External Client Application (ECA) that manages the protected computer resource, thus affording the requesting user access to the protected computer resource.
摘要:
Electronic messaging systems, a machine-accessible medium, and methods for text-based electronic communication. In one embodiment, a plurality of databases are provided. The databases each define shorthand terms with one or more longhand terms. A shorthand term is targeted within a text message, and the databases are searched for corresponding longhand terms. The longhand terms are selected for display according to factors such as user preferences, the identities of participants to the text communication, and the context of the text message. Abbreviations, shorthand, and other jargon sent by one user is thereby interpreted. For example, one of the longhand terms may be substituted in-line with the text message. Alternatively, all matches for the shorthand term found in the databases may be listed in descending order according to relevancy.
摘要:
A method, apparatus and program-product are provided for managing user access to a converged set of entitlement resources residing within an entitlement resource repository. Each of the entitlement resources is marked with an entitlement identifier. When a requester attempts to access an entitlement resource, an authentication token corresponding to the requester is sent to one or more entitlement authorities associated with the entitlement resource. The entitlement authority creates a set of entitlement identifiers associated with the requestor. This set of entitlement identifiers associated with the requestor is then compared with the entitlement identifiers associated with the entitlement resource to determine if the requestor has authority to access the entitlement resource.