摘要:
In one embodiment, the methods and apparatuses display a list configured to represent a plurality of virtual rooms; identify a selected participant device associated with a selected virtual room from the plurality of virtual rooms wherein the selected participant device is a member of the selected virtual room; selectively display content associated with the selected virtual room to the selected participant device; and notify the selected participant device of a change to the content associated with the selected virtual room.
摘要:
In one embodiment, the methods and apparatuses display a list configured to represent a plurality of virtual rooms; identify a selected participant device associated with a selected virtual room from the plurality of virtual rooms wherein the selected participant device is a member of the selected virtual room; selectively display content associated with the selected virtual room to the selected participant device; and notify the selected participant device of a change to the content associated with the selected virtual room.
摘要:
In one embodiment, the methods and systems detect a meeting; detect a missing participant scheduled to attend the meeting; identify a device actively utilized by the missing participant; and transmit a reminder message to the device.
摘要:
In one embodiment, a first application detects a user's activity. Based on the user's activity detected by the first application, a type of user status is determined from among a plurality of different types of possible user status. One or more features are determined of a feature set of a second application that correspond to the type of user status detected by the first application. The corresponding one or more features of the feature set of the second application are limited to prevent the one or more features from interrupting the user's activity. One or more other features of the feature set of the second application that do not correspond to the type of user status detected by the first application are permitted.
摘要:
In one embodiment, one or more applications may be executed on a computer, where each application has an associated feature set. A user status of a particular application may be determined, and in response to that user status for the particular application, the feature set of at least one other application may be dynamically adjusted.
摘要:
In one embodiment, a first application detects a user's activity. Based on the user's activity detected by the first application, a type of user status is determined from among a plurality of different types of possible user status. One or more features are determined of a feature set of a second application that correspond to the type of user status detected by the first application. The corresponding one or more features of the feature set of the second application are limited to prevent the one or more features from interrupting the user's activity. One or more other features of the feature set of the second application that do not correspond to the type of user status detected by the first application are permitted.
摘要:
Techniques are provided for tracking and analyzing defect density by source file or module. Defect density is the number of distinct defects which required changes to be made (to fix the defect) to a particular file or module in a given period of time. This metric is very useful for identifying the most critical areas of weakness of the system and hence the areas where additional investment/action may be taken. For example, this metric can be used to prioritize the area in which unit tests should be written, for which additional automated system tests should be written or which a project should be undertaken to re-write the error prone file or module to improve its quality and maintainability.
摘要:
Techniques are provided for capturing the ID of a work item, and the corresponding effort level information, as a part of the actual check-in process of the artifacts into the underlying change management system. This effort information can then be propagated to an external system for subsequent reporting and analysis. In one embodiment, tasks (or similar items such as issues or bugs) are entered into a common task or issue tracking system. As part of this process each task is assigned a unique identifier. A “call-out” is added to the source control management system which captures the effort level and task ID associated with the proposed change. The data entered is validated to ensure that the task ID is valid and that the effort entered is within a valid range. If the data entered is valid, the change to the underlying artifact is allowed to proceed and the effort and task information is stored for later analysis. If the data is not valid, the proposed change is rejected and an appropriate error message is returned to the user.
摘要:
A source sampling rate is associated with first or second groups of sampling rates. A playback rate is determined by: (a) selecting the source sampling rate if the source sampling rate is supported by a playback environment; (b) otherwise if there is a highest first rate from the first or second groups of playback sampling rates which is supported by the playback environment and is lower than the source sampling rate, selecting the first rate; (c) otherwise if there is a slowest second rate from the group that the source sampling rate is associated with that is supported by the playback environment and is higher than the source sampling rate, selecting the second rate; (d) otherwise selecting the slowest sampling rate supported by the playback environment from the group that the source sampling rate is not associated with as the playback rate.
摘要:
In one embodiment, a client device may send one or more sub-session requests to one or more corresponding session controllers through a computer network to obtain one or more corresponding sub-session tokens that indicate in which sub-sessions of an online collaborative computing session the client device is permitted to participate. The client device may then receive particular sub-session tokens (e.g., based on certain permissions), which may then be sent to a collaboration server to establish one or more permitted sub-sessions of the online collaborative computing session with the client device as indicated by the received sub-session tokens.