摘要:
A browser history is shared with peers in a social network by configuring a policy. What websites and what members are to be shared are defined in the policy. A history of the usage of the links to the defined websites by the defined members is gathered. The browser histories are published to a social networking service. The links are displayed to the user with a representation identifying the usage by the members.
摘要:
A master and a slave computing device within a co-browsing session can be identified. The devices can be associated with a first Unified Resource Identifier (URI) where a portion of the URI is a fully qualified domain name of a Domain Name System (DNS) hierarchy. The devices can be associated with a co-browsing application. A request associated with a second URI from the master computing device can be detected. The second URI can share a root domain with the first URI. A portion of a master artifact associated with the master device can be conveyed to the slave device. The master artifact can be associated with state information of the session. A portion of a slave artifact linked to the slave device can be modified with the portion of the master artifact. The devices can be navigated to the second URI in response to the request.
摘要:
A communication session is established between a first device and a browser on a second device. The communication session is a persistent hypertext transfer protocol (HTTP) session in which a transmission control protocol/internet protocol (TCP/IP) connection persists throughout the persistent HTTP session. A question is transmitted from the first device to the browser on the second device. In response to the first device receiving an illogical response to the question from the second device, the communication session between the first device and the second device is terminated.
摘要:
A request to navigate to a Uniform Resource Identifier (URI) can be received within a cobrowsing session. The cobrowsing session can be associated with a unique session identifier of a cobrowsing application. The cobrowsing application can be part of a collaboration software. An annotation previously associated with the URI from a historic cobrowsing session can be retrieved. Content associated with the URI can be obtained and presented within an interface associated with the cobrowsing session. The annotation can be presented within the content associated with the URI of the interface.
摘要:
A computer-implemented method, system and/or computer program product configure an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use.
摘要:
The present invention discloses a solution for automated playback control for portable audio devices using environmental cues as indicators for interrupting playback. In the solution, an event handler can be responsive to environmental cues around the user of the portable audio device to determine if playback should be interrupted. Triggering events can be speech emanating from the user or another proximate entity, proximity detection of a person or device, user behavior changes/transitions, and the like. Device configuration can allow for user interaction to permit or deny playback interruption. User interactions can range from a “yes/no” speech response to motion sensitive headphones detecting a head “nod” or “shake” gesture to indicate approval or refusal.
摘要:
The present invention discloses a software method for determining a travel path. The software method can identify a point of origin, a travel destination, and a travel time. Multiple different possible travel pathways between the point of origin and the travel destination can be determined. Predicted weather conditions for each of the travel pathways for a time of travel can be ascertained. Time estimates for each of the travel pathways can be adjusted based on the predicated weather conditions for each of the travel pathways. At least one of the determined travel pathways can be presented based at least in part upon the time estimates that have been adjusted for the predicted weather conditions and historical data about the given pathways with similar weather to that which is being predicted. In one embodiment; the software method can be performed by a Global Positioning System (GPS) equipped motor vehicle navigation system.
摘要:
A computer-implemented method configures an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use.
摘要:
A computer-implemented method, system and/or computer program product manage software maintenance software in a computer system. A first snapshot is taken of first system states of a computer system. The first snapshot is mapped to a first maintenance software, which is further mapped to a specific user. The computer system is instructed to install the first maintenance software in response to an installation request from the specific user. If the specific user subsequently requests that the first maintenance software be removed from the computer system, then the mappings of the first snapshot and the first maintenance software are used to revert the computer system back to the first system states.
摘要:
A change in contact information for a communicator can be identified. Communication metrics can be acquired for the communicator. The communication metrics can specify details of communications between the communicator and at least one other party. At least one previously established programmatic rule can be applied to the acquired communication metrics to automatically determine whether each of the parties is a recipient who should be notified of the change in contact information based upon comparing the communication metrics relating to that party and the communicator against at least one previously established threshold. Recipients can be selectively added to a recipient list based upon results of the applied programmatic rule. The recipient list can represent a listing of parties who are to be notified of the change in contact information.