摘要:
An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list.
摘要:
An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc.
摘要:
An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables.
摘要:
A tool for verifying that a message received by a social networking service was sent by a bona fide owner of a social networking account who purportedly sent the message. The tool receives a message and it locates in the message a string that was entered into a message text field of the message. The string is compared with a registered authentication string for the bona fide owner of the account. If the string in the message matches the registered authentication string, the string is removed from the message and the message is forwarded to the social networking service. If the string in the message does not match the registered authentication string, the message is blocked from being forwarded to the social networking service.
摘要:
A mobile communication device includes a temperature sensor configured to sense a temperature and a control unit configured to determine whether a change in the sensed temperature relative to a previously-sensed temperature corresponds to a critical time range. The control unit is also configured to store data in a data storage unit when it is determined that the change in the sensed temperature corresponds to the critical time range.
摘要:
Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.
摘要:
A computer program product is provided and includes a non-transitory tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes enabling retrieval of a keyboard pressed sequence of characters of a first type, permitting a re-selection of characters of a second type, which are associated with the keyboard pressed sequence of the characters of the first type and permitting modification of the keyboard pressed sequence of the characters of the first type to initiate a search for and retrieval of characters of the second type.
摘要:
Techniques are described for allowing a user to designate one of the windows on a display device (e.g., computer monitor) as a model window. Doing so permits the user to transfer the settings of an attribute (e.g., a font, color scheme, security setting, display of a toolbar, a user-defined attribute etc.) associated with the model window to another window located on the display device once the user moves the model window within a certain distance of the other window. The settings of the attributes of the model window are then transferred to the attributes of the other window. Moreover, the assigned settings may be rolled back after a specified amount of time has elapsed. The window whose attributes were changed may then revert back to either default settings or the settings before the attributes were changed to the attribute settings of the model window.
摘要:
An embodiment includes one or more call systems and a computer processor communicatively coupled with the one or more call systems. The computer processor is configured to receive a communication from a first call system of the one or more call systems. The computer processor is further configured to retrieve recipient data from a second call system of the one or more call systems. The recipient data includes one or more receiver conditions. The computer is additionally configured to determine if the one or more receiver conditions have been met, and if they have been met, the computer processor forwards the communication to the second call system.
摘要:
A method, system and computer program product for prerequisite-driven meeting scheduling are provided. The method includes defining prerequisites to be met prior to confirming scheduling of a meeting, and defining a threshold to confirm scheduling of the meeting based on prerequisites completed. The method also includes tracking the prerequisites completed prior to the meeting, the tracking performed by tracking logic of a scheduling tool executing on a host system. The method further includes confirming that the meeting will be held as scheduled in response to determining that the prerequisites completed meet the threshold. The method additionally includes rescheduling the meeting in response to determining that the prerequisites completed are below the threshold, the rescheduling performed by the scheduling tool executing on the host system.