Abstract:
A system and method for recording a telephone conference and replaying a portion of the recording during the conference. Users participate by connecting through different types of networks using a device having a communication line connection. The recording can be in audio format, text format, or both. Thus, users can recall and replay textual information in addition to the recorded audio. Other information-such as time and user data-may also be recorded along with the audio and text. Users in the conference are identified to enable the association with them each user's contribution to the conference. The user or the user's device can assist by providing identification information. User identification may also be accomplished by associating each user's contribution with the particular line the user is calling from. Caller ID information may also be used to identify the user. Voice analysis may also performed to accomplish user identification.
Abstract:
A system and method for displaying layered data, such as data with a hierarchical relationship is provided. A flat tree view control is provided that indicates the level corresponding to individual data items without indenting data items. Colors or grayscale shading is applied to each data item to indicate the item's level within the hierarchy. Items within the same level use the same color or shading. When an item is selected by the user it is expanded or collapsed depending on whether the layers below the selected item already appear on the display screen. Additional level indicator values and level indicator bars can be used to further indicate the level of data items. A data item can also be highlighted to indicate a particular attribute corresponding with an individual data item.
Abstract:
A system and method for delivering application data to both constrained and non-constrained devices. In a Java implementation, the Abstract Window Toolkit (AWT) is used when a client computer system is not constrained and is running the Java Virtual Machine. When the client computer is constrained and, therefore, is unable to execute the Java Virtual Machine, the server computer uses a second library called a Markup Language Window Toolkit (MLWT) with the same API names as in the AWT. The result of the Java Virtual Machine executing APIs from the AWT within a browser on the client computer system are graphics that appear on the client's browser display. Correspondingly, the result of a server executing a Java Virtual Machine executing APIs from the MLWT is HTML and/or JavaScript that is capable of being processed and displayed by a client computer system without using a Java Virtual Machine. The system and method further determines whether a client computer system is constrained resulting in the use of either the AWT or the MLWT.
Abstract:
A system and method for providing a password to a user using voice recognition technology. The user's voice signature is captured and stored in order to identify the user. When the user forgets or otherwise loses a password needed to log into a computer system, he telephones a password reset system. An identifier corresponding to the user is provided by the user by using the telephone keypad or voice commands. One or more random words are requested by the password reset system. The user responds by repeating the words into the telephone receiver. The received words are matched against the user's stored voice signature to authenticate the user. If the user is authenticated, one or more desired passwords are provided to the user using a number of delivery mechanisms. If the user is not authenticated, the intrusion is logged to further maintain system security.
Abstract:
A system and method for dynamically packaging component objects. A server receives a request from a client. The server identifies one or more objects based on the request. The identified objects may be copied from the server's nonvolatile storage area, generated dynamically, or be a result of modifying objects stored on the server's nonvolatile storage area. The identified objects are written to a package file. The server downloads the package file to the client. A dialog may be sent to the client to determine whether the client wishes to download the package file. The package file is provided dynamically in response to the client's request. The package file may include objects that include generated code, such as Java tag handler files, Java tag extra info files, and Java tag library description information. Java definitions may be included with the package file to create a Java jar file.
Abstract:
A system and method for allowing system operators to collaborate and coordinates efforts through an action diary. The operators communicate directly with each other through a chat page in the appropriate action diaries. The dialog may be saved for archive, copy commentary to action diary notes, or deleted. Two or more operators may work on solving the same root problem. Coordinating operator efforts includes capturing the coordinated best practice solution. Two operators working on the same root problem may access two different action diaries or a common action diary. Pre-set event rules cause both operators to be notified of the other operator's actions. The updates to both action diaries are coordinated as appropriate. Each diary may reference the other's path allowing individual customization. In other cases, the paths may be duplicated.
Abstract:
A data collection program collects data from a user's workstation and captures the user environment data, including user settings and program application data. The user environment data is stored on a removable nonvolatile storage media for duplication processing. The stored user environment data is processed by a duplication process to duplicate the user environment data from the old workstation onto a new workstation or for recovery from a catastrophic system failure. A variety of user environment settings, not traditionally captured and restored by traditional backup software, are captured and restored. For example, licensing information and application personality data is identified, stored, and recovered along with other user-specific information such as hostnames, IP addresses, and the like.
Abstract:
An approach is provided in which the approach receives a query request to execute a query. The approach provides multiple query execution options based on multiple hardware configurations. The multiple query execution options include multiple execution times and multiple execution costs. The approach receives a selection that selects at least one of the query execution options and, in turn, executes the query on at least one of the hardware configurations based on the received selection.
Abstract:
An approach is provided in which the approach trains a first machine learning model using a set of features corresponding to a set of build blocks. The set of build blocks include at least one dependency build block and at least one artifact package build block. The approach predicts a set of risk values of the set of build blocks using the trained first machine learning model, and marks at least one of the build blocks as a bottleneck in response to comparing the set of risk values against a risk threshold.
Abstract:
At least one data file for backup can be received. The data file can be divided into a plurality of data blocks. A first portion of the plurality of data blocks can be allocated to a first data processing system for backup by the first data processing system. A second portion of the plurality of data blocks can be allocated to a second data processing system for backup by the second data processing system.