Abstract:
Embodiments of the present invention provide a method, system and computer program product for threshold activation of an audio teleconference. In an embodiment of the invention, a method for threshold activation of an audio teleconference is provided. The method includes receiving calls into a conference bridge for an audio conference and determining whether or not a threshold number of calls from corresponding callers have been received for the audio conference. The method also includes initiating the audio conference responsive to a threshold number of callers having called into the audio conference, but prohibiting initiation of the audio conference until the threshold number of callers have called into the audio conference.
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to auto-entry of addresses in an electronic message and provide a novel and non-obvious method, system and computer program product for cautious auto-entry for messaging systems. In one embodiment of the invention, a cautious auto-completion method can be provided. The method include auto-completing a messaging address provided in a messaging client; computing a similar name set (SNS) value for the auto-completed messaging address; and, posting a warning if the SNS value exceeds an SNS threshold. As used herein, an SNS includes a list of similar messaging addresses having similarities likely to result in an unintended auto-completed messaging address in a messaging system.
Abstract:
Within a system comprising a processor and a memory, a method of sending an attachment of a first electronic mail (email) to a recipient. The method includes receiving the first email addressed to the recipient and, via the processor, determining whether a volume of data contained in the recipient's electronic mailbox has reached a threshold level. When the volume of data has reached the threshold level, via the processor, establishment of an instant messaging session with an instant messaging client associated with the recipient can be initiated. The attachment can be caused to be attached to an instant message. Sending of the instant message to the instant messaging client associated with the recipient can be initiated.
Abstract:
A run-time application-generated change to dynamic web content, generated during an application run-time by a dynamic web application, is detected in response to user run-time interactions with the dynamic web content rendered by the dynamic web application that changed the dynamic web content during the run-time. The detected run-time application-generated change to the dynamic web content is parsed. The parsed run-time application-generated change to the dynamic web content is compared with web content compliance rules that define specifications for web content representation. A noncompliant element associated with the parsed run-time application-generated change is identified based upon the comparison with the web content compliance rules. A run-time correction of the identified noncompliant element within the dynamic web content changed by the dynamic web application is performed to cause the identified noncompliant element to comply with the web content compliance rules.
Abstract:
Optimizing update instructions in hierarchically structured documents is provided. A pending update list including a first plurality of items is received. Each item of the first plurality of items describes an update to a hierarchically structured document. Each of one or more items of the first plurality of items is added to a subsumed update list having a second plurality of items. The subsumed update list is ordered based, at least in part, on a document order and on a target node of each of the second plurality of items. Subsume logic is applied to each of the one or more items based, at least in part, on the second plurality of items. Responsive to determining that subsume logic has been applied to each item of the first plurality of items, each of the second plurality of items of the subsumed update list is executed.
Abstract:
Optimizing update instructions in hierarchically structured documents is provided. A pending update list including a first plurality of items is received. Each item of the first plurality of items describes an update to a hierarchically structured document. Each of one or more items of the first plurality of items is added to a subsumed update list having a second plurality of items. The subsumed update list is ordered based, at least in part, on a document order and on a target node of each of the second plurality of items. Subsume logic is applied to each of the one or more items based, at least in part, on the second plurality of items. Responsive to determining that subsume logic has been applied to each item of the first plurality of items, each of the second plurality of items of the subsumed update list is executed.
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to auto-entry of addresses in an electronic message and provide a novel and non-obvious method, system and computer program product for cautious auto-entry for messaging systems. In one embodiment of the invention, a cautious auto-completion method can be provided. The method include auto-completing a messaging address provided in a messaging client; computing a similar name set (SNS) value for the auto-completed messaging address; and, posting a warning if the SNS value exceeds an SNS threshold. As used herein, an SNS includes a list of similar messaging addresses having similarities likely to result in an unintended auto-completed messaging address in a messaging system.
Abstract:
A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine. The communication analyzer receives an element of original content of a written communication. The communication analyzer also receives a selection of a persona style. The selected persona style defines a communication style. The modification engine presents a substitute element to a user in response to a determination that the element of the original content of the written communication is incompatible with the selected persona style. The substitute element is compatible with the selected persona style.
Abstract:
According to one aspect of the present disclosure, a method and technique for establishment service rating via tip amounts is disclosed. The method includes: determining, by a client computing system, a total tip amount corresponding to a plurality of transactions at an establishment; determining a total party size representing a total quantity of consumers receiving services from the establishment corresponding to the plurality of transactions; computing an average tip per person value based on the total tip amount and the total party size, the average tip per person value anonymous to the consumers; and forwarding, by the client computing system to a rating service for online display by the rating service, the average tip per person value corresponding to the establishment for online access and viewing by other consumers.
Abstract:
A method, computer program product, and computer system are disclosed for disk management in a distributed storage system, wherein the distributed storage system comprises a plurality of disks within a main disk ring, and the disks store target data. In one embodiment, the method comprises dividing the target data into cold target data and hot target data, and grouping one or more disks within the main disk ring into a cold data disk ring and the remaining one or more disks within the main disk ring into a hot data disk ring, based on the cold target data's and the hot target data's positions on disks. The method further comprises migrating the cold target data on disks not within the cold data disk ring onto disks within the cold data disk ring while migrating the hot target data on disks not within the hot data disk ring onto disks within the hot data disk ring, and reducing a spinning rate of disks within the cold data disk ring.