摘要:
Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call.
摘要:
An approach that establishes a collaborative workspace for one or more users based on a predefined context. In one embodiment, there is a collaborative workspace tool that includes a user input component configured to receive one or more user inputs when selecting collaborative workspace content from a plurality of pre-arranged resources displayed on a user interface to include in a collaborative workspace. The collaborative workspace tool further includes a preserving component configured to gather information relating to the selected workspace content, build a workspace object to preserve the selected workspace content and save the workspace object; and a rendering component to build the collaborative workspace on a user device when the workspace object is opened from the user device.
摘要:
A system and method is provided for controlling collaboration participation. The system includes a computing infrastructure configured to monitor endpoint collaboration devices and/or users. The computing infrastructure is also configured to authorize collaboration between one or more of the endpoint collaboration devices and/or users with an initiating device if the computing infrastructure finds a match between stored attributes and information related to the one or more endpoint collaboration devices and/or users.
摘要:
Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g., within a certain time period), the link and billing plan can accommodate the transfer of the file (e.g., determined based on the size of the file), and there is sufficient power to make the file transfer.
摘要:
Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers. Once third party providers have been associated with Cloud resources, a secure relationship between the third party provider(s) and the Cloud providers will be established.
摘要:
The present invention provides a system and method for disabling an electrical device (e.g., that utilizes a data networking protocol such as 802.1X). Specifically, under the present invention, the electrical device is connected to a power socket of a power delivery network via a power bar. When disablement of a particular device is desired, the device is located by an authentication server (that communicates with the power bar over the power delivery network) using information stored in a devices information database. Once the particular device is located, an instruction to disable it is sent from the authentication server to a component, which then disables the device via the power bar.
摘要:
Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g., within a certain time period), the link and billing plan can accommodate the transfer of the file (e.g., determined based on the size of the file), and there is sufficient power to make the file transfer.
摘要:
Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
摘要:
An embodiment of the invention provides a method for controlling computing resources using visual positioning on a graphical user interface. More specifically, a computer resource is displayed as a symbol and applications are displayed as objects on the graphical user interface. Input is received from a user, wherein the input includes movement of the symbol and/or movement of at least one of the objects on the graphical user interface. The computer resource is allocated with a processor based on the input. This includes allocating more of the computer resource to a first application and less of the computer resource to a second application when the distance between the symbol and a first object representing the first application is reduced, and when the distance between the symbol and a second object representing the second application is increased.
摘要:
Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.