Abstract:
Version control for a document can include receiving from a user a request to commit one or more revisions to a master document in a document repository. The one or more revisions can be included in a local copy of the master document. A processor can determine whether an accept only designation is assigned to at least a portion of the local copy. In response to a determination that an accept only designation is assigned to at least a portion of the local copy, the respective revisions assigned an accept only designation can be disallowed from incorporation into the master document. Revisions made to the master document can be sent to the user for incorporation into the user's local copy of the master document. Such sending is not prevented by the assignment of an accept only designation to at least a portion of the local copy of the master document.
Abstract:
A computer receives an image access preference that is associated with a user included in a first game session. The computer receives an image from a camera, connected to the computer, through a network. The computer analyzes the first image to identify the presence of the user. The computer generates and compares a first analysis result a to a set of stored data to determine, based on the comparison, if the user is present. Responsive to determining that the user is present, the computer applies the received access preferences, associated with the present user, to the first image.
Abstract:
A method, system and computer program product for retrieving both sensitive and non-sensitive content in a secure manner. After a proxy server establishes a secure connection between a client device and a web server, the client device receives the requested sensitive content, which includes an index file that contains a hash value that was generated by the web server. The web browser of the client device further issues a request to the proxy server to establish a non-secure connection to retrieve non-sensitive static content from the web server. After receiving the requested content, the web browser of the client device generates a hash value over the received content. If this generated hash value is equal to the hash value contained in the index file, then the web browser accepts the received non-sensitive static content. In this manner, both sensitive and non-sensitive content can be retrieved in a secure manner.
Abstract:
A method for utilizing a partial active installation session on a first computer system for an active installation session of a program product on a second computer system. Active installation of the program product having a plurality of components is initiated on the first computer system. A plurality of deployed components installed during the partial active installation session is duplicated. The deployed software components are archived into a new installation package. The new installation package is copied and deployed to the second computer system. Installation of the active product installation is completed on the second system.
Abstract:
A method for installation and configuration of selectable components of a software product. An installation user interface allows a user to identify and select a plurality of install and configuration templates from multiple sources for recommended installation of selectable software components. Responsive to a user selecting multiple install and configuration templates, the user is enabled to apply a relative weight for each of the selected install and configuration templates, wherein the relative weight is applied to each selectable software component included in the weighted template. The weighted software components from each of the install and configuration templates are merged to determine a weighted value for each selectable component. Weighted software components having a weighted value that exceed a predetermined threshold value are determined. Each selectable component having a weighted value exceeding the predetermined threshold value is installed and configured including the components to install, the install path, and other configuration options.
Abstract:
Embodiments of the present invention disclose a method, computer program product, and system for verifying the identity of a card user. A computer sends one or more temporary passcodes to a user device. The computer sends a prompt to a point of sale device, wherein the prompt requests a predefined, identifying input. The computer receives the temporary passcode, the computer verifies that the received temporary passcode is substantially similar to at least one of the one or more passcodes sent to the user device.
Abstract:
Embodiments of the present invention provide a method, system and computer program product for nested object drag and drop enablement utilizing object cloning. In an embodiment of the invention, a method of nested object drag and drop enablement utilizing object cloning includes the detection of a drag event in a GUI of an application and the identification of an object in the GUI associated with the drag event. The method also includes the retrieval in memory of one or more clones of other objects in the GUI that are nested in the identified object and the generation of an avatar for the identified object and the one or more clones. Finally, the method includes the movement in a display of the avatar from a source location of the drag event to a target location of a drop event detected in the GUI of the application.
Abstract:
Some examples described are directed to detecting that an object in a graphical user interface (GUI) obscures presentation of a first portion of a word below the object in a layering order of the GUI. A second portion of the word is displayed in the GUI. Some examples are further directed to evaluating the second portion of the word against a plurality of words prohibited for presentation via the GUI. Some examples are further directed to detecting, in response to evaluation of the second portion of the word against the plurality of words, that the second portion of the word is one of the plurality of words. Some examples are further directed to modifying presentation of the word in response to detection that the second portion of the word is one of the plurality of words prohibited for presentation via the GUI.
Abstract:
Methods and systems may provide for receiving a display request associated with a parent node of a hierarchical tree, wherein the parent node has a plurality of child nodes. Additionally, a graphical representation of the parent node and the plurality of child nodes may be determined based on a plurality of factors, and a display response can be generated based on the graphical representation. In one example, the display request is received from a browser and the plurality of factors include a browser type associated with the browser.
Abstract:
According to an embodiment of the present invention, a system displays initial search results based on a query and enables selection by a user of an item within the search results. The system determines refined search results based on behavior of the user with respect to the initial search results. Embodiments of the present invention further include a method and computer program product for presenting revised search results based on user behavior while examining the results in substantially the same manners described above.