摘要:
A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface.
摘要:
Systems, computer storage devices, and methods receive a request from a first user. The first user has at least one instance running within a cloud-computing environment. The systems, computer storage devices, and methods automatically analyze the first user instance to produce first user instance characteristics, and automatically analyze characteristics of other user instances running within the cloud-computing environment. Other users, who are different from the first user, operate the other user instances. The systems, computer storage devices, and methods automatically match the first user instance to instances of the other user instances by determining which of the other user instances have the same characteristics as the first user instance characteristics. The systems, computer storage devices, and methods automatically identify cloud-computing options selected by such other users that operate the matching instances that are related to the request. The systems, computer storage devices, and methods then automatically make recommendations to the first user using the computing devices.
摘要:
In a method for adding a caller to a group instant messaging chat, a computer receives an indication that the caller has joined a teleconference via a telephone call. The computer receives a characteristic of the telephone call. The computer determines that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference. In response to determining that the received characteristic of the telephone call at least partially matches at least one stored characteristic of one or more invitees on a list of invitees to the teleconference, the computer requests an instant messaging server to add the caller to the group instant messaging chat.
摘要:
Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session.
摘要:
In a method for viewing an event, a computer registers agents such that each agent is communicatively coupled to each other agent. Each agent is associated with a graphical user interface (GUI) session. The computer monitors a first graphical user interface (GUI) session that includes contents viewable on a display device coupled to the computer. The first agent receives, from a second agent, monitoring data associated with a second GUI session. The second GUI session includes contents hidden from view on the display device. The first agent detects an event associated with the second GUI session. In response, the computer displays, on the display device, the event within the contents of the first GUI session.
摘要:
A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form.
摘要:
A tool for detecting potential unintentional user input. Eye tracking technology is used to keep a record of where on a display a user is looking or if the user is even looking at the display. When input, such as a mouse selection or a tap on a touch screen, is received, the location of the selection is compared to a location of the user's gaze around when the selection was made. If the gaze location is outside of an acceptable range from the selection location, it is determined that the selection may have been in error and the selection is disregarded or a confirmation is requested of the user.
摘要:
Embodiments of the present invention provide an approach to forecast a potential demand for partitioned/sharded data and to distribute the data among a set of data partitions based on forecasted demand to optimize network characteristics (e.g., network bandwidth) and/or expedite data retrieval. For example, the data may be distributed among the partitions based on a quantity of trends/requests/hits on the data, so that requests for the data can be balanced among the partitions geographically.
摘要:
Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold).
摘要:
Embodiments of the present invention leverage information of the end-user and personal annotations/tags attached to resources and/or support related thereto (e.g., people, documents, etc.) to provide personalized support. Among other things, these embodiments allow for the mapping of expert “system”-based support to social technology to enable dynamic, localized support. In a typical embodiment, the system will analyze a profile of a user, as well as tags the user has attached to requested computer resources. Based on the profile and the tags, individualized support can be provided automatically.