摘要:
A method and computer program product for context-informed summarization is described. A method may comprise determining, via a computing device, a context of a communication. The method may further comprise determining, via the computing device, a summarization attribute for the communication based upon, at least in part, the context of the communication. The method may also comprise creating a summary of the communication based upon, at least in part, the summarization attribute.
摘要:
A method and computer program product for propagating instant message status change is described. A method may comprise receiving, via at least one of a client electronic device and a server computer, an instant message request associated with an instant message request target. The method may further comprise determining, via at least one of the client electronic device and the server computer, an instant message status based upon, at least in part, the instant message request and the instant message request target. The method may also comprise in response to the determination, providing, via at least one of the client electronic device and the server computer, an indication of the instant message status.
摘要:
A method and computer program product includes initiating an instant messaging session on one or more communication devices. A first time-limitation setting for the instant messaging session based upon a user identification may be received. The first time-limitation setting may represent a maximum duration for the instant messaging session. A second time-limitation setting for the instant messaging session based upon the user identification may also be received. The second time-limitation setting may represent a minimum time between one or more instant messaging sessions. The instant messaging session may be terminated if the duration of the instant messaging session exceeds the first time-limitation setting. A subsequent instant messaging session may be prevented if the time between the instant messaging session and the subsequent communication does not exceed the second time-limitation setting.
摘要:
A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link.
摘要:
A method, computer program product, and system for enforcing eMeeting guidelines is described. An indication of one or more use restriction guidelines is received. The one or more use restriction guidelines is associated with an electronic communication session. The one or more use restriction guidelines is provided to a computing device associated with an invitee associated with the electronic communication session. An indication is received that the invitee has accepted a portion of the one or more use restriction guidelines. The portion of the one or more use restriction guidelines is enforced with respect to one or more devices associated with the invitee.
摘要:
Collisions are detected between multiple instant messages that are sent to a given user at the same time. In response to detecting a collision, the sending users are put into a real-time, on-line negotiation that enables the sending users to determine among themselves whose instant message will be delivered next to the receiving user. This allows the sending users to make a determination of which message is most important based on their relative needs at the time. A collaborative communication session, such as a group chat, is initiated for the negotiating sending users so that they can exchange information regarding the purposes of their messages. Based on the results of this on-line negotiation between message senders, a limited number (e.g. one) of the colliding messages are next delivered to the receiving user.
摘要:
In a calendar messaging method and system, a calendar application executing on a computer receives a command to activate an out-of-office status, and receives one or more selected calendar events. The method and system further include automatically updating the calendar events, wherein the updating includes at least one of canceling the calendar events, and removing the user as an invitee of the calendar events. An out-of-office message is then automatically sent to at least one recipient indicating a type of update made to one or more of the calendar events.
摘要:
A computer implemented method manages meeting invitations to sub-invitees. A meeting coordinating computer detects a meeting invitation being sent from a meeting moderator's computer to a primary invitee's computer. The meeting coordinating computer intercepts a response from the primary invitee's computer. This response contains a request for a sub-invitee to accompany the primary invitee to the meeting. If the sub-invitee is initially authorized by the meeting coordinating computer to attend the meeting, then a request is transmitted to the meeting moderator's computer for additional authorization to invite the sub-invitee to the meeting.
摘要:
A method of secure electronic message conveyance. The method can include, via a processor, receiving a request to forward an electronic message originally received by a first user to at least a second user. The method also can include, based on content contained in the electronic message, selecting from a plurality of approval entities at least one approval entity that is to determine whether the electronic message is approved to be forwarded to the at least a second user, and receiving from the selected approval entity an indication that indicates whether the electronic message is approved to be forwarded to the second user. The method further can include, responsive to the selected approval entity approving the forwarding of the electronic message to the second user, automatically forwarding the electronic message to the second user.
摘要:
Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message.