摘要:
This application describes an application of resource unit brokering algorithms, chip management methods for automated brokering, chip management methods for live brokering, and chip allocation methods to the brokering of security characteristics of service level management within an enterprise. Typically, the security characteristics are derived from known capacity values that are provided by configuration managers. Calculations are made on the capacity values and maximum quantities of the availability resource units are provided to resource brokers for spot or periodic sale and auction to one or more buyer's agents.
摘要:
Systems, methods, media, and apparatuses for disabling camera functionality in a portable device are disclosed. Embodiments of the method may include establishing a connection with a camera-enabled portable device and transmitting to the portable device a request for permission to disable camera functionality. Embodiments of the method may also include receiving a response from the portable device relating to permission to disable camera functionality. Further embodiments of the method may include, in response to receiving permission to disable camera functionality, transmitting to the portable device a command to disable camera functionality or, in response to receiving an indication that the user refused permission, displaying a notification message. The command to disable camera functionality may include a command to disable camera functionality for a prescribed period, while the portable device is located within a secure geographical location, partially or fully disable camera functionality, and/or other methodology.
摘要:
A method, system, and computer program product for detecting a tailgate event between two vehicles moving in a forward motion is provided. The two vehicles include a first and second vehicle, one of the two vehicles being an offending vehicle and the other of the two vehicles being an affected vehicle. The method includes determining a distance between the two vehicles. The first vehicle is ahead of the second vehicle. The method also includes calculating a safe distance range between the two vehicles based upon one or more of speed, weight, and safe braking range values of at least one of the two vehicles. The method further includes comparing the distance and the safe distance range and activating a recording device on the affected vehicle if the distance is less than the safe distance range indicating an unacceptable range value, the offending vehicle being responsible for causing the unacceptable range value.
摘要:
A system and method to modify avatar characteristics and, in particular, to modify avatar characteristics based on inferred conditions. The system comprises a collection engine configured to collect one or more inputs and at least one rule set. The system also comprises an emotion engine configured to accept the one or more inputs and operate on the at least one rule set by comparing the one or more inputs to the at least one rule set, the emotion engine configured to modify at least one characteristic of a user participating in a virtual universe when the comparing produces a match.
摘要:
A method and system are provided for identifying type-ahead candidates. A method includes determining a context of past non-threaded emails of a user. The method further includes generating a context index associating the past non-threaded emails of the determined context with repeatable values within the past non-threaded emails. The method further includes receiving characters in a current email and determining a context of the current email. The method further includes determining matches between the current email and the past non-threaded in the context index. The method further includes identifying the corresponding repeatable values and matching the identified corresponding repeatable values with the received characters. The method further includes presenting the candidate words to the user for inclusion in the current email.
摘要:
The present invention provides a computer-implemented method, system, tool, and program product for sending a customized reply to an instant message. Specifically, under the present invention, a customized message may be provided for a specific instant messaging contact/availability status combination. When the availability status is selected and a message is received from the instant messaging contact, the customized message is automatically sent to the messaging contact. The invention may also be integrated into a calendaring application to determine, for example, whether the message recipient is in a meeting and, if so, to automatically send a reply that gives an estimated ending time for the meeting.
摘要:
Embodiments of the present invention relate to the migration of virtual machines (VMs) between networked computing environments (e.g., cloud computing environments) based on resource utilization. Specifically, embodiments of the present invention provide an approach to select an optimal set (one or more) of VMs as candidates for pre-staged migration. In a typical embodiment, when a first cloud environment nears physical resource capacity, an optimal set of VMs will be identified for migration to a second cloud environment that has sufficient capacity to accommodate workload(s) from the first cloud environment. To make this process more efficient, data associated with the set of virtual machines may be “pre-stage” replicated from the first cloud environment to the second cloud environment (e.g., in advance of the migration of the identified set of VMs).
摘要:
Illustrative embodiments disclose sharing an area of a computer system screen. A first computer system configures a sharing session for sharing a region of the screen with a second computer system. The first computer system assesses information on performance of the sharing session, determining from the information a minimum size of the region based on the assessment, and then selects the region to share based on the assessment and a designation by a user.
摘要:
A method and system for representing data includes providing a data representation according to defined variables and a functional relationship between the defined variables and receiving an assigned weight assigned to a defined variable. The method includes receiving a modification of a selected defined variable, and providing a further data representation according to a recalculation of an unselected defined variable, based upon the functional relationship, the assigned weight and the modified variable. Assigned weights and a plurality of modifications of the weighted variable are received. A further data representation is provided according to a further recalculation of the weighted variable based upon a weight selected from the assigned weights according to a previous modification of the weighted variable. The recalculating is performed according to a number of modifications performed since the previous modification of the weighted variable and according to a period of time since the previous modification of the weighted variable.
摘要:
Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity.