摘要:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
摘要:
Systems and methods for providing a social network. The methods involve: creating a relationship between a first entity and a second entity; setting authorization which indicates that a user of said first entity is authorized to view inventory data of said second entity; receiving a request to view first inventory data of said first entity and second inventory data of said second entity by said user; and determining whether said user is authorized to view said second inventory data. If said user is authorized: querying a first remote inventory management system of said first entity for said first inventory data and a second remote inventory management system of said second entity for said second inventory data; receiving said first and second inventory data; generating an aggregate view comprising said first and second inventory data; and providing content of said aggregate view to a client computing device of said first entity.
摘要:
Methods are disclosed for grouping search results into a profile page. A search engine accepts a user search string and generates a first set of results. In response to the first set of results, a query generator generates queries corresponding to a number of entities sharing a common name. The search engine executes the queries, returning responsive data sets. An entity resolver merges the data sets to ensure that each unique entity is represented by a single data set. A threshold may be defined such that results meeting a certain level of similarity are merged. A profile generator creates a profile page for each unique entity using biographical data contained in the respective data sets, and generates a results page containing links to each unique profile. The results page is then sent to the user for display on a graphical user interface.
摘要:
An apparatus, system, and method to transcribe a voice chat session initiated from a text chat session. The system includes a chat server, a voice server, and a transcription engine. The chat server is configured to facilitate a text chat session between multiple instant messaging clients. The voice server is coupled to the chat server and configured to facilitate a transition from the text chat session to a voice chat session between the multiple instant messaging clients. The transcription engine is coupled to the voice server and configured to generate a voice transcription of the voice chat session. The voice transcription may be aggregated into a text chat history.
摘要:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
摘要:
Provided are techniques to track a user's attention with respect to elements displayed on a computer screen, correlate the elements to resources and pre-fetch the resources prior to a user request to access the resource. Data storage is allocated for the fetching of content that the user is anticipated to access and a business is notified of a user's interest in an advertisement so that the business may make purchasing, warehousing and shipping decisions.
摘要:
A request to navigate to a Uniform Resource Identifier (URI) can be received within a cobrowsing session. The cobrowsing session can be associated with a unique session identifier of a cobrowsing application. The cobrowsing application can be part of a collaboration software. An annotation previously associated with the URI from a historic cobrowsing session can be retrieved. Content associated with the URI can be obtained and presented within an interface associated with the cobrowsing session. The annotation can be presented within the content associated with the URI of the interface.
摘要:
Embodiments can include instructions or steps, which when carried out, detect that copy operations are being performed on website data displayed to a user. Further to this detection, a co-browsing query for display to a user may be generated, an instruction to associate a co-browsing invitation with website data copied by the user may also be generated and a co-browsing invitation and pasted website data may be sent to an invitee.
摘要:
A method, system, and computer program product is provided for automatically searching and injecting a multi-person chat history into a chat session, and allowing users to inject a multi-person chat history into a new chat session. After comparing new chat session participants with chat history participants stored in a chat log within a predetermined temporal window to determine a number of similar participants after the new chat session is created, there is performed one of injecting the chat history into the new chat session automatically when the number of similar participants is at least as great as a first predetermined threshold; or prompting a user response to inject the chat history into the new chat session when the number of similar participants is at least as great as a second threshold, where the chat history is injected into the new chat session when the user affirmatively responds to the prompt.
摘要:
A method of proactively monitoring the coherency of distributed cache. A cache comparison utility selects a set of cache keys from a replica cache connected to a main cache via a network. The cache comparison utility selects a first cache key from the set of cache keys and fetches a first cache value from the replica cache that corresponds to the first cache key. The cache comparison utility generates a first checksum value corresponding to the first cache value and the first cache key and stores the first checksum value in a first checksum table. The cache comparison utility creates a first total checksum value that corresponds to the first checksum table and compares the first total checksum value with multiple total checksum values that correspond to the main cache and one or more additional replica caches, thereby identifying replica caches that are not identical to the main cache.