摘要:
Methods and systems for translating a text into multiple languages performed by at least one software component executed by at least one processor, comprise: maintaining a translation repository having a plurality of entries associating different types of content with user-specified languages; monitoring the text received by a program to identify one or more types of content and a source language of the text; retrieving the user-specified languages from the translation repository associated with the identified types of content; and for each of the identified types of content, translating the content thereof from the source language to the corresponding user-specified language when the source language is different from the corresponding user-specified language.
摘要:
A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link.
摘要:
A method, computer program product, and system for enforcing eMeeting guidelines is described. An indication of one or more use restriction guidelines is received. The one or more use restriction guidelines is associated with an electronic communication session. The one or more use restriction guidelines is provided to a computing device associated with an invitee associated with the electronic communication session. An indication is received that the invitee has accepted a portion of the one or more use restriction guidelines. The portion of the one or more use restriction guidelines is enforced with respect to one or more devices associated with the invitee.
摘要:
A computer implemented method manages meeting invitations to sub-invitees. A meeting coordinating computer detects a meeting invitation being sent from a meeting moderator's computer to a primary invitee's computer. The meeting coordinating computer intercepts a response from the primary invitee's computer. This response contains a request for a sub-invitee to accompany the primary invitee to the meeting. If the sub-invitee is initially authorized by the meeting coordinating computer to attend the meeting, then a request is transmitted to the meeting moderator's computer for additional authorization to invite the sub-invitee to the meeting.
摘要:
A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version of the media data is sent to one or more recipient(s). After confirming identity of a recipient at a receiving system, a supplemental version of the media data is sent to the receiving system which augments the degraded version such that it can then be played by the recipient(s). The degraded version of the media data has a reduced quality that is obtained by removing portions of the data and filling in the removed portions with dummy data. During a subsequent rebuilding of the media data, a supplemental version of the media data is sent to the receiving data processing system where it is merged/combined with the degraded version to form a copy that corresponds to the original, high-quality version of the media data.
摘要:
A method of secure electronic message conveyance. The method can include, via a processor, receiving a request to forward an electronic message originally received by a first user to at least a second user. The method also can include, based on content contained in the electronic message, selecting from a plurality of approval entities at least one approval entity that is to determine whether the electronic message is approved to be forwarded to the at least a second user, and receiving from the selected approval entity an indication that indicates whether the electronic message is approved to be forwarded to the second user. The method further can include, responsive to the selected approval entity approving the forwarding of the electronic message to the second user, automatically forwarding the electronic message to the second user.
摘要:
Embodiments of the present invention provide a method, system and computer program product for sideband control of a secured e-mail message. In an embodiment of the invention, a method for sideband control of a secured e-mail message is provided. The method includes receiving a secured form of a message from a sender in an e-mail client executing in memory by at least one processor of a computer. The method also includes rendering the secured form of the message comprehensible only subsequent to the establishment of a sideband channel of communication with the sender.
摘要:
Functionality can be implemented in email applications to allow sent messages to be updated, even if the sent messages have been read. When a request to update a sent message is received, a message update unit can update information in the message according to the notification. The message update unit can notify a recipient that the message was updated, and can indicate changed information in the sent message. The message update unit can also determine if the sent message has been forwarded, and forward the update notification to other recipients.
摘要:
The present disclosure may include receiving a query from a computing device at a server having a database, the query identifying a desired attribute. The present disclosure may also include searching the database to identify contact information for at least one individual having the attribute corresponding to the query. The attribute may include at least one of skills, expertise, product, organization, geography and language The contact information may be transmitted to the computing device via an electronic message identifying the contact information.
摘要:
Collisions are detected between multiple instant messages that are sent to a given user at the same time. In response to detecting a collision, the sending users are put into a real-time, on-line negotiation that enables the sending users to determine among themselves whose instant message will be delivered next to the receiving user. This allows the sending users to make a determination of which message is most important based on their relative needs at the time. A collaborative communication session, such as a group chat, is initiated for the negotiating sending users so that they can exchange information regarding the purposes of their messages. Based on the results of this on-line negotiation between message senders, a limited number (e.g. one) of the colliding messages are next delivered to the receiving user.