摘要:
A method and program product to monitor the activities of a named person for developing a computer program. The method comprises the steps of logging operations performed by a software build tool or software test tool, a record in the log for each of the operations comprising an identity of a person that requested the operation and a time stamp of the operation; identifying the activities of the named person; determining that the named person is currently accessing the software build tool or software test tool; querying the log records with a time stamp within a predetermined period to determine that the named person has used the software build tool or software test tool to develop the computer program within the predetermined period; and reporting to the user that the named person used the tool to develop the computer program within the predetermined period.
摘要:
A method of automating a telephone call to a contact with whom a text based electronic communication is exchanged. The method can include, via a processor, receiving from a first electronic messaging client a first identifier corresponding to a first text based electronic communication sent to a user or received by the user, and receiving from a second electronic messaging client a second identifier corresponding to a second text based electronic communication sent to the user or received by the user. Via the processor, a list that identifies at least the first identifier and the second identifier can be presented. Responsive to receiving a user selection of the first identifier or the second identifier, via the processor, a telephone call can be automatically initiated to a telephone number that corresponds to the selected identifier.
摘要:
According to one embodiment of the present invention, a method for automatically entering favorite locations into a navigation system is provided. The method according to one embodiment includes receiving information regarding a location from an object within a vehicle using a navigation system. An identifier to the information and the information and identifier are stored in the navigation system. The user may retrieve the information from the navigation system using the identifier. The information from the objects may be received in various wireless formats, including RFID, Bluetooth and Wi-Fi.
摘要:
A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations.
摘要:
A method of presenting log messages during execution of a computer program. The method can include identifying at least a second log message set comprising information that is the same as information contained in a first log message set. The method can include determining to present the second log message set in a manner that indicates that the second log message set is redundant, and presenting such list of log messages accordingly, or determining not to present the second log message set in the list of log messages, and presenting the list of log messages accordingly.
摘要:
A method, device, and program product are provided for no-look entry of digits in a multi-touch device. A multi-touch screen of the multi-touch device senses an initializing combination of at least one touch. A no-look digit entry application assigns a binary value to each touched location. The multi-touch screen detects at least one combination of at least one touch of the touch screen. The no-look digit entry application determines the locations touched and enters digit inputs corresponding to the sum of the binary values assigned to the locations for each detected combination of touches.
摘要:
Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested.
摘要:
In a method for allocating a file to a user, a first computer receives, over a network, data monitored by a second computer. The first computer comprises an IDE client. The data comprises data of usage of the file by one or more users in a group of users. The first computer receives a request to allocate the file to a first user in the group. In response to the first computer determining that, based on the data of usage, the file is allocated to a second user in the group, the first computer denies the request. The first computer adds the first user to an end of a queue identifying one or more users in the group that are waiting for the second user to relinquish allocation of the file. The first computer utilizes the data of usage to display the queue in the IDE client.
摘要:
In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate.
摘要:
A method for allowing selective delivery of changesets by environment includes selecting at least one value in software code of a software program; specifying at least one environment for the selected at least one value; compiling the software code in each specified at least one environment; delivering the software code to a central repository; determining how the specified at least one environment is defined; and choosing at least one environment to build against, thereby ensuring that only software code for the chosen environment is pulled from the central repository.