摘要:
Embodiments of the present invention address deficiencies of the art in respect to wiring components in a component based application and provide a method, system and computer program product for heuristically assembling components in a component based application. In one embodiment, a data processing system configured to assemble component based applications can include a component aggregation application including an application builder configured to assemble components into a component based application. The system further can include a property broker coupled to the component aggregation application and configured to apply a wiring scheme to selected components in a component based application. Finally, a collaborative heuristic integration matching engine (CHIME) can be coupled to the property broker and a data store of behaviorally derived data, the CHIME including program enabled to suggest components for assembly in a component based application based upon behaviorally derived data in the data store.
摘要:
Content with personalized content links are published at a server. The content and specified content characteristics of the content are received at the server. In addition, potential reader's personalization indicators are received by the server. The content is linked with the specified content characteristics and the potential reader's personalization indicators. The content is then published at the server.
摘要:
A computer program product that includes a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data that, when executed on a computer, causes the computer to perform operations. The operations include receiving a request for personal data from a data access device, determining a first location corresponding to a location of the data access device, and determining a second location corresponding to a location of an authentication device. The operations also include transmitting the personal data to the data access device if the first location is within a threshold distance of the second location.
摘要:
A method, system and apparatus for configuring a page for drag and drop arrangement of content artifacts can include populating a content artifact registry with a plurality of content artifacts, each of the content artifacts defining a draggable and droppable form of a particular type of page content. The method further can include defining a drop zone within the page to receive a dragged and dropped one of the content artifacts, the drop zone defining a consumable type of page content and an action to undertake when consuming a dropped one of the content artifacts having a particular type of page content consistent with the consumable type of page content.
摘要:
An instant message addressed to a recipient associated with an instant messaging device is received at the instant messaging device. A configured calendar event for the recipient associated with a time period during which the instant message is received is determined. Authorization information associated with a sender of the instant message is received. The instant message is processed based upon the configured calendar event for the recipient and the authorization information associated with the sender of the instant message.
摘要:
A message status bartering system is established in a peer-to-peer messaging environment. A message status is made available to a user of the peer-to-peer messaging environment. A bartering engine is used to determine whether an attempted communication with the user is to be allowed based on the message status in use. If the communication is disallowed, the bartering engine can be used to establish a bartering agreement between the parties.
摘要:
The insertion of content into media streams is provided. A media stream is monitored by a media server computer, the monitored media stream having at least one marker designating an associated insertion position within the media stream. A marker is selected to insert personalized social-awareness based content into the media stream. Social awareness information associated with a target of the monitored media stream is identified. The social awareness information is utilized to select personalized social-awareness based content. The personalized social-awareness based content is inserted into the monitored media stream at the corresponding insertion position associated with the selected marker to transform the media stream.
摘要:
Messaging interactions among a set of network user access accounts is monitored at a presence server. The messaging interactions between the set of network user access accounts are ranked based upon a characteristic of the messaging interactions. A presence filtering profile is automatically configured that defines distribution controls for presence information for the set of network user access accounts based upon the determined ranking. Distribution of the presence information for the set of network user access accounts is controlled based upon the configured presence filtering profile.
摘要:
A Web document including Web content can be presented within a user interface. At least one content segment of the Web document can be associated with a visual identifier. At least one annotation can be associated with said content segment of the Web document. The annotation can be presented within an annotation view of the user interface. The annotation can include content provided by another in commentary to the Web document and in particular in commentary to the content segment of the Web document.
摘要:
Referenced content is shared through collaborative business applications by detecting referenced content in an electronic communication. The referenced content references content stored in an external repository. The referenced content identifies a registered external repository connector. A determination is made whether an Access Control List (“ACL”) for the referenced content lacks an entry for a recipient of the electronic communication. Also an ACL entry is generated for the recipient in response to the recipient lacking an entry in the ACL for the referenced content. The ACL entry controls access to the referenced content for the recipient.