摘要:
A method for automatic volume adjustment performed by a physical computing system includes, with the computing system, determining a virtual proximity between a user and a number of applications running on the computing system, the virtual proximity based in part on a type of one of the number of applications, and with the computing system, automatically adjusting a volume of the number of applications linked with a sound peripheral connecting to the computing system, the volume of each of the number of applications being based on the virtual proximity.
摘要:
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.
摘要:
A method for automatic volume adjustment performed by a physical computing system includes, with the computing system, determining a virtual proximity between a user and a number of applications running on the computing system, the virtual proximity based in part on a type of one of the number of applications, and with the computing system, automatically adjusting a volume of the number of applications linked with a sound peripheral connecting to the computing system, the volume of each of the number of applications being based on the virtual proximity.
摘要:
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and security answer associated with the security question are received by the system using a user input to the information handling system. Network-accessible data stores, such as social network accounts, are searched for the security answer resulting in search results. The searching results reveal a risk level which is identified by the system. The identified risk level is provided to the user, such as at a display device.
摘要:
A method of resolving a dead shortened Uniform Resource Locator (URL) comprising, with a processor, recognizing that a shortened link is a dead link, gathering data associated with the dead link, comparing data associated with the dead link with a number of potential live links, and generating a ranked list of potential live links that have been compared with the associated data. A system for resolving a dead shortened Uniform Resource Locator (URL) posted within a status update of a social networking site, comprising, a processor and a discovery module, in which the discovery module, upon selection of a shortened URL by a user of the social networking site, recognizes that the shortened URL is a dead shortened URL, gathers data associated with the status update, and redirects the user to a live URL based on the data associated with the status update.
摘要:
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and security answer associated with the security question are received by the system using a user input to the information handling system. Network-accessible data stores, such as social network accounts, are searched for the security answer resulting in search results. The searching results reveal a risk level which is identified by the system. The identified risk level is provided to the user, such as at a display device.
摘要:
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.
摘要:
A method of resolving a dead shortened Uniform Resource Locator (URL) comprising, with a processor, recognizing that a shortened link is a dead link, gathering data associated with the dead link, comparing data associated with the dead link with a number of potential live links, and generating a ranked list of potential live links that have been compared with the associated data. A system for resolving a dead shortened Uniform Resource Locator (URL) posted within a status update of a social networking site, comprising, a processor and a discovery module, in which the discovery module, upon selection of a shortened URL by a user of the social networking site, recognizes that the shortened URL is a dead shortened URL, gathers data associated with the status update, and redirects the user to a live URL based on the data associated with the status update.
摘要:
A method for application recommendation performed by a computerized application recommendation system includes receiving usage data for applications within a category of applications from a plurality of users, and providing a first user with a recommendation for a first application in the category of applications based, at least in part, on a change in the usage data. A computerized application recommendation system includes a processor and a memory. The processor is configured to receive usage data for applications in a category of applications from a plurality of users, and provide a first user with a recommendation for a first application in the category of applications based, at least in part, on a change in the usage data.
摘要:
An incoming web feed received from a web feed document server is monitored for changes associated with a web feed document. A change associated with the web feed document is determined to have occurred. A priority is assigned to the change associated with the web feed document based upon a ranking criterion. The change associated with the web feed document is stored with the assigned priority to a memory. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.