摘要:
A system, apparatus, and method for recommending network content based upon shared preferences among members of a social network is provided. The method can be a computer-implemented method that includes determining a membership of a user in at least one social network in response to the user accessing a communications network. The method can further include identifying network content associated with other members of the at least one social network. Based upon the shared preferences, a list can be generated and transmitted to the user, the list comprising at least one network site for accessing the identified network content.
摘要:
Functionality can be implemented in email applications to allow sent messages to be updated, even if the sent messages have been read. When a request to update a sent message is received, a message update unit can update information in the message according to the notification. The message update unit can notify a recipient that the message was updated, and can indicate changed information in the sent message. The message update unit can also determine if the sent message has been forwarded, and forward the update notification to other recipients.
摘要:
A method for providing electronic introductions includes providing, with an electronic communication, an electronic introduction that gives additional information regarding a party to the electronic communication that is in addition to the electronic identification of that party. A system for providing an electronic introduction may include a computer configured to search at least one database for information about a party being introduced and compile an electronic introduction for the party incorporating the information; and an electronic communication function configured to provide access to the electronic introduction to a recipient of an electronic communication sent by the party using the electronic communication function.
摘要:
A portion of text associated with a message intended for a group of recipients is encrypted at a computing device. The portion of text may include less than an entirety of the message. Access to the portion of text may be restricted for a first subset of the group of recipients and allowed for a second subset of the group of recipients.
摘要:
A method for exploitation of location proximity to derive a location of an employee in a corporation utilizing instant messaging or automatic telephone calls is provided. A search request for a location of an employee is received. A look up of coworkers of the employee in a corporate database is performed. A list of neighbors of the employee is extracted from the coworkers, and the list of neighbors of the employee is generated in accordance with the proximity of neighbors in the list of neighbors to a workspace of the employee. The list of neighbors is presented, in response to the search request. The list of neighbors is polled to locate the employee via instant messaging and/or automatic telephone calls. The location of the employee is received, in response to polling the list of neighbors. The neighbors are alerted that the employee has been located.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to collaborative computing and provide a method, system and computer program product for autonomically configuring a workspace in a collaborative computing environment. In an embodiment of the invention, a method for autonomically configuring a workspace in a collaborative computing environment can be provided. The method can include identifying a subject user and corresponding workspace in the collaborative environment, locating within a social network a related user for the subject user, retrieving a workspace configuration for the related user, and applying the workspace configuration to the corresponding workspace of the subject user.
摘要:
In a method and system for protecting context sensitive information from being transmitted from an instant message client, at least one policy is received that includes an entry of one or more disallowed terms and is associated with at least one action. Words typed into an IM message of the IM client by a user are then monitored in real-time. In response to any of the words typed into the IM message matching any of one or more disallowed terms, the action associated with the policy is automatically performed. According to one embodiment, an example action that may be associated with the policy and that is automatically performed may include temporarily halting transmission of the IM message, and displaying a warning message to the user, for example.
摘要:
A portion of text associated with a message intended for a group of recipients is encrypted at a computing device. The portion of text may include less than an entirety of the message. Access to the portion of text may be restricted for a first subset of the group of recipients and allowed for a second subset of the group of recipients.
摘要:
A method and computer program product for determining that a user of a client electronic device is in do-not-interrupt mode. A message directed to the user is routed to a client-based storage queue for subsequent delivery.
摘要:
A computer-implemented method of managing data storage according to collaborative activity can include determining collaborative activity for each of a plurality of data items associated with a first user and stored within a first data storage device. The method can include calculating a measure of relevancy for each of the plurality of data items according to the collaborative activity and comparing the measure of relevancy of each of the plurality of data items to at least one relevancy threshold. Different ones of the plurality of data items can be selectively migrated from the first data storage device to a second data storage device according to the comparison of the measure of relevancy of each of the plurality of data items.