Abstract:
A system and related method exchange messages under the control of a messaging client. The method comprises splitting a content of a source message into a plurality of fragments defined by corresponding portions of its content associated with different recipients of the message. A plurality of transport messages are generated, each comprising one or more of the fragments associated with the recipients. The transport messages are submitted to a messaging server for causing it to provide the transport messages to corresponding further messaging clients of the recipients for their aggregation. A computer program and a computer program product for performing the method are also provided.
Abstract:
A method, system and computer program product for topic recognition in a written conversation includes receiving, by one or more processors, a written conversation from a collaborative messaging system used by a user. The one or more processors perform a first search in the written conversation to find additional concepts associated with a topic stored in a knowledge base of the user. Each of the additional concepts includes a descriptor of the topic. In response to finding at least one additional concept associated with the topic in the written conversation, the one or more processors tag the at least one additional concept to the topic such that the at least one additional concept is replaced by the topic in the knowledge base.
Abstract:
A method and system for controlling operation of a computing device. One or more applicable settings among settings of one or more features of the computing device are determined. The settings are indicated by policies provided by two or more providers according to priorities of corresponding providers for application of corresponding policies of the providers. The policies include an indication of corresponding settings of the one or more features of the computing device. The providers are validated with at least one authority. The at least one authority certified the priorities of the providers and permissions of the providers to set the features of the policies. The computing device is configured to operate according to the applicable settings of the features.
Abstract:
A cognitive system collects online behaviors of a user and an affinity group of users who are related (e.g. by relationship, or behavioral similarities) to the user. A knowledge base of behavior and sentiment patterns is produced and maintained. If real-time data for the user shifts in behavior and/or sentiment and significantly deviates from established patterns, the system looks for a similar behavior and/or sentiment pattern shift among members of the affinity group. If the affinity group patterns shift in a manner similar to the first user's pattern shift, the cognitive system, in response, updates the knowledge base with information related to the shift, thereby adding knowledge to the long-term patterns. If the cognitive system finds that the user's behavior and/or sentiment pattern shift differs significantly from the affinity group, the system generates an empathy fostering alert message and sends it to one or more recipients.
Abstract:
Provided are techniques for automatically correcting touchscreen errors. A first location input is received from a user touching a global touchscreen of a global device, where the first location input is a location relative to a display surface of the global touchscreen. It is determined that movement of the global device is different from movement of a local device. Motion information of the local device is retrieved. The first location input is corrected to a second location input based on the motion information. In response to the second location input, an operation is performed.
Abstract:
A computer-implemented method for enhancing navigation systems and maps with security-related information includes receiving, by a computer, a map comprising one or more security areas; and also receiving dynamic information about respective conditions related to each of the one or more security areas and respective security attributes related to each of the one or more security areas. Furthermore, the computer calculates a respective risk value for each of the one or more security areas based on the respective conditions and the respective security attribute of the security area; and transmits to a user device associated with a user, risk-related information based on a current location of the user device and the respective risk values.
Abstract:
A method for encoding information within a feature of a document. The method includes at least one computer processors determining information to encode within a document. The method further includes identifying a feature within the document to encode information within based, at least in part, on metadata of the document corresponding to the feature. The method further includes determining a set of geometric properties of one or more segments of the identified feature. The method further includes encoding, by one or more computer processors, a first bit of information of the determined information within a first segment of the feature within the document by modifying one or more geometric properties respectively associated with the first segment. The method further includes outputting the document with information encoded within the first segment.
Abstract:
An embodiment directed to a method for providing a specified state at a premises to which a user travels. Comprises determining a time of operation needed by a device located at the premises to provide the specified state, after device activation. One or more positions of the user are detected when the user is within a boundary, the boundary being determined in part by the time of operation. Detected user positions are used to determine a time of arrival of the user at the premises. A time to activate the device is computed from the arrival time and time of operation, collectively, wherein activating the device at the computed time causes the specified state to be provided at a time that coincides with arrival of the user at the premises.
Abstract:
A tool for distress management. The tool determines a level of distress associated with a user. The tool identifies a next action to be performed by the user. The tool determines a level of distress associated with the next action. The tool determines whether the associated level of distress exceeds a predetermined threshold. Responsive to a determination that the associated level of distress exceeds the predetermined threshold, the tool alerts the user of an impact to the level of distress associated with the user.
Abstract:
A method for encoding information within a feature of a document. The method includes at least one computer processors determining information to encode within a document. The method further includes identifying a feature within the document to encode information within based, at least in part, on metadata of the document corresponding to the feature. The method further includes determining a set of geometric properties of one or more segments of the identified feature. The method further includes encoding, by one or more computer processors, a first bit of information of the determined information within a first segment of the feature within the document by modifying one or more geometric properties respectively associated with the first segment. The method further includes outputting the document with information encoded within the first segment.