摘要:
Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.
摘要:
Provided are techniques for throttling using message partitioning and buffering. A plurality of messages are stored in an input topics buffer, where the input topics buffer is stored in a plurality of partitions, and where each of the partitions of the plurality of partitions is associated with a tenant subgroup of a plurality of tenant subgroups of a tenant. A message of the plurality of messages from the tenant subgroup of the tenant is selected. A throttle count for the tenant subgroup is retrieved. A maximum message threshold for the tenant is retrieved. In response to determining that the throttle count is less than the maximum message threshold, the message is moved from the input topics buffer to a work topics buffer. In response to determining that the throttle count is equal to or greater than the maximum message threshold, throttling the tenant subgroup.
摘要:
A method, system and computer-usable medium for preventing a single point of failure in accessing encrypted data. In certain embodiments passwords of multiple system administrators are encrypted with a master key to generate encrypted master keys respectively associated with each system administrator. In certain embodiments, the passwords of the multiple system administrators are also one-way hashed to generate multiple one-way hashed passwords respectively associated with each system administrator. In certain embodiments, the user identifiers and plain text passwords may be used to decrypt the master key based on the encrypted master keys and one-way hashed passwords.
摘要:
A computer program product configured to execute a method for exchanging electronic data. The method includes receiving, using an API, a request to transmit data from a source trading partner to a destination trading partner; querying a name server, using a domain name system protocol, the name server comprising a subdomain of the destination trading partner to send the data to, wherein the subdomain is mapped to a destination access point, wherein a name of the subdomain conforms to a common format, wherein an address of the subdomain conforms to another common format; determining the address of the subdomain based on the querying of the name server; addressing the data, using another API, to be sent to the address of the subdomain; and transmitting the data, using the another API, to the destination access point by virtue of the subdomain's mapping to the destination access point.
摘要:
A method, system and computer-usable medium for preventing a single point of failure in accessing encrypted data. In certain embodiments passwords of multiple system administrators are encrypted with a master key to generate encrypted master keys respectively associated with each system administrator. In certain embodiments, the passwords of the multiple system administrators are also one-way hashed to generate multiple one-way hashed passwords respectively associated with each system administrator. In certain embodiments, the user identifiers and plain text passwords may be used to decrypt the master key based on the encrypted master keys and one-way hashed passwords.
摘要:
An electrical signal indicative of an intrusion is detected at an application executing in a cryptographic data processing system. In response to the detection, an instruction is constructed in the application for the cryptographic data processing system. Using a processor, the instruction causes a cryptographic data item to be removed from a portion of a memory device installed in the cryptographic system.
摘要:
An electrical signal indicative of an intrusion is detected at an application executing in a cryptographic data processing system. In response to the detection, an instruction is constructed in the application for the cryptographic data processing system. Using a processor, the instruction causes a cryptographic data item to be removed from a portion of a memory device installed in the cryptographic system.
摘要:
A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an application on a remote computer utilizing a plug and play communications device having a trusted embedded component. The plug and play communications device is connectable to a first computer. Access is allowed to the first computer by the application on the remote computer using the VPN to perform threat removal operations on the first computer.
摘要:
A computer program product configured to execute a method for exchanging electronic data. The method includes receiving, using an API, a request to transmit data from a source trading partner to a destination trading partner; querying a name server, using a domain name system protocol, the name server comprising a subdomain of the destination trading partner to send the data to, wherein the subdomain is mapped to a destination access point, wherein a name of the subdomain conforms to a common format, wherein an address of the subdomain conforms to another common format; determining the address of the subdomain based on the querying of the name server; addressing the data, using another API, to be sent to the address of the subdomain; and transmitting the data, using the another API, to the destination access point by virtue of the subdomain's mapping to the destination access point.
摘要:
Provided are techniques for throttling using message partitioning and buffering. A plurality of messages are stored in an input topics buffer, where the input topics buffer is stored in a plurality of partitions, and where each of the partitions of the plurality of partitions is associated with a tenant subgroup of a plurality of tenant subgroups of a tenant. A message of the plurality of messages from the tenant subgroup of the tenant is selected. A throttle count for the tenant subgroup is retrieved. A maximum message threshold for the tenant is retrieved. In response to determining that the throttle count is less than the maximum message threshold, the message is moved from the input topics buffer to a work topics buffer. In response to determining that the throttle count is equal to or greater than the maximum message threshold, throttling the tenant subgroup.