Abstract:
A method prevents a cascading failure in a complex stream computer system. The method includes receiving binary data that identifies multiple subcomponents in a complex stream computer system. These identified multiple subcomponents include upstream subcomponents that generate multiple outputs and a downstream subcomponent that executes a downstream computational process that uses the multiple outputs. The method dynamically adjusts which of multiple inputs are used by the downstream subcomponent in an attempt to generate an output from the downstream subcomponent that meets a predefined trustworthiness level for making a first type of prediction. If no variations of execution of one or more functions used by the downstream subcomponent ever produce an output that meets the predefined trustworthiness level for making a first type of prediction, then computer hardware executes a new downstream computational process that produces a different second type of prediction.
Abstract:
A mechanism is provided for a time data capsule from an electronic conference. Operations include identifying meeting input sources related to the electronic conference, capturing respective data of the meeting input sources from a start through an end of the electronic conference, and maintaining and creating timestamps for the respective data that is captured. The timestamps are associated with the respective data. Operations include aligning the respective data along a timeline according to the timestamps associated with the respective data from the meeting input sources, converting the respective data into text equivalents and/or text descriptions with the timestamps retained, and identifying a trigger during the electronic conference that causes a timebox to be created with a beginning and an ending time. The operations include extracting the respective data for the timestamps that correspond to the timebox, and creating a package with the extracted respective data from the meeting input sources.
Abstract:
The present disclosure relates generally to the field of socially derived translation profiles to enhance translation quality of social content using a machine translation. In various embodiments, methodologies may be provided that automatically use socially derived translation profiles to enhance translation quality of social content using a machine translation.
Abstract:
A mechanism is provided for a time data capsule from an electronic conference. Operations include identifying meeting input sources related to the electronic conference, capturing respective data of the meeting input sources from a start through an end of the electronic conference, and maintaining and creating timestamps for the respective data that is captured. The timestamps are associated with the respective data. Operations include aligning the respective data along a timeline according to the timestamps associated with the respective data from the meeting input sources, converting the respective data into text equivalents and/or text descriptions with the timestamps retained, and identifying a trigger during the electronic conference that causes a timebox to be created with a beginning and an ending time. The operations include extracting the respective data for the timestamps that correspond to the timebox, and creating a package with the extracted respective data from the meeting input sources.
Abstract:
Embodiments relate to determining the health of a network community. Aspects include defining, via a computer processor, measurable aspects associated with the network community. The measurable aspects include metrics for one or more of: quantified interactions among users in the network community, quantified activities among the users that are associated with a topic, and quantified activities indicative of network community accessibility. Aspects also include monitoring activities conducted via the network community, collecting data from monitored activities that correspond to the measurable aspects, and analyzing collected data from the monitored activities. The analyzing is performed as a function of the metrics. Aspects further include determining, via the computer processor, a health status of the network community from results of the analyzing.
Abstract:
A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. If using the accuracy values and weighting values fails to adjust the downstream subcomponent to meet a predefined trustworthiness level for making a first type of prediction, then a new downstream computational process that produces a different second type of prediction is executed.
Abstract:
A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. Each upstream computational process is examined to determine an accuracy of each identified output. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. If using the accuracy values and weighting values fails to adjust the downstream subcomponent to meet a predefined trustworthiness level for making a first type of prediction, then a new downstream computational process that produces a different second type of prediction is executed.
Abstract:
A mechanism is provided for a time data capsule from an electronic conference. Operations include identifying meeting input sources related to the electronic conference, capturing respective data of the meeting input sources from a start through an end of the electronic conference, and maintaining and creating timestamps for the respective data that is captured. The timestamps are associated with the respective data. Operations include aligning the respective data along a timeline according to the timestamps associated with the respective data from the meeting input sources, converting the respective data into text equivalents and/or text descriptions with the timestamps retained, and identifying a trigger during the electronic conference that causes a timebox to be created with a beginning and an ending time. The operations include extracting the respective data for the timestamps that correspond to the timebox, and creating a package with the extracted respective data from the meeting input sources.
Abstract:
Systems and methods for improving communication over a network are provided. A system for improving communication over a network, comprises a detection module capable of detecting data indicating a problem with a communication between at least two participants communicating via communication devices over the network, a management module capable of analyzing the data to determine whether a participant is dissatisfied with the communication, wherein the management module includes a determining module capable of determining that the participant is dissatisfied, and identifying an event causing the dissatisfaction, and a resolution module capable of providing a solution for eliminating the problem.
Abstract:
A system, method, and computer program product for automatically managing an environment for a physical zone over a period of time. Position coordinates are received from a plurality of entities. It is determined which of the entities will occupy the physical zone over a time frame, the physical zone including at least one environmental characteristic. Environmental preferences are accessed for the entities determined to occupy the physical zone for the time frame. The environmental characteristic of the physical zone is adjusted for the time frame based on the accessed environmental preferences for the entities.