摘要:
A system and an article of manufacture for providing a prompt for real-time cognitive assistance include analyzing input from at least one environmental sensor to identify context information pertaining to a user situation, identifying a likely subsequent cognitive task of the user in the user situation based on the context information and use of a learned model, determining an action with respect to information to be suggested to the user via a corresponding prompt, wherein the determining is based on the likely subsequent cognitive task, the context information and information learned from at least to one previous user situation, computing a confidence value to represent a level of certainty in the action, and providing the prompt to the user if the action has a confidence value greater than a threshold value corresponding to the action.
摘要:
A system and an article of manufacture for providing a prompt for real-time cognitive assistance include analyzing input from at least one environmental sensor to identify context information pertaining to a user situation, identifying a likely subsequent cognitive task of the user in the user situation based on the context information and use of a learned model, determining an action with respect to information to be suggested to the user via a corresponding prompt, wherein the determining is based on the likely subsequent cognitive task, the context information and information learned from at least to one previous user situation, computing a confidence value to represent a level of certainty in the action, and providing the prompt to the user if the action has a confidence value greater than a threshold value corresponding to the action.
摘要:
A programmed method for supplying content includes receiving via a network a request for a first content for use on a device, from a requester; automatically selecting a second content to fulfill the request; and providing the second content to a source of the request. From the point of view of a requester, the programmed method includes requesting via a network a first content for use on a device; and receiving an automatically selected second content to fulfill the request. The device may be a computer, and the content may be software for use on the computer. Selection may be performed in accordance with predetermined criteria, including predetermined rules. Information defining at least one criterion may be received from at least one requester. The criteria may be based on relatedness of the first content and the second content. Generally, the request is fulfilled via a network.
摘要:
A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
摘要:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
摘要:
A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
A system and method provide an enhanced e-mail (electronic mail) system with a proactive indication of recipient away message. The system and method provide an enhanced e-mail system with a proactive indication of away messages of individuals related to the recipient. The system and method also provides for enhanced e-mail with a variety of away messages automatically sent based on criteria such as the nature of the e-mail sender, the date the e-mail was received, and the content of the e-mail.
摘要:
The present invention introduces the notion of a route provider that efficiently and automatically helps and rewards drivers for traversing optimal driving routes. In particular, described is a technique for receiving one or more conditions and criteria associated with map directions over a computer network from a service bureau. The route provider or a third party may reward drivers for traversing preferred routes.
摘要:
A method, system, and computer program for managing proficiency information about a degree holder. An active degree in a degree field is issued to a degree holder. The active degree includes a certification that the degree holder has completed at least one degree process, a strength value associated with the certification indicating a proficiency in the degree field, and a strength evaluator configured to adjust the strength value such that the strength value reflects the degree holder's proficiency in the degree field over time.