摘要:
A method, computer program product, and computer system for automatically connecting a calling device to a best available calling device based on resource strength. A computer system receives from a first calling device a request for a call to a second calling device and evaluates resource strength of the second calling device. The computer system determines one or more third calling devices, in response to determining that the resource strength of the second calling device is low. The computer system compares resource strength of the one or more third calling devices with that of the second calling device and determines a best available one of the one or more third calling devices. The computer system connects the call by connecting the first calling device and the best available one of the one or more third calling devices.
摘要:
A system that responds to a user setting a follow-up flag on a message within a first communication application by associating the flagged message with another user, such that the flagged message is available to a second communication application. When a user sets a flag on an electronic mail message contained in an electronic mail mailbox provided by an electronic mail application, the system responds by associating the flagged message with another user in a list of other users with whom flagged messages are associated. When a communication session occurs with the other user through another communication application, the system checks the list and determines that a flagged message is associated with the other user. The flagged message is then brought to the attention of the local user, for example within a list of flagged messages associated with the other user displayed simultaneously with the instant messaging session.
摘要:
A tool for scheduling a project review meeting based on monitoring of one or more documents required for the project review meeting. The documents/files are identified along with criteria that the documents must meet prior to scheduling the review meeting. The criteria can be default criteria or specifically defined and entered by a user. The tool monitors the documents and in response to finding that the criteria has been met, determines meeting participants, generally collaborators working on the documents, determines the meeting participants' individual schedules, and determines a meeting time based on the meeting participants' individual schedules.
摘要:
Techniques are disclosed for indicating a hyperlink in a message as being inappropriate for a specified user environment, such as an office or an educational setting. In one embodiment, a message may be received from a sending user and to a receiving user (e.g., by a sending mail client or by a mail server). The message may include a hyperlink. If a message includes a hyperlink determined to be inappropriate for the specified user environment, a property of the message may be set to indicate as such. Optionally, the sending user may be notified that the hyperlink is indicated as being inappropriate for the specified user environment. The receiving user may also be warned not to activate the hyperlink that is determined to be inappropriate.
摘要:
Systems, methods and articles of manufacture are disclosed for indicating a hyperlink in a message as being inappropriate for a specified user environment, such as an office or an educational setting. In one embodiment, a message may be received from a sending user and to a receiving user (e.g., by a sending mail client or by a mail server). The message may include a hyperlink. If a message includes a hyperlink determined to be inappropriate for the specified user environment, a property of the message may be set to indicate as such. Optionally, the sending user may be notified that the hyperlink is indicated as being inappropriate for the specified user environment. The receiving user may also be warned not to activate the hyperlink that is determined to be inappropriate.
摘要:
A method, computer program product, and computer system for automatically connecting a calling device to a best available calling device based on resource strength. A computer system receives from a first calling device a request for a call to a second calling device and evaluates resource strength of the second calling device. The computer system determines one or more third calling devices, in response to determining that the resource strength of the second calling device is low. The computer system compares resource strength of the one or more third calling devices with that of the second calling device and determines a best available one of the one or more third calling devices. The computer system connects the call by connecting the first calling device and the best available one of the one or more third calling devices.
摘要:
A set of call-specific metadata entries specified by a user that each represent a user-specified item of information to capture in association with a set of telephone numbers is obtained. The user-specified items of information represented by the set of call-specific metadata entries are captured from the user in association with a telephone number that is related to the set of call-specific metadata entries. The user-specified items of information are sorted based upon at least one user-specified item of information in response to detecting a user request to sort the captured user-specified items of information.
摘要:
An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing environment) is provided. A portion/segment (e.g., private cloud) of the networked computing environment may be designated for storing at least one electronic file to be shared (e.g., as stored in a computer storage device associated with the portion). The portion of the networked computing environment may then be associated (e.g., graphically) with an electronic calendar entry (e.g., a meeting having a set of attendees). Based on the calendar entry, a set of users (e.g., the meeting attendees) authorized to access the at least one electronic file may be determined based on the electronic calendar entry. Thereafter, access (e.g., a related permissions) to the at least one electronic file may be authorized for the set of users.
摘要:
A method, computer program product, and apparatus for determining whether newly installed software is malicious software are presented. In one illustrative embodiment, software is installed on a computer system to produce newly installed software running in a secured part of the computer system. The newly installed software is only permitted to access a subset of resources in the computer system when running in the secured part. The newly installed software is run on the computer system until a selected event occurs. The newly installed software running on the computer system is monitored until the selected event occurs. The monitoring creates information used to evaluate the software for malicious behavior. The information is presented on a display to a user after the selected event has occurred, wherein the presented information comprises a recommendation of whether to provide the software access to the resources in the computer system outside the subset of resources.
摘要:
Detecting an e-mail client generating a first e-mail identifying as a recipient e-mail address an e-mail address identified in the webpage. A screen shot of the webpage can be captured. An association can be automatically created between the screen shot of the webpage and the first e-mail, and the screen shot of the webpage is stored. The first e-mail is sent to the recipient e-mail address. Responsive to receiving or opening the first e-mail or a second e-mail related to the first e-mail, the screen shot of the webpage can be automatically retrieved and presented.