摘要:
Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.
摘要:
Described are systems and methods for managing an electronic communication thread. A thread is identified between a first electronic device and a plurality of second electronic devices. A parameter is generated to stop watching communications generated by the second electronic devices related to the thread. At least one new communication from the second electronic devices is detected, the at least one new communication related to the thread. An action is performed in accordance with criteria established with respect to the thread in response to detecting the at least one new communication.
摘要:
Data corresponding to a current activity of a user is formatted for display. A contact list, tags of interest, and visual display mapping preferences associated with the user are received. A real time broadcast of a current activity of the user is received. A tag of interest most relevant to the current activity of the user is selected. Real time broadcasts of current activities of contacts associated with the user are received. Tags of interest most relevant to the current activities of the contacts are selected. The tag of interest selected most relevant to the current activity of the user is compared with the tags of interest selected most relevant to the current activities of the contacts. Data corresponding to the current activity of the user and the current activities of the contacts is transmitted in a format determined by the visual display mapping preferences associated with the user.
摘要:
An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc.
摘要:
Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.
摘要:
The present invention is directed to a system, method and program product for interactively obtaining access to restricted content. A system is disclosed that includes a first device operable by a restricted party to transmit an access request to a restricting party. The access request requests access to the restricted content or to restricted event. A server receives the access request and relays it to the restricting party. A second device that is operable by the restricting party receives the access request from the server and transmits an access request response to the first device via the server.
摘要:
An approach is provided that uses symbols to represent search criteria. In this approach, a symbol is received from a user in a search request. Search criteria that corresponds to the received symbol is retrieved from a computer accessible data store. Data stores are searched for the plurality of search criteria that correspond with the received symbol and search results are retrieved based on the searching performed. These retrieved search results are then provided to the user.
摘要:
An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc.
摘要:
Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.
摘要:
An embodiment of the invention provides a method for communicating on a telecommunications device, wherein a telephone number is received from a user via an interface of the telecommunications device. At least one character from the user is also received via the interface in response to key press options presented to the user. The telephone number and the character received from the user are automatically saved on a memory device. The character is automatically associated with the telephone number. Contextual information associated with the character is saved, wherein the contextual information indicates the time of day that the character is entered, the date that the character is entered, and/or the type of call where the character is entered. The character is presented to the user in a list of previously entered characters on a display of the telecommunications device during a subsequent telephone call to the saved telephone number.