摘要:
An implementation for detecting interruptions in audio conversations between a plurality of participants comprising continuously recording the most recent predetermined time segment of the conversation stream of one participant in the conversation, monitoring the conversation stream of the participant for interruptions in said conversation stream and storing the most recent segment prior to the interruption in response to a detection of an interruption. The segment is represented by a conversation marker. The user may then select the conversation marker to playback this most recent segment, so that he may then decide whether he wishes to resume or pursue the interrupted conversation fragment.
摘要:
An implementation for detecting interruptions in audio conversations between a plurality of participants comprising continuously recording the most recent predetermined time segment of the conversation stream of one participant in the conversation, monitoring the conversation stream of the participant for interruptions in said conversation stream and storing the most recent segment prior to the interruption in response to a detection of an interruption. The segment is represented by a conversation marker. The user may then select the conversation marker to playback this most recent segment, so that he may then decide whether he wishes to resume or pursue the interrupted conversation fragment.
摘要:
Computer implemented method, system and computer usable program code for managing conversational input. A first conversation between a user of a communications device and a first party is monitored. A conversation stub that includes information relating to a topic of the first conversation is generated and stored. It is determined whether a second party of a second conversation between the user of the communications device and the second party has expertise regarding the topic of the first conversation. Responsive to determining that the second party has expertise regarding the topic of the first conversation, the conversation stub is presented to the user during the second conversation.
摘要:
A system, method, and program product are provided that inform users of changes in geographically bound rules. This is performed by receiving, via a GPS device, a first geographic location. Identifying, based on the received first geographic location, a first geographic region, and retrieving a first set of geographically bound rules that correspond to the identified geographic region. After a period of time, a second geographic location is received and a second geographic region is identified based on the second geographic location. If the first geographic region is different than the second geographic region, then the system retrieves a second set of geographically bound rules corresponding to the identified geographic region. The first set of geographically bound rules is compared to the second set of geographically bound rules, resulting in one or more different geographically bound rules. The users are then informed of the different geographically bound rules.
摘要:
An approach for controlling lighting in a digital video stream is presented. A user loads digital content into a light tracking system. The digital content includes three tracks, which are a video track, an audio track, and a light control track. After loading, the user selects either a “partial light effect setting” or a “full light effect setting.” When the user selects a partial light effect setting, the light tracking system lowers the environmental lighting device's illumination at the beginning of the digital content's playing, and raises the environmental lighting device's illumination at the end of the digital content's playing. When the user selects a full light effect setting, the light tracking system adjusts the environmental lighting device's illumination throughout the digital content's playback, as well as lowering and raising the environmental lighting device's illumination at the beginning and the end of the movie, respectively.
摘要:
A computer implemented method and computer program product for managing conversational input. The process authenticates a user on a device in a set of communication devices for manipulating conversation stubs. The process monitors an exchange of conversation for a triggering event on the device in a set of communication devices. Responsive to detecting the triggering event, the process generates a conversation stub that contains information relating to the topic of conversation. The conversation stub is stored in a storage device located remotely to the set of communication devices. Responsive to receiving a selection of the conversation stub, the process presents the conversation stub on a communication device selected from the set of communication devices.
摘要:
A computer implemented method and computer program product for managing conversational input. The process authenticates a user on a device in a set of communication devices for manipulating conversation stubs. The process monitors an exchange of conversation for a triggering event on the device in a set of communication devices. Responsive to detecting the triggering event, the process generates a conversation stub that contains information relating to the topic of conversation. The conversation stub is stored in a storage device located remotely to the set of communication devices. Responsive to receiving a selection of the conversation stub, the process presents the conversation stub on a communication device selected from the set of communication devices.
摘要:
A system and method to smooth a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
The present invention provides a method, system, and computer program product for updating contact information according to metadata associated with a virtual world. In response to an avatar of a first user interacting with an avatar of a second user in a virtual world, information comprising a name of the avatar of the second user and metadata associated with the avatar of the second user is sent to the first user. In response to receiving the information, contact information associated with the name of the avatar of the second user is determined. The contact information is organized based on the metadata to form organized contact information. The organized contact information is prioritized according to the metadata to form prioritized contact information. The prioritized contact information is stored.
摘要:
A first conversation between a user of a communications device and a first party is monitored. A conversation stub that includes information relating to a topic of the first conversation is generated and stored. It is determined whether a second party of a second conversation between the user of the communications device and the second party has expertise regarding the topic of the first conversation. Responsive to determining that the second party has expertise regarding the topic of the first conversation, the conversation stub is presented to the user during the second conversation.