摘要:
A first portion of electronic meeting content is transmitted to a first client computing device. The first portion of the electronic meeting content configured to provide a first content resolution that is less than a full content resolution. A second portion of the electronic meeting content is transmitted to the first client computing device. The second portion of the electronic meeting content configured to provide a second content resolution that is greater than the first content resolution. The second portion of the electronic meeting content combined with the first portion of the electronic meeting content provides progressive refinement of electronic meeting content transmitted to the first client computing device.
摘要:
A first portion of electronic meeting content is transmitted to a first client computing device. The first portion of the electronic meeting content configured to provide a first content resolution that is less than a full content resolution. A second portion of the electronic meeting content is transmitted to the first client computing device. The second portion of the electronic meeting content configured to provide a second content resolution that is greater than the first content resolution. The second portion of the electronic meeting content combined with the first portion of the electronic meeting content provides progressive refinement of electronic meeting content transmitted to the first client computing device.
摘要:
A first portion of electronic meeting content is transmitted to a first client computing device. The first portion of the electronic meeting content configured to provide a first content resolution that is less than a full content resolution. A second portion of the electronic meeting content is transmitted to the first client computing device. The second portion of the electronic meeting content configured to provide a second content resolution that is greater than the first content resolution. The second portion of the electronic meeting content combined with the first portion of the electronic meeting content provides progressive refinement of electronic meeting content transmitted to the first client computing device.
摘要:
A method, computer program product, and system for redacting content in online meetings is described. A method may comprise receiving, via one or more computing devices, a selected portion of content to redact in a first online meeting. The method may further comprise determining, via the one or more computing devices, if a participant of the first online meeting is in an un-trusted location. The method may additionally comprise, in response to determining that the participant of the first online meeting is in the un-trusted location, redacting, via the one or more computing devices, the selected portion of content from content available to the participant in the first online meeting.
摘要:
A method, computer program product, and system for redacting content in online meetings is described. A method may comprise receiving, via one or more computing devices, a selected portion of content to redact in a first online meeting. The method may further comprise determining, via the one or more computing devices, if a participant of the first online meeting is in an un-trusted location. The method may additionally comprise, in response to determining that the participant of the first online meeting is in the un-trusted location, redacting, via the one or more computing devices, the selected portion of content from content available to the participant in the first online meeting.
摘要:
An apparatus and method for estimating ore quality using color correlations is disclosed. The apparatus and method quantify ash or grade concentration in process streams arid/or samples in real time, allowing for the optimization of ore processing operations, The apparatus and method employ a light beam at a given wavelength, which allows for the measurement of ash content or grade.
摘要:
An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.
摘要:
IDDS is implemented as a kernel resident data source which provides per-system call audit records into user space in a timely manner. Each invocation of a system call is audited and a record of the activity is placed into a circular buffer in the kernel. A user-space process reads the data from the buffer via a device driver interface. A device driver provides a clean interface between the kernel and the IDS. The semantics of device drivers are familiar to most UNIX programmers, following the standard file-based open-read-write-close paradigm.
摘要:
The present application is directed to a host-based IDS on an HP-UX intrusion detection system that enhances local host-level security within the network. It should be understood that the present invention is also usable on, for example, Eglinux, solaris, aix windows 2000 operating systems. It does this by automatically monitoring each configured host system within the network for possible signs of unwanted and potentially damaging intrusions. If successful, such intrusions could lead to the loss of availability of key systems or could compromise system integrity.
摘要:
An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.