摘要:
A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
摘要:
The present invention concerns methods and apparatus for performing computer system maintenance and notification activities in an opportunistic manner during time periods identified by a user when the user expects not to be using the computer system. In methods and systems of the present invention, the user prioritizes computer system maintenance activities from high to low. When an opportunity arises to perform maintenance activities due to the user, for example, being away from the computer, the user specifies the length of time the user expects to be away from the computer using apparatus of the present invention. Methods of the present invention then initiate computer system maintenance activities beginning with the highest-priority maintenance activity that can be completed during the time period identified by the user. The method continues performing maintenance activities from highest to lowest priority for so long as there is enough time remaining to perform the next maintenance task. In the present invention notification activities using the computer system resource can be performed in an opportunistic manner. For example, in the present invention a user can specify a length of time the user expects to be away from the computer; during this period the computer system would automatically generate an “away from my desk” reply to anyone sending the user an e-mail.
摘要:
A data processing system, method, and product are disclosed for automatically changing a tone of a message. A particular tone is specified. The data processing system determines an original tone of the message. A determination is then made by the data processing system as to whether the original tone is the particular tone. The data processing system then automatically modifies the message without user input to change the original tone to the particular tone in response to a determination that the original tone is not the particular tone.
摘要:
A subscriber to a service that monitors user behavior first registers with that service and selects a model of user behavior. The service then transmits that model to an agent, situated capable of monitoring user behavior and relating it to the model. After the monitoring interval the agent transmits data from the model to a server, where that data is summarized and reports created. These reports can then be sent to the subscriber in satisfaction of their needs for behavioral information.
摘要:
A programmed method for supplying content includes receiving via a network a request for a first content for use on a device, from a requester; automatically selecting a second content to fulfill the request; and providing the second content to a source of the request. From the point of view of a requester, the programmed method includes requesting via a network a first content for use on a device; and receiving an automatically selected second content to fulfill the request. The device may be a computer, and the content may be software for use on the computer. Selection may be performed in accordance with predetermined criteria, including predetermined rules. Information defining at least one criterion may be received from at least one requester. The criteria may be based on relatedness of the first content and the second content. Generally, the request is fulfilled via a network.
摘要:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
摘要:
A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
摘要:
A system and an article of manufacture for providing a prompt for real-time cognitive assistance include analyzing input from at least one environmental sensor to identify context information pertaining to a user situation, identifying a likely subsequent cognitive task of the user in the user situation based on the context information and use of a learned model, determining an action with respect to information to be suggested to the user via a corresponding prompt, wherein the determining is based on the likely subsequent cognitive task, the context information and information learned from at least to one previous user situation, computing a confidence value to represent a level of certainty in the action, and providing the prompt to the user if the action has a confidence value greater than a threshold value corresponding to the action.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
A system and method provide an enhanced e-mail (electronic mail) system with a proactive indication of recipient away message. The system and method provide an enhanced e-mail system with a proactive indication of away messages of individuals related to the recipient. The system and method also provides for enhanced e-mail with a variety of away messages automatically sent based on criteria such as the nature of the e-mail sender, the date the e-mail was received, and the content of the e-mail.