摘要:
Systems and methodologies for providing improved input and output capabilities for computing devices are provided herein. An output manager is provided that can determine an appropriate layout for a user interface at a display area based on size and shape parameters associated with the display area. The output manager can additionally sense alterations to the display area and dynamically adjust a determined layout based on the sensed alterations. Further, the output manager can facilitate the connection of an associated device to one or more external display devices to facilitate the combined use of the external display devices and resident display areas at the associated device. An input manager is additionally provided that can obtain input from a target user by sensing patterns associated with the target user and select an appropriate input based on the sensed patterns.
摘要:
Providing for generation of a task oriented data structure that can correlate natural language descriptions of computer related tasks to application level commands and functions is described herein. By way of example, a system can include an activity translation component that can receive a natural language description of an application level task. Furthermore, the system can include a language modeling component that can generate the data structure based on an association between the description of the task and at least one application level command utilized in executing the computer related task. Once generated, the data structure can be utilized to automate computer related tasks by input of a human centric description of those tasks. According to further embodiments, machine learning can be employed to train classifiers and heuristic models to optimize task/description relationships and/or tailor such relationships to the needs of particular users.
摘要:
Providing for generation of a task oriented data structure that can correlate natural language descriptions of computer related tasks to application level commands and functions is described herein. By way of example, a system can include an activity translation component that can receive a natural language description of an application level task. Furthermore, the system can include a language modeling component that can generate the data structure based on an association between the description of the task and at least one application level command utilized in executing the computer related task. Once generated, the data structure can be utilized to automate computer related tasks by input of a human centric description of those tasks. According to further embodiments, machine learning can be employed to train classifiers and heuristic models to optimize task/description relationships and/or tailor such relationships to the needs of particular users.
摘要:
Multiple pieces of information can be arranged into a single construct that allows the employee to ascertain information quickly while at her workstation. Selection of information for placement into the construct can employ various statistical models and the like. Selective pieces of information can be masked for a user's construct based upon access rights of the user. Constructs can be configured by a user based on personal preferences as well as by an administrator. Population of metadata upon the construct can be performed automatically through an instruction of the administrator or be overridden by a user request. In addition, various types of synchronization can be implemented between constructs, such that identical or near-identical information is populated upon multiple constructs.
摘要:
Multiple pieces of information can be arranged into a single construct that allows the employee to ascertain information quickly while at her workstation. Selection of information for placement into the construct can employ various statistical models and the like. Selective pieces of information can be masked for a user's construct based upon access rights of the user. Constructs can be configured by a user based on personal preferences as well as by an administrator. Population of metadata upon the construct can be performed automatically through an instruction of the administrator or be overridden by a user request. In addition, various types of synchronization can be implemented between constructs, such that identical or near-identical information is populated upon multiple constructs.
摘要:
Providing for generating an executive report of business or personal activity is described herein. By way of example, such executive report can identify a change and related cause with respect to a prior report. As a particular example, an inference engine can receive an activity report and reference prior reports to identify the change and related cause. A set of results containing such information can be provided to a synthesis component that can include and highlight such information in the executive report. In addition, additional sources of data can be referenced in order to include and/or customize the report to a particular individual, organization, culture, or the like. As described, aspects of the subject innovation can provide an executive report highlighting important aspects of data and tailoring those aspects to interests of one or more users.
摘要:
Providing for generating an executive report of business or personal activity is described herein. By way of example, such executive report can identify a change and related cause with respect to a prior report. As a particular example, an inference engine can receive an activity report and reference prior reports to identify the change and related cause. A set of results containing such information can be provided to a synthesis component that can include and highlight such information in the executive report. In addition, additional sources of data can be referenced in order to include and/or customize the report to a particular individual, organization, culture, or the like. As described, aspects of the subject innovation can provide an executive report highlighting important aspects of data and tailoring those aspects to interests of one or more users.
摘要:
Architecture that monitors interaction data (e.g., search queries, query results and click-through rates), and provides users with links to other users that fall into similar categories with respect to the foregoing monitored activities (e.g., providing links to individuals and groups that share common interests and/or profiles). A search engine can be interactively coupled with one or more social networks, and that maps individuals and/or groups within respective social networks to subsets of categories associated with searches. A database stores mapped information which can be continuously updated and reorganized as links within the system mapping become stronger or weaker. The architecture can comprise a social network system that includes a database for mapping search-related information to an entity of a social network, and a search component for processing a search query for search results and returning a link to an entity of a social network based on the search query.
摘要:
Architecture is provided that facilitates user-controlled access to user profile information. A user is allowed to selectively expose (or mask) portions of his/her profile to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profile. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile of a user, and a control component under control of the user for controlling access to the profile. Machine learning and reasoning is provided to make inferences and automate aspects thereof.
摘要:
The subject invention provides a unique system and method that facilitates mitigation of storage abuse in connection with free storage provided by messaging service providers such as email, instant messaging, chat, blogging, and/or web hosting service providers. The system and method involve measuring the outbound volume of stored data. When the volume satisfies a threshold, a cost can be imposed on the account to mitigate the suspicious or abusive activity. Other factors can be considered as well that can modify the cost imposed on the cost such as by increasing the cost. Machine learning can be employed as well to predict a level or degree of suspicion. The various factors or the text of the messages can be used as input for the machine learning system.