摘要:
A computer-implemented method, system and computer program product for synchronizing copies of a shared file used by different communication session participants is presented. A shared file that is used by a first communication session participant and a second communication session participant is identified. The first and second communication participants each use a separate copy of the shared file. In response to detecting a communication session between the first and second communication session participants, the separate copies of the shared file are automatically synchronized.
摘要:
Rendering content identified by a uniform resource identifier (URI). One embodiment can include, within a first communication device comprising a processor and a memory, on the first communication device, receiving the URI within an instant messaging (IM) session. The method further can include, via the processor, prior to receiving a user input selecting the URI, attempting to retrieve content from a content source identified by the URI to preload the content within the memory.
摘要:
Enforcing user-defined real-time communication session terminations can begin with a termination enforcement handler identifying termination conditions applicable to a real-time communication session hosted by a unified telephony system. The termination conditions can define a limit for an operational variable for the unified telephony system or the real-time communication session. The identified termination conditions can be evaluated. If a termination condition is satisfied, it can be determined which participants are to be disconnected from the real-time communication session based upon handling rules for the termination conditions and/or termination preferences associated with the real-time communication session. The termination preferences can be defined by an initiating entity of the real-time communication session. The participants can be notified that their connection to the real-time communication session will be terminated in a predefined time limit. If the predefined time limit is reached, the participants' connection to the real-time communication session can be automatically terminated.
摘要:
Enforcing user-defined real-time communication session terminations can begin with a termination enforcement handler identifying termination conditions applicable to a real-time communication session hosted by a unified telephony system. The termination conditions can define a limit for an operational variable for the unified telephony system or the real-time communication session. The identified termination conditions can be evaluated. If a termination condition is satisfied, it can be determined which participants are to be disconnected from the real-time communication session based upon handling rules for the termination conditions and/or termination preferences associated with the real-time communication session. The termination preferences can be defined by an initiating entity of the real-time communication session. The participants can be notified that their connection to the real-time communication session will be terminated in a predefined time limit. If the predefined time limit is reached, the participants' connection to the real-time communication session can be automatically terminated.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to collaborative computing and provide a method, system and computer program product for deriving and communicating attention spans in a collaborative computing environment. In an embodiment of the invention, an attention span management method can be provided for a collaborative computing environment. The method can include monitoring computer activity for a collaborator to a collaboration, computing an attention span based upon the monitored computing activity, and generating an alert in the collaboration if the attention span crosses a threshold boundary indicating an unacceptable level of distraction for the collaboration.
摘要:
A system and method, where messages which are exchanged in email, provide recipients (and originators) with the capability to confirm authenticity. A substring of a message is examined, is validated and, if any modifications have been made, the modifications are highlighted to the originator and the receivers so that the originator and the receivers know that the original message has been modified. Also, the system and method of the present invention preserve the time, date and identity of the maker of the modifications.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and provide a method, system and computer program product for instant messenger based social introductions. In an embodiment of the invention, a method for instant messaging based social introductions can be provided. The method can include selecting contacts from a buddy list of an instant messenger, retrieving attributes for each of the selected contacts, and generating introduction text for each of the selected contacts. Specifically, the introduction text can introduce a particular one of the selected contacts and can incorporate attributes for the particular one of the contacts. Finally, the method can include instant messaging the introduction text for each of the selected contacts to another of the selected contacts.
摘要:
In a calendar messaging method and system, a calendar application executing on a computer receives a command to activate an out-of-office status, and receives one or more selected calendar events. The method and system further include automatically updating the calendar events, wherein the updating includes at least one of canceling the calendar events, and removing the user as an invitee of the calendar events. An out-of-office message is then automatically sent to at least one recipient indicating a type of update made to one or more of the calendar events.
摘要:
A computer implemented method manages meeting invitations to sub-invitees. A meeting coordinating computer detects a meeting invitation being sent from a meeting moderator's computer to a primary invitee's computer. The meeting coordinating computer intercepts a response from the primary invitee's computer. This response contains a request for a sub-invitee to accompany the primary invitee to the meeting. If the sub-invitee is initially authorized by the meeting coordinating computer to attend the meeting, then a request is transmitted to the meeting moderator's computer for additional authorization to invite the sub-invitee to the meeting.
摘要:
A method of secure electronic message conveyance. The method can include, via a processor, receiving a request to forward an electronic message originally received by a first user to at least a second user. The method also can include, based on content contained in the electronic message, selecting from a plurality of approval entities at least one approval entity that is to determine whether the electronic message is approved to be forwarded to the at least a second user, and receiving from the selected approval entity an indication that indicates whether the electronic message is approved to be forwarded to the second user. The method further can include, responsive to the selected approval entity approving the forwarding of the electronic message to the second user, automatically forwarding the electronic message to the second user.