摘要:
Changes to dynamic web content are monitored for compliance with web content compliance rules. A noncompliant element associated with a change to the dynamic web content is identified based upon the web content compliance rules. Automated correction of the noncompliant element is performed based upon the web content compliance rules. The noncompliant element is reported to a server associated with the change to the dynamic web content.
摘要:
A system for scheduling meetings by matching a scheduler-defined meeting profile against a pool of virtual resources is provided. The system includes an electronic data storage comprising data defining a set of virtual resources, at least one property being associated with each resource. The system also includes a meeting profiler module that is configured to define a meeting profile which specifies one or more resources required for a meeting based upon received user input. The system further includes a profile-resource matching module that searches the data of the electronic data storage and matches elements of the set of virtual resources to the one or more resources required for the meeting defined by the meeting profiler module, and, based thereon, automatically generates at least one meeting schedule candidate.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise.
摘要:
In a method and system for removing email forwarding duplication, when an email was sent for the first time, the email was assigned a unique identifier. An aggregate recipient list was created and associated with the unique identifier. When the email is to be forwarded, the aggregate recipient list has recipients previously forwarded the email. The recipient list of the forwarding email is compared with the aggregate recipient list. If duplicate email addresses are found, the duplicate email addresses are displayed to a sender of the forwarding email. If the sender chooses not to send the forwarding email to the duplicate email addresses, the duplicate email addresses are removed from the recipient list of the forwarding email. New recipients of the forwarding email are added to the aggregate recipient list. The forwarding email with the unique identifier is sent to the recipient list.
摘要:
Methods for detaching an attachment file from a containing email message and generating metadata associated with the attachment file and the containing email message are provided. In one exemplary method, the method includes retrieving the containing email message from a server email application, utilizing a client email application. The method further includes storing the attachment file in the containing email message in a client memory device, and deleting the attachment file from the containing email message. The method further includes generating attachment file metadata and adding the attachment file metadata to the containing email message and storing the containing email message in a server memory device. The method further includes generating email metadata and storing the email metadata.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to auto-entry of addresses in an electronic message and provide a novel and non-obvious method, system and computer program product for cautious auto-entry for messaging systems. In one embodiment of the invention, a cautious auto-completion method can be provided. The method include auto-completing a messaging address provided in a messaging client; computing a similar name set (SNS) value for the auto-completed messaging address; and, posting a warning if the SNS value exceeds an SNS threshold. As used herein, an SNS includes a list of similar messaging addresses having similarities likely to result in an unintended auto-completed messaging address in a messaging system.
摘要:
A server system runs a bot service that registers an FAQ (frequently asked questions) for a document having an embedded object. The FAQ includes one or more question-and-answer (Q&A) pairs. The bot service receives, from each electronics device that renders a copy of the document, a request from the embedded object for the FAQ registered for the document, and transmits the FAQ to each electronic device from which a request is received. Each electronics device displays the FAQ, including the one or more Q&A pairs, within its rendered copy of the document. Any viewer of a copy of the document with the embedded object can submit a question to the bot service through the embedded object. The bot service uses a messaging service to obtain an answer to the question from an author. The FAQs displayed at the electronics devices are updated to include the new Q&A pair.
摘要:
Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise.
摘要:
Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated.