摘要:
Under the present invention, a user will provide content to be translated to a translation engine. After making the translation, the user will be provided with the results and transaction process details specifying the context of the translation. Based on the context, the user can provide feedback regarding the quality of the translation. Then, based on the feedback, the translation resource used to make the translation can be updated.
摘要:
Methods and computer program products for managing redundant email. According to one aspect of the invention, a determination is made as to whether a first email is contained in a second email. If the first email is contained in the second email, the first email is purged. Email attachments may be transferred from the first email to the second email, so that the attachments are not lost when the first email is purged.
摘要:
Methods for detaching an attachment file from a containing email message and generating metadata associated with the attachment file and the containing email message are provided. In one exemplary method, the method includes retrieving the containing email message from a server email application, utilizing a client email application. The method further includes storing the attachment file in the containing email message in a client memory device, and deleting the attachment file from the containing email message. The method further includes generating attachment file metadata and adding the attachment file metadata to the containing email message and storing the containing email message in a server memory device. The method further includes generating email metadata and storing the email metadata.
摘要:
Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user.
摘要:
Included are method, article of manufacture, and device that serve to identify one or more tracked categories in a document, the tracked category representing a portion of the document, identify a change in one or more of the tracked categories of the document, identify a client to notify of the change in the tracked category, and send a notification to a client, where the notification provides notice that a change has occurred in a tracked category of a document.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
A pattern corresponds to a task that a computing system can perform. The pattern at least indirectly identifies one or more sub-application programs of one or more application programs that the computing system can run and that are relevant to the task. Application of the pattern to sub-application programs of application programs currently running on the computing system identifies a working set of one or more sub-application programs of one or more application programs currently running on the computing system and that are relevant to the task. The computing system hides, within a graphical user interface that the computing system presents, the sub-application programs of the application programs currently running on the computing system that are not part of the working set, and the application programs currently running on the computing system that do not include any sub-application program that is part of the working set.
摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise.
摘要:
In a method and system for removing email forwarding duplication, when an email was sent for the first time, the email was assigned a unique identifier. An aggregate recipient list was created and associated with the unique identifier. When the email is to be forwarded, the aggregate recipient list has recipients previously forwarded the email. The recipient list of the forwarding email is compared with the aggregate recipient list. If duplicate email addresses are found, the duplicate email addresses are displayed to a sender of the forwarding email. If the sender chooses not to send the forwarding email to the duplicate email addresses, the duplicate email addresses are removed from the recipient list of the forwarding email. New recipients of the forwarding email are added to the aggregate recipient list. The forwarding email with the unique identifier is sent to the recipient list.