Abstract:
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the comparing of the stability metric to the acceptance threshold.
Abstract:
A computing system, computer-implemented method, and computer program product are provided for facilitating behavior based notifications concerning multiparty communication threads. According to an implementation, the computer-implemented method may include defining a rules set associated with a user for participation in a multiparty communication thread. The method may also include evaluating a plurality of communications associated with the multiparty communication thread. The method may also include determining when a given communication associated with the multiparty communication thread satisfies one or more of the rules included within the rules set. The method may further include delivering the given communication based upon, at least in part, a determining that the given communication satisfies the one or more rules.
Abstract:
A set of mobile devices are designated as a related set of mobile devices for loss indication purposes. Machine logic rules are developed to indicate loss of a mobile device. Under these rules, a determination of probable loss (for example, theft, inadvertent leaving behind) of one of the mobile devices depends, at least in part, upon the activities and/or status of other mobile devices in the set. For example, if a first mobile device in the set is expected, under the machine logic rules, to always be near a second mobile device in the set, then a determination that the second mobile device is located far away from the first mobile device may trigger a warning, or other mitigating action, that the first mobile device has probably been lost.
Abstract:
A method, system and computer program product for ensuring a desired distribution of images in a multimedia document among different demographic groups. Demographic criteria (e.g., age) is received to form demographic groups of members of an organization. Demographic information along with interests of the members are retrieved. Such member data is analyzed within the constraints of the demographic criteria to generate a statistical distribution of members of the organization that forms an initially desired distribution of content of the multimedia document among the demographic groups of the organization. An indication is then provided to the user regarding whether the current distribution of the content of the multimedia document among the demographic groups of the organization satisfies or does not satisfy the desired distribution of content among the demographic groups. In this manner, the user can ensure a desired distribution of content in the multimedia document among different demographic groups.
Abstract:
A method, system and computer program product for ensuring a desired distribution of images in a multimedia document (e.g., yearbook, slideshow). A desired distribution of facial signatures in a multimedia document to be created by the user is received. Upon receiving an image to be added to the multimedia document by the user, a facial signature for a face detected in the image is generated. The current number of instances of the facial signature in the multimedia document is then determined. A determination is then made as to whether the current number of instances of the facial signature meets the desired distribution. An indication is then provided to the user as to whether the current number of instances of the facial signature meets or does not meet the desired distribution. In this manner, the user can ensure a desired distribution of images in the multimedia document.
Abstract:
A method, system and computer program product for enabling mobile computing devices to track data usage among mobile computing devices that share a data plan. A threshold amount of data to be consumed over a period of time (e.g., billing period) by the mobile computing devices belonging to the shared data plan is received. Upon receiving a message from one of these mobile computing devices that contains an identifier that indicates that the message pertains to data usage information for the shared data plan, the current data usage metrics for the mobile computing device that sent the message is retrieved from the message. The value of the aggregate data usage is updated with the retrieved data usage metrics. Actions, such as throttling the data usage, are performed in response to the aggregate data usage being within a designated amount of data to the threshold amount of data to be consumed.
Abstract:
A method, system and computer program product for identifying lines of code that caused an error as identified in a stack trace in a source code version that generated the stack trace. The line(s) of code in the source code version that generated the stack trace that are identified in the stack trace as causing the error are identified. If there are differences in the line(s) of code that are associated with the cause of the error between the source code version that generated the stack trace and the source code version being utilized by the user, such as a developer, then an annotated version of the source code version that generated the stack trace of the line(s) of code that caused the error is displayed to the user with highlighted differences with respect to the source code version being utilized by the user.
Abstract:
Probable origination date may be derived by using a stream of data captured, for example, from the Internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. Based on the number of conflicting or validating references, and the relationships between them, a probability or confidence score in the accuracy of the analysis may be generated.
Abstract:
Probable origination date may be derived by using a stream of data captured, for example, from the Internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. Based on the number of conflicting or validating references, and the relationships between them, a probability or confidence score in the accuracy of the analysis may be generated.
Abstract:
Managing a co-browsing session of multiple users where there are multiple roles that each user may have, and each respective user has a role. Software manages a computer system to: (i) monitor the co-browsing session to detect a condition; and (ii) responsive to detection of the condition, change the role(s) of at least one user. The change of role(s) is made automatically and without human intervention.