Abstract:
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.
Abstract:
A technique for using a reference to identify permissions required to access a resource. One or more processors detect a reference in an electronic communication. The reference points to a resource stored in storage of a data processing system. The one or more processors identify a set of permissions required to access the resource pointed to by the reference in the electronic communication. The one or more processors then perform a set of access-oriented actions associated with the set of permissions.
Abstract:
A method, computer program product, and system for identifying experts is described. An indication of a subject matter area associated with a user is received. A list of experts regarding the subject matter area is determined based upon, at least in part, identifying one or more members included in one or more contact rosters associated with the user. A set of experts, included in the list of experts, that are available for instant messaging communication, is identified. A portion of the list of experts is provided to the user in the context of an instant messaging application associated with the user.
Abstract:
A method includes selecting community groups having a first community from a plurality of communities and a second community from the plurality of communities. The method includes collecting a plurality of community factors that each describe the first community and the second community. The method also includes determining a plurality of correlation values, for each community factor from the plurality of community factors, between the first community and the second community. The method also includes calculating a community merge score from the plurality of correlation values. The method also includes merging the community group in response to a community merge score threshold being met by the community merge score.
Abstract:
A method for crowd sourcing tasks may include identifying a group of potential candidates tier crowd sourcing. Each candidate of the group of potential candidates may be identified based on the candidate being expected to accept a certain type of task. The certain type of task may be at least a task that is performable within a predetermined range of time. The method may also include receiving a request to perform a particular task from a requester. The method may additionally include determining if the particular task is the certain type of task. The method may further include transmitting an offer for performance of the particular task to at least a subgroup of the group of potential candidates in response to the particular task being the certain type of task.
Abstract:
Provided are techniques for the analysis and estimation of the impact of system wide performance by a modified software product or prototype. Using a baseline test plus a series of individual performance measurement data points collected over time, the testing of separate functional components of an overall software product or prototype is performed. Individual components may be incrementally added or modified over time in a series of ‘builds’ or packages. Techniques include detailed analysis of individual software methods and/or modules instruction by instruction, comparing each module with its baseline state to determine is changes in the performance of the module or method over time are correlated or independent of earlier states. If functions are found to be correlated with earlier module states, analysis is performed to determine which performance effects are overlapped and which are independent. Overlapped performance effects are discounted and a system wide performance estimate is produced.
Abstract:
Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words.
Abstract:
A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link.
Abstract:
A method and apparatus for managing electronic communications is disclosed. One or more processors detect a reference in an electronic communication. The reference points to a resource stored in storage of a data processing system. The one or more processors identify a set of permissions required to access the resource pointed to by the reference in the electronic communication. The one or more processors then perform a set of access-oriented actions associated with the set of permissions.
Abstract:
According to an embodiment of the present invention, a system displays initial search results based on a query and enables selection by a user of an item within the search results. The system determines refined search results based on behavior of the user with respect to the initial search results. Embodiments of the present invention further include a method and computer program product for presenting revised search results based on user behavior while examining the results in substantially the same manners described above.