Abstract:
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.
Abstract:
A method, system and computer program product for processing queries in a hybrid database system. A database management system of the hybrid database system obtains an estimated execution time of a query by an online transaction processing engine. The database management system further obtains an estimated execution time of the query by a database accelerator. Furthermore, the database management system determines a wait time (which could be zero) for the database accelerator to process the query. The database management system then determines whether the online transaction processing engine or the database accelerator will process the query using the estimated execution time of the query by the online transaction processing engine, the estimated execution time of the query by the database accelerator and the wait time (which could be zero) for the database accelerator to process the query. In this manner, the processing of queries in hybrid database systems is optimized.
Abstract:
Usage information of a user for a plurality of computing devices is identified. A usage pattern for each computing device of the plurality of computing devices of the user is developed based on the identified usage information of the user. An indication of the user accessing an application on a first computing device of the plurality of computing devices is received. The application requires one or more credentials for an authentication process associated with the application. A determination is made whether the user accessing the application using the first computing device is following the developed usage pattern of the user. Responsive to determining that the user accessing the application using the first computing device is not following developed usage pattern of the user, the authentication process associated with the application is interrupted.
Abstract:
Media capture and verification originally-captured media files, the nature of modifications made to captured media files, and the authenticity of various versions of files related to the captured media are discussed. A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the capture device output to produce a validatable master file which includes master media data from the capture device output, master metadata of said master media data, and master file blockchain data. The master file blockchain data includes a master file block history portion, a master file signature key portion, a master file change indication portion, and a master file signed data hash portion. The computer also modifies the master media data to produce reference file media data. reference files and distributable files. The computer verifies the authenticity of each of these files.
Abstract:
Presenting a link label for multiple hyperlinks includes presenting a layered data element in an electronic message with a link label that represents multiple hyperlinks in a display, designating an active hyperlink from the multiple hyperlinks based on specific criteria associated with a recipient of the electronic message, and directing the recipient of the electronic message to an online location of the active hyperlink in response to user input selecting the link label.
Abstract:
According to one or more embodiments of the present invention a computer-implemented method includes receiving a transaction-data for a transaction that occurs in a particular time-interval. The method further includes comparing a set of parameters from the transaction-data with a performance profile associated with the particular time-interval. The method further includes based on determining that the transaction is a deviant transaction, forwarding the transaction-data to a first data collector. The method further includes based on determining that the transaction is a conventional transaction, forwarding the transaction-data to a second data collector.
Abstract:
A computer implemented method for managing wireless bands and/or wireless channels comprises receiving information on connected local devices for a plurality of wireless routers, wherein the plurality of wireless routers are using a same wireless band and/or wireless channel, and wherein each connected local device for which information is received utilizes one or more of the plurality of wireless routers for a network connection. The method further comprises calculating, for each of the plurality of wireless routers, a congestion quotient from the received information on the connected local devices, wherein the congestion quotient defines a likelihood of destructive interference at each respective wireless router. The method further comprises determining changes in wireless band and/or wireless channel for one or more wireless routers of the plurality of wireless routers, wherein the changes lower the respective congestion quotients for each of the respective one or more wireless routers.
Abstract:
A computer-implemented method can include obtaining content-associated data. The content-associated data can include an image that corresponds to content. The method can further include obtaining a set of descriptive terms corresponding to the image. The method can further include obtaining a set of related terms, based at least in part on the set of descriptive terms. The method can further include generating a set of user-expected terms, based at least in part on the set of related terms. The method can further include obtaining the content. The method can further include comparing the set of user-expected terms to the content. The method can further include generating a similarity value based on the comparing. The method can further include determining the similarity value does not exceed a threshold. The method can further include providing a notification in response to the determining that the similarity value does not exceed the threshold.
Abstract:
A computer system to detect data alerts includes a data preprocessing system and a data analysis system. The data preprocessing system obtains system data of the computer system, generates predicted data based on the system data, and generates differential data indicating a difference between the system data and the predicted data. The data analysis is in signal communication with the data preprocessing system and determines that the differential data is one of expected event or an anomaly event in response to adding at least one new value from the differential data to the predicted data.
Abstract:
Aspects of the invention include systems and methods for real-time feedback for online collaboration communication quality. A non-limiting example computer-implemented method includes monitoring a conference between a plurality of participants, wherein each participant accesses the conference via a respective Voice over Internet Protocol (VoIP) device. The method further includes detecting, by a processor, an indication, by a scoring system that monitors the conference, of a degradation of sound quality of at least one VoIP device being used to access the conference. The processor engages in verifying the indication of the degradation by analyzing a peer-to-peer test between the VoIP device that has an indication of a degradation of sound quality and a VoIP device that does not have an indication of a degradation of sound quality. The process engages in determining a corrective measure based on the indication of the degradation of sound quality and the peer-to-peer test