Abstract:
A method, computer program product, and system for providing notifications regarding electronic meetings is described. A set of one or more invitees for an online meeting is received, the set including a first invitee. A first status of the first invitee is identified, the first status indicating unavailability with respect to the electronic meeting. A change in status of the first invitee, after the end of the electronic meeting, to a second status indicating availability with respect to the electronic meeting is identified. A notification of the meeting is provided to the first invitee, based upon, at least in part, identifying the change in status.
Abstract:
A method is disclosed for determining a relative orientation of speakers that receive audio signals from a portable audio source device. In an embodiment, a microphone coupled with the portable audio source device receives a first sound from a first speaker and a second sound from a second speaker. An orientation detector determines a volume of at least one of the first and second sounds and the portable audio source device detects a movement of the portable audio source device. The orientation detector detects a variation in the determined volume and determines a relative orientation of the first and second speakers based, at least in part, on the detected movement and the detected variation in the determined volume.
Abstract:
A method for recommending the pronunciation of a name includes providing a plurality of audio records wherein the audio records include a set of audio records identifying the pronunciation of a common name. The method also includes analyzing the set of audio records identifying the pronunciation to determine the most frequent common pronunciation of the common name in the set of audio records. Once determined, the most frequent common pronunciation of the common name is presented to an end user.
Abstract:
A system and method of discovery, validation and delivery of power to an electronic device through a universal power center is provided. The method comprises providing a power tip for an electronic device with a unique identification and broadcasting the unique identification to a power center. The method further includes verifying the unique identification and connection location of the electronic device, determining power requirements for the connected electronic device based on the unique identification and connection location, and delivering power to the electronic device based on the determined power requirements.
Abstract:
A data processing system and computer program product for sharing displayed content. A content displayed on a source computer system is shared with a set of target computer systems, wherein the content is displayed on a target display on each target computer system in the set of target computer systems. In response to a change in the content displayed on the source computer system, a progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is identified. An indication of the progress in displaying the change in the content on the target display on the each target computer system in the set of target computer systems is generated at the source computer system.
Abstract:
A client application cache access profile is created that documents accesses over time to data cached within an in-memory data grid (IMDG) cache by each of a set of client applications that utilize the IMDG. A new data request is received from one of the set of client applications that includes a client-application data caching vote that specifies whether the requesting client application wants the newly-requested data cached. In response to an IMDG cache data miss related to the new data request, a determination is made as to whether to cache the newly-requested data based upon analysis of the client application cache access profile of the client application from which the new data request was received, IMDG system performance cache costs of caching the newly-requested data, and the client-application data caching vote. The newly-requested data is cached within the IMDG cache in response to determining to cache the newly-requested data.
Abstract:
Approaches are provided for identifying the origin of a vehicular impact and selectively exchanging data pertaining to the impact. An approach includes determining whether an impact to a vehicle exceeds a predetermined threshold. The approach further includes when the impact exceeds the predetermined threshold, sending a signal that includes impact information and identifier information stored in a persistent storage device. The approach further includes receiving signals from one or more other vehicles within a predetermined proximity of the vehicle. The approach further includes comparing impact information from the signals to the impact information stored in the persistent storage device. The approach further includes when the impact information from the signals matches the impact information stored in the persistent storage device within a tolerance threshold, storing the impact information and identifier information from the signals in the persistent storage device.
Abstract:
Mechanisms for accessing a resource based on interpretation of a secure optical code are provided. The mechanisms capture, by an image capture device, an image of the secure optical code. The secure optical code is a pattern of shapes having at least one of different positions or visual characteristics. A reference to a resource and a signature of the reference are extracted from the secure optical code. Public decryption information for decrypting the signature of the reference is obtained and used to decrypt the signature of the reference. The integrity of the reference to the resource is verified based on the decrypted signature. The resource is accessed in response to the integrity of the reference being verified based on the decrypted signature. A warning message is output in response to the integrity of the reference not being verified based on the decrypted signature.
Abstract:
A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
Abstract:
Near cache distribution in in-memory data grid environment that utilizes manifest of keys may be provided. An application instance may be initialized that utilizes an in-memory data grid caching infrastructure with a near cache in a virtual machine running on hardware processor. The near cache for the application instance may be activated. Logic of the near cache associated with the application instance may request a manifest of keys from one or more peer applications utilizing the in-memory data grid caching infrastructure, and receive the manifest of keys. The logic of the near cache associated with the application instance may send the manifest of keys to a grid cache of the in-memory data grid caching infrastructure. The logic of the near cache associated with the application instance may receive at least some of the data objects from the grid cache.