Abstract:
An embodiment for determining presentation content effectiveness using attraction modeling is provided. The embodiment may include receiving presentation content from a meeting host during on online collaborative meeting. The embodiment may also include capturing one or more actions of one or more users during a display of the presentation content to the one or more users. The embodiment may further include creating an audience attention model. The embodiment may also include in response to determining at least one user is distracted from the presentation content, modifying the display of the presentation content for each distracted user in accordance with one or more characteristics associated with each distracted user. The embodiment may further include categorizing the one or more users into one or more groups. The embodiment may also include providing visual feedback to the meeting host.
Abstract:
A computer-implemented system and method for a chat system is provided for processing chat channel communications. The method comprises receiving a user message from a user, and classifying the user message using a classifier into a classified input that is one of a question, an answer, and a statement. When the input is a question, the method comprises determining a set of relevant answers from an answer database that are related to the question. The method determines a relatedness score reflecting a degree of relatedness between each related answer of the set of related answers and the question. A top answer is determined from the set of related answers based on the relatedness scores, and the method presents at least one of the top answer and the set of related answers to the user. When the input is an answer, the method stores the answer in the answer database.
Abstract:
A determination is made that an authentication mechanism is unable to complete an attempt to authenticate, in association with a user attempting to access an application, user credentials. The user credentials include a user identifier and an additional authentication factor. An access allowance rate for the authentication mechanism is identified. The access allowance rate is based on a plurality of prior completed authentication attempts associated with the user identifier. A determination is made that the access allowance rate satisfies a set of criteria. In response to the determination that the authentication mechanism is unable to complete the authentication attempt and further in response to the determination that the access allowance rate satisfies the set of criteria, the user is allowed access to the application.
Abstract:
A determination is made that an authentication mechanism is unable to complete an attempt to authenticate, in association with a user attempting to access an application, user credentials. The user credentials include a user identifier and an additional authentication factor. An access allowance rate for the authentication mechanism is identified. The access allowance rate is based on a plurality of prior completed authentication attempts associated with the user identifier. A determination is made that the access allowance rate satisfies a set of criteria. In response to the determination that the authentication mechanism is unable to complete the authentication attempt and further in response to the determination that the access allowance rate satisfies the set of criteria, the user is allowed access to the application.
Abstract:
A determination is made that an authentication mechanism is unable to complete an attempt to authenticate, in association with a user attempting to access an application, user credentials. The user credentials include a user identifier and an additional authentication factor. An access allowance rate for the authentication mechanism is identified. The access allowance rate is based on a plurality of prior completed authentication attempts associated with the user identifier. A determination is made that the access allowance rate satisfies a set of criteria. In response to the determination that the authentication mechanism is unable to complete the authentication attempt and further in response to the determination that the access allowance rate satisfies the set of criteria, the user is allowed access to the application.