Abstract:
An enterprise IoT concentrator can receive, from a first community IoT concentrator, first data corresponding to a security issue detected by at least one of a first plurality of devices located within a first physical environment, wherein the first plurality of devices are communicatively linked to one another within a first device domain that is a member of a first device community which includes the first community IoT concentrator. Responsive to receiving the first data, the enterprise IoT concentrator can process the first data to generate second data corresponding to the security issue. The second data can be configured to be processed by a second community IoT concentrator to initiate at least one device located within a second physical environment to perform a specific act that enhances security in the second physical environment. The enterprise IoT concentrator can communicate the second data to the second community IoT concentrator.
Abstract:
Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. Embodiments of the present invention can present customized or original textual content to users requesting textual content.
Abstract:
Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. Embodiments of the present invention can present customized or original textual content to users requesting textual content.
Abstract:
A first community Internet of Things (IoT) concentrator can receive first data corresponding to an interaction of a user with at least one of a first plurality of physical objects, the first plurality of physical objects communicatively linked to one another within a first device domain. Responsive to receiving the first data corresponding to the interaction of the user with the at least one of the first of the plurality of physical objects, the first community IoT concentrator or a second IoT concentrator can initiate, based at least in part on the first data, at least one of a second plurality of physical objects to perform a specific act that enhances an interaction of the user with the at least one of the second plurality of physical objects. The second plurality of physical objects can be communicatively linked to one another within a second device domain.
Abstract:
An enterprise IoT concentrator can receive, from a first community IoT concentrator, first data corresponding to a security issue detected by at least one of a first plurality of devices located within a first physical environment, wherein the first plurality of devices are communicatively linked to one another within a first device domain that is a member of a first device community which includes the first community IoT concentrator. Responsive to receiving the first data, the enterprise IoT concentrator can process the first data to generate second data corresponding to the security issue. The second data can be configured to be processed by a second community IoT concentrator to initiate at least one device located within a second physical environment to perform a specific act that enhances security in the second physical environment. The enterprise IoT concentrator can communicate the second data to the second community IoT concentrator.
Abstract:
Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. Embodiments of the present invention can present customized or original textual content to users requesting textual content.
Abstract:
Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. Embodiments of the present invention can present customized or original textual content to users requesting textual content.
Abstract:
In an approach to managing messages received by a mobile computing device, a computer retrieves a plurality of settings associated with the mobile computing device, with at least one of the plurality of settings associating a characteristic of the mobile computing device with an indication to initiate message retrieval. The computer determines the characteristic of the mobile computing device and determines, based, at least in part, on the characteristic of the mobile computing device, whether the associated indication to initiate message retrieval is received. Responsive to determining the associated indication to initiate message retrieval is received, the computer retrieves at least one message received by the mobile computing device and transmits the at least one message to a user of the mobile computing device.