Abstract:
An approach for assisting a user with a service request is provided. In the approach, it is determined that an error has occurred on a computing device of a user. A processor identifies information about the computing device. A processor determines that the computing device corresponds to a group of one or more additional computing devices, within a predetermined threshold, based on at least, on the information about the computing device. A processor causes the user to enter into a communication with at least a second user of a second computing device, wherein the second computing device is one of the group of one or more additional computing devices.
Abstract:
According to one embodiment of the present invention, a system for processing a request for a document that is unavailable on a network identifies one or more alternative documents on the network with content similar to a previously accessed document and relating to a group. The system presents the identified one or more alternative documents as a result of a request for the previously accessed document when the previously accessed document is unavailable on the network. Embodiments of the present invention further include a method and computer program product for providing alternative documents in substantially the same manners described above.
Abstract:
Embodiments of the present invention disclose a computer implemented method, computer program product, and system for updating a video tutorial. In accordance with an embodiment, the method includes the steps of determining a number of users of a video tutorial that have performed a set of actions that are different than a set of actions displayed in the video tutorial, determining that the number of users of the video tutorial that have performed the set of actions that are different meets a threshold condition, and identifying a segment of the video tutorial to remove, wherein the identified segment includes the set of actions displayed in the video tutorial that are different. The method may further include creating an updated video tutorial by replacing the identified segment of the video tutorial with a video of the set of actions that are different than the set of displayed actions.
Abstract:
A search context is recorded during a search performed by a first user. The search context may include environmental variables associated with the computing equipment used by the first user such as at least one of regional settings, geographic location, social attributes, job role, browse history, and cookie files. The search context may be encrypted or be restricted for use by certain users and for a specific period of time. The search context may be sent to a second user or a group. The context is applied to environmental variables associated with the computing equipment used by the second user. The second user can thereby substantially duplicate the search performed by the first user.
Abstract:
Provided are techniques for providing customized content for social browsing flow. In response to accessing existing content, a group is identified from a plurality of groups created from behavioral and profile analysis. Additional content is created for the existing content to provide a customized browsing experience based on the identified group. The additional content is displayed with the existing content.
Abstract:
Provided are techniques for providing customized content for social browsing flow. In response to accessing existing content, a group is identified from a plurality of groups created from behavioral and profile analysis. Additional content is created for the existing content to provide a customized browsing experience based on the identified group. The additional content is displayed with the existing content.
Abstract:
According to one embodiment of the present invention, a system for processing a search of network sites allows a user to view search results in at least one viewing mode. Each viewing mode allows a user to view multiple result pages, or portions thereof, such that user can browse multiple search results with minimal web navigation. Moreover, the system may allow a user to cull or trim search results while moving between viewing modes with minimal web navigation. In some embodiments, information relating to or included on a result page may be shown as the user culls the search results and progresses through the various viewing modes.
Abstract:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
Abstract:
According to one embodiment of the present invention, a method for locating experts is provided. The method includes receiving a first query from a first user requesting the identity of persons having desired skills. The names of persons in a database having the desired skills are then identified. A second query is sent to a plurality of additional users requesting the verification of the information relating to the skills of the identified persons. Responses from the plurality of users are used to amend the information relating to skills of the identified persons.
Abstract:
An approach for unfiltering a filtered electronic communication is provided. In one aspect, a computer system receives filtered electronic communication, wherein the filtered electronic communication is a status message. Moreover, the computer system determines a requestor of the filtered electronic communication. The computer system also detects an attempt made to communicate with the requestor. Furthermore, the computer system unfilters, in response to the attempt, the filtered electronic communication.