Abstract:
Provided are techniques for predicting the actions and evaluating the risk of a software install program including downloading a software installation program on a computing system, wherein execution of the software installation program installs a computing product on the computing system; disassembling the software installation program to produce a plurality of lines of instructions; analyzing each line of the plurality of lines or instructions to identify potential modifications to the computing system associated with the program; generating a report detailing the potential modifications to the computing system; and displaying the report so that a user may evaluate an impact of the potential modifications to the computing system in the event the software installation program is executed.
Abstract:
A method, system and computer program product for managing pattern contents across multiple racks. The workload usage characteristics of the pattern contents on a primary rack in a domain of racks are collected based on monitoring the workload usage of the pattern contents in the pattern definition and in the deployed pattern. Furthermore, information regarding use of the pattern definition, the deployed pattern and the pattern contents by users (“human interaction usage patterns”) is collected based on monitoring the human interaction usage patterns. The pattern contents are then ranked based on analyzing the collected workload usage characteristics and analyzing the collected information regarding human interaction usage patterns. Once the pattern contents are ranked, those contents that are highly ranked are deemed to be more likely to be utilized in the pattern and therefore are the contents that are copied from the primary rack to the other racks of the domain.
Abstract:
A method, system and computer program product for building a pattern. An external framework engine identifies the software components, as well as code updates and/or code fixes, from the external repositories associated with different vendors. The framework engine then generates metadata using the identified software components and code updates and/or code fixes which may be used to determine the relationships between the software components. Furthermore, the framework engine generates configuration metadata to successfully link software components with a relationship. The framework engine then displays the software components available to be used to build the pattern, including the relationship linkages between the software components with a relationship along with the configuration metadata required to make a successful linkage. In this manner, the user will be able to build a pattern using software components provided from different vendors and be able to understand the relationship linkages between the software components.
Abstract:
A method, system and computer-usable medium are disclosed for protecting data stored on a mobile device, based upon its location. Data stored on a mobile device is encrypted with a network-stored secret key that is unknown to the user of the mobile device. The secret key is provided directly to the mobile device once the user is authenticated and it has been determined that the mobile device is located within a predetermined geographical area. The provided secret key is then used to decrypt the encrypted data stored on the mobile device such that it can then be accessed by the user. The user is then prevented from accessing the encrypted data when it is determined that the mobile device is no longer located within the predetermined geographical area.
Abstract:
A method, for presenting a content item from a plurality of content items for a window of time, includes receiving the window of time and a user profile. The method also includes identifying a content preference and a presentation preference within the user profile. The method also includes selecting the plurality of content items based on the content preference. The method also includes prioritizing the plurality of content items, based on the presentation preference, that results in a plurality of prioritized content items. The method also includes determining a presentation option, for the plurality of prioritized content items, having a presented content item. The method also includes presenting the presented content item corresponding to the presentation option.
Abstract:
A method for sharing a content item from an originator with one or more first-order recipients may include receiving a first grouping of one or more first-order recipients that is selected to receive the content item from the originator. The method may also include receiving one or more distribution objectives from the originator. The method may also include selecting a first share time for the content item. The method may also include predicting a first predicted grouping of second-order recipients derived from the first grouping of first-order recipients for the content item at the first share time. The method may also include determining whether the distribution objectives are met for the content item. The method may also include sharing the content item at the first share time in response to the distribution objectives being met for the content item.
Abstract:
A method for crowd sourcing tasks may include identifying a group of potential candidates for crowd sourcing. Each candidate of the group of potential candidates may be identified based on the candidate being expected to accept a certain type of task. The certain type of task may be at least a task that is performable within a predetermined range of time. The method may also include receiving a request to perform a particular task from a requester. The method may additionally include determining if the particular task is the certain type of task. The method may further include transmitting an offer for performance of the particular task to at least a subgroup of the group of potential candidates in response to the particular task being the certain type of task.
Abstract:
According to one aspect of the present disclosure, a method and technique for automatically launching an audio/video conference is disclosed. The method includes: receiving and storing, from a first user, an activity criterion; responsive to detecting an activity of the first user meeting the activity criterion, determining whether a second user meets the activity criterion; and responsive to determining that the second user meets the activity criterion, automatically initiating an electronic communication session between a computing device of the first user and a computing device of the second user.
Abstract:
Provided are techniques for predicting the actions and evaluating the risk of a software install program including downloading a software installation program on a computing system, wherein execution of the software installation program installs a computing product on the computing system; disassembling the software installation program to produce a plurality of lines of instructions; analyzing each line of the plurality of lines or instructions to identify potential modifications to the computing system associated with the program; generating a report detailing the potential modifications to the computing system; and displaying the report so that a user may evaluate an impact of the potential modifications to the computing system in the event the software installation program is executed.
Abstract:
Managing a collaborative space includes providing a collaborative space in which a number of users collaborate from respective client devices, monitoring content of the collaborative space to determine a context of collaboration in the collaborative space, and changing an operation of at least one functionality of the collaborative space based on the determined context of collaboration in the collaborative space.