摘要:
A method, computer program product, and computing system for providing a graphical user interface including at least one selectable application in a scheduling entry in the multi-user scheduling system. An available application lockout may be activated on all available applications other than a selected application upon initialization of the scheduling entry.
摘要:
Collisions are detected between multiple instant messages that are sent to a given user at the same time. In response to detecting a collision, the sending users are put into a real-time, on-line negotiation that enables the sending users to determine among themselves whose instant message will be delivered next to the receiving user. This allows the sending users to make a determination of which message is most important based on their relative needs at the time. A collaborative communication session, such as a group chat, is initiated for the negotiating sending users so that they can exchange information regarding the purposes of their messages. Based on the results of this on-line negotiation between message senders, a limited number (e.g. one) of the colliding messages are next delivered to the receiving user.
摘要:
In a calendar messaging method and system, a calendar application executing on a computer receives a command to activate an out-of-office status, and receives one or more selected calendar events. The method and system further include automatically updating the calendar events, wherein the updating includes at least one of canceling the calendar events, and removing the user as an invitee of the calendar events. An out-of-office message is then automatically sent to at least one recipient indicating a type of update made to one or more of the calendar events.
摘要:
A method, computer program product, and computing system for providing a graphical user interface including at least one selectable application in a scheduling entry in the multi-user scheduling system. An available application lockout may be activated on all available applications other than a selected application upon initialization of the scheduling entry.
摘要:
An indication of a meeting being scheduled between a plurality of attendees is received. A first one of the attendees is designated an owner of the meeting. Ownership privileges for the meeting are associated with at least a second one of the meeting attendees. The ownership privileges associated with at least a second one of the meeting attendees are associated based upon, at least in part, an organizational structure.
摘要:
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user.
摘要:
An indication of a meeting being scheduled between a plurality of attendees is received. A first one of the attendees is designated an owner of the meeting. Ownership privileges for the meeting are associated with at least a second one of the meeting attendees. The ownership privileges associated with at least a second one of the meeting attendees are associated based upon, at least in part, a social network defined for the owner of the meeting.
摘要:
An indication of a meeting being scheduled between a plurality of attendees is received. A first one of the attendees is designated an owner of the meeting. Ownership privileges for the meeting are associated with at least a second one of the meeting attendees. The ownership privileges associated with at least a second one of the meeting attendees are associated based upon, at least in part, an organizational structure.
摘要:
Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message.
摘要:
A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link.