摘要:
Embodiments of the present invention address deficiencies of the art in respect to social bookmarking and provide a method, system and computer program product for aggregating scoring of tagged content across social bookmarking systems. In an embodiment of the invention, a method for aggregating scoring of tagged content across social bookmarking systems can be provided. The method can include combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score and applying the single aggregate tag score to the tag in the content. In this regard, combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score can include computing either a simple or a weighted average of the tag scores for the tag to produce the single aggregate score.
摘要:
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to response subscriptions and provide a method, system and computer program product for centralized response tracking across social networks. In one embodiment of the invention, a social networking response tracking method can be provided. The method can include associating subscribers with a user or a group of users based upon a posting by the user or a user in the group of users within a centralized response tracking system, aggregating different postings from the user to correspondingly different forums disposed about a global computer communications network within the centralized response tracking system, and, notifying the subscribers of the aggregated postings from the centralized response tracking system.
摘要:
A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used.
摘要:
A method for intelligently handling abbreviations in text-based electronic communications can begin with the compilation of abbreviation usage history data by an intelligent abbreviation handler component of a text-based electronic communications system. The abbreviation usage history data can indicate a presentation preference for abbreviation elements based upon past usage by the user. An abbreviation element can be an abbreviation, an acronym, or an initialism. The abbreviation element can be presented in a condensed format or an expanded format. Abbreviation elements can be identified in a received text-based electronic communication. The presentation preference of each identified abbreviation element can be intelligently determined for each recipient from the abbreviation usage history data. An abbreviation-adjusted text-based electronic communication can be created for each recipient using the received text-based electronic communication and the determined presentation preference. The abbreviation-adjusted text-based electronic communication can be conveyed to the recipient.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and persistent chats and provide a method, system and computer program product for controlling active and passive participation among participants in a thread of conversation in an instant messaging session or persistent chat. In one embodiment of the invention, a method for controlling active and passive participation among participants in a thread of conversation can be provided. The method can include creating a thread of conversation in a messaging system, adding participants to the thread, classifying the participants as one of either active or passive, and permitting only those participants classified as active participants to post to the thread while providing merely a view of the thread to the passive participants.
摘要:
A contact management data processing system can be provided. The system can include a contact manager coupled to a list of contacts and stored staleness criteria stored in connection with the list of contacts. The system also can include stale contact management logic. The logic can include program code enabled to apply the stored staleness criteria to a selected contact to identify a stale contact, and to manage the stale contact in the list of contacts. In aspects of the embodiment, the list of contacts can be stored in a personal computer, in a server remotely disposed from the contact manager, in a telephone such as a cellular telephone or voice over Internet protocol (VoIP) telephone, or in a personal digital assistant to name but a few.
摘要:
Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message.
摘要:
A system and method for detecting click fraud where the movement of a cursor on a web page is tracked prior to an advertisement on the web page being clicked by a controller of the cursor. The tracking is performed by client code on a client device displaying the web page. A path taken by the movement of the cursor is mapped to at least one vector associated with the path by the client code. The at least one vector is useable to detect a click fraud.
摘要:
Mechanisms for reserving computing resources of a data processing system are provided. These mechanisms generate one or more computing environment entitlement contract (CEEC) data structures, each CEEC data structure defining terms of a business level agreement between a contracting party and a provider of the data processing system. These mechanisms associate a set of computing resources with a CEEC data structure. The mechanisms then manage the set of one or more computing resources in accordance with the associated CEEC. Such management includes, in response to a contracting party failing to utilize the computing resources in the selected computing resource cohort for a specified purpose at approximately a specified level and pattern of intensity during approximately a specified period of time, all of which are identified in the CEEC data structure, then the CEEC data structure is invalidated or nullified.