Abstract:
An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
Abstract:
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
Abstract:
Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance.
Abstract:
A method for recommending printers and suggesting actions for tailored and efficient fulfillment of print requests is provided. The method provides: receiving, by a printer service, a request to generate a print job. The request comprises a proximity to a requestor, and a plurality of printer properties. The printers in a collection of potential printers are matched for a proximity to the requestor and the plurality of printer properties. A list of top matching available printers is created, based on the proximity to the requestor and the plurality of printer properties. A list of unavailable and incompatible printers is created, based on the matching of the proximity to the requestor. Both lists are displayed. The print job is sent to the printer that the requestor selects.
Abstract:
An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
Abstract:
Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like.
Abstract:
In a method for visualizing data related to unstructured text, a computer identifies at least two data points in a portion of unstructured text of a document, a relationship between the at least two data points, and a label for each of the at least two data points. The computer determines a type of graph to create based on the identified data. The computer causes the at least two data points and the label for each of the at least two data points, and the relationship between the at least two data points to be visualized on a graph. The computer causes a modified graph based on the received instructions to be visualized. The computer causes the modified graph to be displayed in the document having the unstructured text.
Abstract:
Directional vehicular advertisements displayed on a vehicle. A system in accordance with an embodiment includes: a location system for determining a location and a direction of travel of a vehicle; at least one forward facing advertisement slot on the vehicle, wherein each forward facing advertisement slot faces oncoming traffic travelling in a direction opposite to the direction of travel of the vehicle; a plurality of advertisements, each advertisement associated with a location; and a controller configured to select and display at least one of the advertisements via at least one of the forward facing advertisement slots, wherein each displayed advertisement is associated with a location that the oncoming traffic has yet to pass.
Abstract:
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
Abstract:
A client computer extracts contextual information associated with a file that is created. The client computer generates scores for the file by utilizing the contextual information that is extracted. The client computer assigns a value to the file, based on an aggregation of the scores that are generated. The client computer monitors activities on the client computer, wherein the activities trigger an event on the client computer. The client computer determines whether the event is in violation of one or more computer security policies on a server computer, wherein the one or more computer security policies require work-related files to be deleted or encrypted. The client computer classifies the file as personal data or work-related business data. The client computer secures the file, if the file is classified as work-related business data.