Abstract:
One embodiment provides a system for monitoring and controlling an online user profile of a user. In response to receiving a data request from the user to access a first web site, the system forwards the data request and desired persona scores to an intelligence service system, receives a list of other web sites from the intelligence service system, and counteracts the user's access to the first web site by spawning multiple threads in accordance with the list received. The multiple threads spawned are transparent to the user. Further, the system alters an original data post submission from the user based on a desired translation option, maps the altered data post submission to a first key, and posts the altered data post submission to a target web site. The original data post submission is viewable only by the user and other users with the first key.
Abstract:
Embodiments of the present invention provide a method, system and computer program product for cognitive parking guidance. In an embodiment of the invention, a method for cognitive parking guidance includes initially receiving in memory of a computer either an express or implied definition of a navigation waypoint for a specified vehicle. The method also includes retrieving from over a computer communications network into the memory of the computer, a set of available parking spaces within a pre-specified distance of the navigation waypoint and loading into the memory of the computer a context of the vehicle. The method yet further includes filtering the available parking spaces in the set into a subset of one or more available parking spaces in accordance with the context. Finally, the method includes displaying a location of a selected one of the parking spaces in the subset in a display of the computer.
Abstract:
Embodiments of the present invention provide methods, computer program products, and systems for leveraging social networks in physical gatherings. Embodiments of the present invention generate profiles for participants at the physical gathering. Embodiments of the present invention can enrich the participants experience at the physical gathering by providing information to the participant, based on the profile for the participant.
Abstract:
A movement activity is assessed in a movement assessment environment. A processor receives user movement data, captured by a sensor, of a user in the movement assessment environment. The processor receives a match request from the user, wherein the match request includes a request for an instructor that matches the user. The processor compares the user movement data of the user to a plurality of other movement data, wherein the plurality of other movement data includes at least one instructor movement data and at least one professional movement data. The processor determines, responsive to the comparing, a match between the user and an instructor, wherein the match is determined based at least in part on a similarity between the user movement data and at least one of the plurality of other movement data.
Abstract:
Automated essay evaluation includes receiving an essay in text form and determining, using a processor, curriculum data for the essay. The curriculum data includes evaluation criteria for the essay and specifies an instructor. A profile for the instructor including a writing preference for the instructor is retrieved. Using the processor, a plurality of queries for the essay can be generated according the curriculum data for the essay and the profile for the instructor. Using the processor executing an inference engine, a conclusion for each of the queries is determined according to confidence scores. The essay is scored according to the conclusions.
Abstract:
A computer determines the cost and risk of assets. The computer analyzes an asset signature, associated with an asset representing a fundamental structural unit of an information technology environment, to determine that the asset is in a non-normal state. The computer determines the cost of the asset by evaluating a price formula associated with the asset signature of the asset, and the computer determines the risk of the asset by evaluating a risk formula associated with the asset signature of the asset. The computer maintains a configuration item for the asset, indicating the state, the risk, and the cost of the asset. One or both of the risk and the cost of the asset are used to determine the priority of recovering the asset.
Abstract:
A middleware system, method and program product for managing workflows among computer applications. The middleware system includes: a common construct unit and a workflow export unit. The common construct unit (i) retrieves a mapping between a component of a macro workflow of the middleware system and a micro workflow component of a first computer application and (ii) executes the macro workflow which orchestrates micro workflows of the first computer application and a second computer application. The workflow export unit generates an output that enables the second computer application to execute a workflow that corresponds to the workflow of the first computer application.
Abstract:
A method, computer system, and a computer program product for digital remote presentation are provided. Presentation content is received that includes visual content, one or more speech triggers, and one or more presentation enhancements corresponding to the one or more speech triggers. A virtual meeting is presented by transmitting the presentation content to at least one receiver computer. A first audio file is received that includes recorded audio spoken by a presenter during the virtual meeting. From the first audio file the one or more speech triggers spoken by the presenter are identified. The respective presentation enhancement corresponding to the identified speech trigger is performed. The presentation enhancement is presented to the at least one receiver computer during the virtual meeting.
Abstract:
Securing an autonomous vehicle against remote interference. Electronic communications are classified and rated according to communication port and package content. Communication ratings are processed to assess risk of remote interference. At-risk communications trigger interference response actions according to pre-defined ratings thresholds.
Abstract:
A presenter and an audience associated with a presentation event can be detected. The presentation event can be a real world occurrence and/or a computing session occurrence. The presenter can convey a presentation content to the audience. Presentation data associated with the presentation event can be identified. The presentation data can include the presentation content. The presentation content can include a text and/or a media. A real-time metrics associated with the presenter and the audience can be captured from one or more computing devices associated with the presenter and the audience during the presentation event. The real-time metrics can be analyzed to determine a presenter and an audience recommendation. The presenter recommendation can be presented to the presenter and the audience recommendation to an audience member.