Abstract:
A wearable computing device receives user preferences, wherein the user preferences include information detailing one or more types of information to display based on one or more criteria being satisfied. The wearable computing device determines information to display on the wearable computing device based on the user preferences. The wearable computing device displays the determined information.
Abstract:
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different attributes of a user, and added together to generate a user risk factor. If the risk factor does not meet one or more off-site access threshold value(s), additional security enhancements applicable to the user and not enabled within currently applied security are iteratively selected and used to revise the security settings, and the risk factor is revised by a risk abrogation value of each of the selected security enhancements, until either the revised risk factor meets the off-site access threshold value(s) (wherein access is granted to the secure data from the off-site location pursuant to the revised security settings), or until no additional applicable security enhancements are available (wherein user access to the secure data from the off-site location is denied).
Abstract:
Systems and methods for optimizing resolution of an electronic display device are disclosed. A computer program product for optimizing display resolution of an electronic device includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: detect the presence of at least one user; determine an identity of the at least one user; obtain, from a user data storage module, personalized optimal resolution data of the at least one user; and adjust the resolution of the electronic device display based on the personalized optimal resolution data.
Abstract:
Technical solutions are described to for refining a travel route based on crowd sourcing. An example computer-implemented method includes receiving a first location as a travel destination of a first user. The method also includes identifying a set of users that indicated the first location as a travel destination. The method also includes determining a first subset of users from the set of users by comparing a first set of attributes associated with the first user and each user from the set of users. The method also includes determining a second subset of users from the first subset of users by comparing a second set of attributes associated with the first user and each user from the first subset of users. The method also includes identifying a second location to which the users from the second subset diverged to when traveling to the first location. The method also includes in response, selecting the second location as the travel destination of the first user.
Abstract:
Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more methods may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents.
Abstract:
For a software product delivered as a hosted service from a host, the host delivers, to a single user interface, a current version of the software product comprising one or more selectable functions of the current version of the software product, wherein the current version of the software product is one version of multiple separate versions of the software product. The host updates the single user interface to display at least one selectable previous version function from at least one previous version of the separate versions of the software product. In response to receiving a user selection within the single user interface to access a particular selectable previous version function, the host delivers the functionality of the particular selectable previous version function from a particular previous version of the software product within the single user interface for the current version of the software product.
Abstract:
Qualities of each of first and second sessions for voice over internet protocol communication between endpoints are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current or primary session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and second sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints.
Abstract:
Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source.
Abstract:
In an embodiment, a computer-implemented method of monitoring vehicles is provided, the method including: generating a debris report of an incident relating to vehicle-induced roadway debris, the debris report generated by a reporting vehicle; in a monitored vehicle distinct from the reporting vehicle, updating an incident record for the monitored vehicle based on the debris report and determining, based on the updated incident record, whether the monitored vehicle is associated with the incident or in a vicinity of the incident; and initiating a safety action to be performed on the monitored vehicle in response to a determination that the monitored vehicle is associated with the incident or in the vicinity of the incident.
Abstract:
A solution for managing access to exercise equipment in a fitness facility is provided. A planned exercise routine for a user, which includes data corresponding to a plurality of exercises desired to be performed by the user at the fitness facility is used for providing location information for presentation to the user. Each exercise can require use of an exercise apparatus. The exercise can be mapped to at least one exercise apparatus located at the fitness facility. A target exercise apparatus can be identified from the mapped exercise apparatus(es). Location information for one or more of the target exercise apparatuses can be provided for presentation to the user.