摘要:
A method, system and apparatus for visualizing multiple time zones can include a C&S application, an event schedule managed by the C&S application, and multiple time zone processing logic coupled to the C&S application. The multiple time zone processing logic can determine a time zone for each participant to a defined event. The multiple time zone processing logic further can render a user interface showing a local time in the determined time zone corresponding to a preferred time for the defined event for each the participant. For instance, the user interface can include an arrangement of juxtaposed time ranges for each participant, where the time ranges have a staggered appearance so that a local time for each of the time ranges corresponds to the preferred time.
摘要:
A method, apparatus, system, and computer program product for managing scheduling of appointments with respect to a quorum requirement. The solution includes scheduling an appointment with each of a plurality of invitees, receiving one or more appointment management requests associated with the appointment from the invitees, the one or more appointment management requests including a change in the appointment, determining that a subset of the appointment management requests constitute a common request, determining that invitees that sent the common request satisfy the quorum constraint for the appointment, and implementing the common request in response to invitees that sent the common request satisfying the quorum constraint. The common request may include an acceptance, a cancellation notice, a cancellation request, and a re-scheduling request.
摘要:
A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria.
摘要:
A method for intelligently handling abbreviations in text-based electronic communications can begin with the compilation of abbreviation usage history data by an intelligent abbreviation handler component of a text-based electronic communications system. The abbreviation usage history data can indicate a presentation preference for abbreviation elements based upon past usage by the user. An abbreviation element can be an abbreviation, an acronym, or an initialism. The abbreviation element can be presented in a condensed format or an expanded format. Abbreviation elements can be identified in a received text-based electronic communication. The presentation preference of each identified abbreviation element can be intelligently determined for each recipient from the abbreviation usage history data. An abbreviation-adjusted text-based electronic communication can be created for each recipient using the received text-based electronic communication and the determined presentation preference. The abbreviation-adjusted text-based electronic communication can be conveyed to the recipient.
摘要:
A method for associating a calendar invitation for a calendar event to a web conference for a web conference event is provided. Invitees of a calendar invitation for a calendar event are received and are detected. The invitees of the calendar event are associated to a web conference event. Modifications relating to the invitees of the calendar event are detected. Modifications relating to the invitees of the calendar event are propagated to the web conference event, and the web conference event synchronizes with the calendar event. Modifications relating to the web conference event for the web conference are detected. Modifications relating to the web conference event are propagated to the calendar event, and the calendar event synchronizes with the web conference event. The invitees of the calendar invitation include first, second, and/or third tiers, and the tiers relate to user roles and privileges, such as a hidden or anonymous presence.
摘要:
A method, system and computer program product for buddy list pruning for instant messaging system performance enhancement. In one embodiment of the invention, a buddy list pruning method for instant messaging system performance enhancement can include comparing buddy list name entries in a buddy list to entries in a network directory used to authenticate users into a network supporting the instant messaging system. The method further can include characterizing selected ones of the buddy list name entries as either invalid where a buddy list name entry cannot be matched to an entry in the network directory, or as valid where the buddy list name entry can be matched to an entry in the network directory. Finally, the method can include performing presence awareness only on valid buddy list name entries in the buddy list.
摘要:
A method, apparatus and computer-usable medium for improved load testing of subsystems comprising a larger system by intelligently and stochastically distracting virtual users from healthy subsystems such that they collaboratively converge on a subsystem exhibiting operating health problems. Virtual users are progressively targeted at a degraded subsystem to force it to sustain its respective share of a test workload, thereby exacerbating its behavior to facilitate problem determination and resolution. Virtual users that have failed or terminated in an unhealthy subsystem are replaced by selectively and intelligently redistributing virtual users from healthy systems. As virtual users are redistributed to the degraded subsystem and fail or terminate, additional performance and behavior data is generated as the subsystem degrades to an unusable or non-operational state. By accelerating time-to-failure, test cycle intervals are reduced and the number of identified performance defects are maximized.
摘要:
A technique for automated discovery of relationships between components providing a service and discovery of the relationship of shared components to other services. A discovery engine determines a management address for a component experiencing a problem and retrieves a TCP connection table for the component. It then identifies TCP connections that are either active or that were recently active. For each, the destination address is added to a global connection table. After the TCP connection table has been processed in this manner, the global connection table is traversed and TCP connection tables for each listed destination address are examined recursively. At the conclusion of this recursive process, the management table contains a list of management agents in the distributed system to which the original component had a TCP connection, either directly or indirectly.
摘要:
A method for exploitation of location proximity to derive a location of an employee in a corporation utilizing instant messaging or automatic telephone calls is provided. A search request for a location of an employee is received. A look up of coworkers of the employee in a corporate database is performed. A list of neighbors of the employee is extracted from the coworkers, and the list of neighbors of the employee is generated in accordance with the proximity of neighbors in the list of neighbors to a workspace of the employee. The list of neighbors is presented, in response to the search request. The list of neighbors is polled to locate the employee via instant messaging and/or automatic telephone calls. The location of the employee is received, in response to polling the list of neighbors. The neighbors are alerted that the employee has been located.
摘要:
Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement.