-
公开(公告)号:US12229542B2
公开(公告)日:2025-02-18
申请号:US17451073
申请日:2021-10-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Aditi Chakraborty , Raghuveer Prasad Nagar , Sweta Agarwal
Abstract: A system, method, and computer program product for implementing dynamic virtual network access is provided. The method includes monitoring hardware devices associated with network locations comprising data and software code. In response, updates applied to the data and software code are detected and a context of the updates is determined. Based on the context, it is determined that that the updates applied to the data and software code should be cloned and associated user access is verified. A target component location associated with the updates applied to the data and software code to be cloned is determined and the updates applied to the data and software code with respect to the target component location are cloned. A notification indicating the cloning is transmitted to users.
-
公开(公告)号:US20240179538A1
公开(公告)日:2024-05-30
申请号:US18060064
申请日:2022-11-30
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A method, computer system, and a computer program product for generating a communication mode suggestion are provided. A first computer may receive a communication request from a first user to communicate with a second user. The first computer inputs the received communication request to a first machine learning model. The first machine learning model was trained with historical usage of the second user for communication of responses across multiple communication platforms. The trained first machine learning model generates the communication mode suggestion in response to receiving the received communication request as an input. The first computer transmits the communication mode suggestion for presentation to the first user.
-
公开(公告)号:US20240177118A1
公开(公告)日:2024-05-30
申请号:US18060066
申请日:2022-11-30
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
IPC: G06Q10/1093 , G06F40/20
CPC classification number: G06Q10/1095 , G06F40/20
Abstract: A method, computer system, and a computer program product for automated management of a meeting are provided. A first computer may receive a meeting agenda for a first meeting. The first computer may access live content from the first meeting. The first computer may generate a meeting suggestion based on the meeting agenda and on the accessed live content. The first computer may transmit the meeting suggestion to a second computer.
-
公开(公告)号:US20230215303A1
公开(公告)日:2023-07-06
申请号:US17569155
申请日:2022-01-05
Applicant: International Business Machines Corporation
Inventor: Saraswathi Sailaja Perumalla , Sarbajit K. Rakshit , Aditi Chakraborty , Venkata Ratnam Alubelli
CPC classification number: G09F19/12 , G09F27/005 , G03H1/0005 , G06Q30/0268 , G06Q10/087 , G09F2027/001 , G03H2001/0055
Abstract: An approach for providing detailed product information at a product selection shelf location. The approach receives an indication from a sensor that a customer is in proximity to a product on a display shelf. The approach retrieves detailed information about the product from a product data storage location. The approach generates a formatted presentation of the detailed information. The approach displays the formatted presentation as a holographic image from holographic projectors installed in the display shelf.
-
公开(公告)号:US20230121238A1
公开(公告)日:2023-04-20
申请号:US17451073
申请日:2021-10-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Aditi Chakraborty , Raghuveer Prasad Nagar , Sweta Agarwal
Abstract: A system, method, and computer program product for implementing dynamic virtual network access is provided. The method includes monitoring hardware devices associated with network locations comprising data and software code. In response, updates applied to the data and software code are detected and a context of the updates is determined. Based on the context, it is determined that that the updates applied to the data and software code should be cloned and associated user access is verified. A target component location associated with the updates applied to the data and software code to be cloned is determined and the updates applied to the data and software code with respect to the target component location are cloned. A notification indicating the cloning is transmitted to users.
-
-
-
-