Abstract:
A system and computer implemented method for managing a vehicle incident is disclosed. The method may include monitoring, in response to a triggering event, a first vehicle having a first vehicle state including a set of physical condition characteristics. The method may also include detecting, for the first vehicle, a vehicle incident including a change of one or more physical condition characteristics of the set of physical condition characteristics. The method may also include collecting, in response to detecting the vehicle incident for the first vehicle, incident circumstance information including a set of potential causes of the vehicle incident. In certain embodiments, the method may include providing incident data based on at least a portion of the incident circumstance information and at least a portion of the change of one or more physical condition characteristics.
Abstract:
A method for tracking objects including sensing, with a processor, at least one object, determining, with a processor, a position of the at least one object relative to a portion of a sporting venue, presenting the portion of the sporting venue on a feedback device, and providing, through the feedback device, at least one tactile feedback presenting the position of the at least one object relative to the portion of the sporting venue.
Abstract:
Provided are techniques for dynamic mathematical validation using data mining. As text is being received, a mathematical statement is identified in the text based on context of the text. A mathematical solution to the mathematical statement is identified in the text based on the context of the text. It is determined that the mathematical solution is incorrect using data mining. In response to determining that auto-correction is to be performed, the mathematical solution is corrected.
Abstract:
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded in a message for one or more recipients. The method includes receiving, by a computing node in a distributed computing environment and from a messaging application on a remote client computer, an identifier of a user profile and a location resource. The location resource is embedded in a message and that indicates a path to a computing resource outside of the remote client computer. The method also includes querying a repository in the distributed computing environment to obtain access permission information about the location resource. The method also includes determining, based upon the access permission information about the location resource, whether the user profile has access permission for the location resource.
Abstract:
A token-based method for authenticating a user includes placing a predetermined token (i.e., physical object) at a predetermined location on a touch sensitive device to generate an authentication authorization rather than a traditional text-based, smartcard or biometric method of user authentication. In various embodiments, a plurality of tokens is placed upon the touch sensitive device in a predetermined sequence at predetermined locations to generate an authentication authorization.
Abstract:
Provided are techniques for dynamic mathematical validation using data mining. As text is being received, a mathematical statement is identified in the text based on context of the text. A mathematical solution to the mathematical statement is identified in the text based on the context of the text. It is determined that the mathematical solution is incorrect using data mining. In response to determining that auto-correction is to be performed, the mathematical solution is corrected.
Abstract:
An apparatus and computer program product for managing memory of a device is disclosed. A computer system collects information about use, by the device, of data in the memory of the device. The information collected by the computer system includes a time and a location for which each portion of the data is used by the device. The computer system identifies patterns of use, by the device, of each portion of the data based on the information collected. The computer system then selects one or more portions of the data that are not needed in the memory of the device based on the patterns of use by the device.
Abstract:
A method, apparatus, and computer program product, responsive to receiving a data from a computing device connected to the computer in a cloud computing system or data center, identifies a criteria associated with the computing device, responsive to identifying the criteria, determines whether the data is authorized for transmission to a storage in the cloud computing system or data center, and responsive to determining that the data is authorized for transmission to the storage, forwards the data to the storage.
Abstract:
A method responsive to receiving a data from a computing device connected to the computer in a cloud computing system or data center, identifies a criteria associated with the computing device, responsive to identifying the criteria, determines whether the data is authorized for transmission to a storage in the cloud computing system or data center, and responsive to determining that the data is authorized for transmission to the storage, forwards the data to the storage.
Abstract:
Methods and systems may provide for receiving a set of attributes that identify a pegged area of a page delivered to a user interface during a first browsing session and storing the set of attributes. Additionally, the set of attributes may be used to conduct a subsequent delivery of the pegged area to a user interface during a second browsing session, wherein the subsequent delivery of the pegged area excludes portions of the page that are outside the pegged area. In one example, the subsequent delivery is conducted further based on the type of client device participating in the second browsing session.