Abstract:
Embodiments for selecting a communication service provider by a processor. Communication requirements for one or more applications of a user equipment (UE) may be analyzed to convey information over a communication network. A communication service provider may be selected according to a level of matching both the communication requirements and one or more user selection criteria.
Abstract:
Improved utilization of spare resources for fuzz testing is provided. A production environment that includes a plurality of running applications having a plurality of user input fields is monitored over a period of time for consumer use. Actual usage data for the plurality of user input fields are determined during the period of time. Each user input field in the plurality of user input fields is ranked for fuzz testing based on, at least in part, the actual usage data corresponding to each respective user input field during the period of time. The fuzz testing is selectively performed on a portion of the plurality of user input fields based on user input field rankings.
Abstract:
Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.
Abstract:
A method and system for determining measures of cell phone coverage along a travel route. Received are: a specification of a travel destination by a road vehicle, a projected starting time for a user to begin travel along the travel route from a starting location of the vehicle to the travel destination, and a telephone carrier service for the cell phone. Measures of cell phone coverage along the travel route are determined and include: (i) amounts of dropped calls by the telephone carrier service in areas along the travel route in which the telephone carrier service provides cell phone coverage, (ii) a quality of cell phone service by the telephone carrier service, correlated to time of day, along the travel route, or (iii) both the amounts of dropped calls and the quality of cell phone service. The measures of cell phone coverage along the travel route are displayed.
Abstract:
A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Based on first and second icons representing the first and second applications, respectively, having been placed into a graphical element displayed by the mobile device, an attribute included in attributes assigned to the graphical element is obtained. The attribute specifies an exchange of information permitted between the first and second applications. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
In an approach for asset management, a processor identifies the location of an asset. A processor receives information specific to the location of the asset. A processor determines that an alert is required based on at least the asset, the location of the asset, and the information specific to the location of the asset. A processor generates an alert.