PRIVACY CONTROL IN A SOCIAL NETWORK
    1.
    发明申请
    PRIVACY CONTROL IN A SOCIAL NETWORK 审中-公开
    社交网络中的隐私控制

    公开(公告)号:WO2014002041A3

    公开(公告)日:2014-02-20

    申请号:PCT/IB2013055272

    申请日:2013-06-27

    CPC classification number: G06F21/6245 H04L63/0245 H04L63/0407 H04L63/10

    Abstract: An approach is provided to provide privacy control in a social network. In the approach, a first post is posted from a first user to a second user in the social network with the first post including private data belonging to the first user. Subsequent postings are monitored for the first user's private data. When the monitoring detects a second post of the first user's private data with the second post being from the second user to a third user in the social network, privacy controls are performed. The privacy controls mask the first user's private data from the third user so that the first user's private data inaccessible (not visible) to the third user.

    Abstract translation: 提供了一种在社交网络中提供隐私控制的方法。 在该方法中,第一帖子从第一用户发布到社交网络中的第二用户,第一帖子包括属于第一用户的私人数据。 随后的发布会监视第一个用户的私人数据。 当监控检测到第二用户的私人数据的第二帖子是从第二用户到社交网络中的第三用户时,执行隐私控制。 隐私控制屏蔽来自第三用户的第一用户的私人数据,使得第一用户的私人数据对第三用户不可访问(不可见)。

    Software-Installation
    3.
    发明专利

    公开(公告)号:DE112012005559T5

    公开(公告)日:2014-09-18

    申请号:DE112012005559

    申请日:2012-12-13

    Applicant: IBM

    Abstract: Es werden Zeitmessparameter identifiziert, die ein Installationszeitintervall für ein Installieren eines Produkts auf Datenverarbeitungsmaschinen in einer Testumgebung gemäß einer Installationskonfigurationsoption beeinflussen. Ein Testwert des Zeitmessparameters und ein Testwert der Installationszeit werden für jede der Datenverarbeitungsmaschinen bestimmt. Die Testwerte des Zeitmessparameters und der Installationszeit, die für die Beispiel-Datenverarbeitungsmaschinen bestimmt wurden, werden analysiert, um einen Installationszeit-Berechnungsausdruck für die Installationskonfigurationsoption zu bestimmen. Zur Installation gemäß der Installationskonfigurationsoption in einer normalen Betriebsumgebung, ein aktueller Wert für jeden der Zeitmessparameter des vorgegebenen Installationszeit-Berechnungsausdrucks für die Installationskonfigurationsoption. Das Installationszeitintervall in der normalen Betriebsumgebung wird auf der Grundlage des aktuellen Werts der Zeitmessparameter und des Installationszeit-Berechnungsausdrucks geschätzt.

    COMMUNICATING WITH REMOTE OBJECTS IN A DATA PROCESSING NETWORK

    公开(公告)号:CA2547706C

    公开(公告)日:2010-10-26

    申请号:CA2547706

    申请日:2004-12-14

    Applicant: IBM

    Abstract: A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte strewn containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.

    COMMUNICATING WITH REMOTE OBJECTS IN A DATA PROCESSING NETWORK

    公开(公告)号:CA2547706A1

    公开(公告)日:2005-07-28

    申请号:CA2547706

    申请日:2004-12-14

    Applicant: IBM

    Abstract: A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte strewn containing th e remote object and its arguments, responsive to executing a remote object cal l. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remot e object, in the second byte stream, for which no reference can be found, usin g information contained in second serialized byte stream to determine the clas s type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.

Patent Agency Ranking