Abstract:
A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component.
Abstract:
Techniques are disclosed relating to serving an electronic search warrant. In some embodiments, a computer system accesses a blockchain including an electronic warrant that authorizes access to a controlled device having confidential data. The computer system sends a request for the confidential data to the controlled device, the request identifying the electronic warrant. The computer system receives the confidential data from the controlled device and appends a first record to a second record in blockchain. The first record includes the confidential data, a first digital signature generated from the contents of the first record, and a second digital signature obtained from the second record. In some embodiments, the computer system sends a request for the electronic warrant to a second computer system associated with a court. The request identifies a public key for inclusion in the electronic warrant and having a private key to generate the first digital signature.
Abstract:
According to an example computer-implemented method, a first client on a proxy server joins a collaborative meeting on behalf of a user. The collaborative meeting is hosted on a first meeting platform, and the first client utilizes the first meeting platform. The first client receives media content from the collaborative meeting on behalf of the user. The proxy server transmits the received media content to a second client on a computing device of the remote user that utilizes a different, second meeting platform. A computing device and computer program product implementing similar features are also disclosed.
Abstract:
A system and method are disclosed for automatically updating a virtual model of a facility such as a datacenter, for example for use in maintaining an accurate thermal management plan. Photo images of the facility may periodically be captured. Thereafter, one or more image recognition algorithms may be run on the captured images to recognize positions and identities of equipment and structures in the facility. Using this information, the virtual model of the facility may be updated. In examples related to thermal management of a datacenter, once the virtual model of the facility is updated, the thermal management plan may be revised.
Abstract:
A hybrid software as a service (SaaS) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client computing device of the enterprise downloads the application code, which determines an appearance and a behavior of a user interface of the application. The application code is also configured, such as with a network address of a database, to allow the client computing device to access the sensitive data which is hosted by the enterprise. The client computing device may download a file from the enterprise which accesses the application code. For example, an HTML file may access scripting code. Or, the client computing device downloads the application code directly from the software provider, in which case cross-origin resource sharing allows the client computing device to access the sensitive data hosted by the enterprise.
Abstract:
Techniques are disclosed relating to a computer system receiving recordings of meetings between individuals, encrypting the recording, storing the encrypted recording, and determining whether to decrypt the encrypted recording based on decryption information indicative of ones of the individuals have assented to the decryption of the encrypted recording and a cryptographic policy. The computer system may also perform semantic analysis of the audio of the meeting to identify decision statements made at the meeting and factor statements made at the meeting upon which the decision statement is based. The computer system may also store meeting metadata associated with the meeting that is indicative of the decision statement and factor statements. Subsequent to the meeting, the computer system may reevaluate one or more factor statements, determine encrypted recordings corresponding to the reevaluated factor statements, and output an identification of the decision statements associated with the determined encrypted recordings.
Abstract:
A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component.
Abstract:
A hybrid software as a service (SaaS) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client computing device of the enterprise downloads the application code, which determines an appearance and a behavior of a user interface of the application. The application code is also configured, such as with a network address of a database, to allow the client computing device to access the sensitive data which is hosted by the enterprise. The client computing device may download a file from the enterprise which accesses the application code. For example, an HTML file may access scripting code. Or, the client computing device downloads the application code directly from the software provider, in which case cross-origin resource sharing allows the client computing device to access the sensitive data hosted by the enterprise.
Abstract:
An apparatus includes a sensor circuit and a wireless communication interface. The sensor circuit may periodically sense a value for a particular environmental variable. The wireless communication interface may update a dynamic address for the apparatus based on the periodically sensed value, and receive a query from a base station. The query may include a conditional address corresponding to the particular environmental variable. In response to a first comparison of the conditional address to a current dynamic address, the wireless communication interface may send a reply to the base station indicating whether the query has matched for the apparatus. The reply to the query may be performed without requesting a reading of the particular environmental variable from the sensor circuit.
Abstract:
A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component.