Abstract:
A device, method and system for automatically inferring a mobile user's current context includes applying a user activity knowledge base to real-time inputs and stored user-specific information to determine a current situation. Automated reasoning is used to infer a user-specific context of the current situation. Automated candidate actions may be generated and performed in accordance with the current situation and user-specific context.
Abstract:
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives. The network directives may be implemented by the network in response to security events.
Abstract:
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives, and updates the interactive visualization in response to the network directives.
Abstract:
A device, method and system for automatically inferring a mobile user's current context includes applying a user activity knowledge base to real-time inputs and stored user-specific information to determine a current situation. Automated reasoning is used to infer a user-specific context of the current situation. Automated candidate actions may be generated and performed in accordance with the current situation and user-specific context.
Abstract:
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives. The network directives may be implemented by the network in response to security events.
Abstract:
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives, and updates the interactive visualization in response to the network directives.