Abstract:
Provided is a system that enables a computer user to purchase and maintain installed operating systems and applications. Also provided is a method and system that detects and installs updates to programs and operating systems (OSs) on a computing system and ensures that the upgrades are compatible with existing software. A method is provided wherein a computer environment is scanned for all installed software and supporting files and logic such as libraries and OSs. A detected configuration is transmitted to a service provider who generates a service and support plan. The plan is offered to the administrator of the computer environment as an alternative to vendor-supplied plans. Thus, an administrator of a particular computing environment is able to centralize the maintenance and upgrade of installed software. The claimed technology provides access to a single-source pricing and support structure and enables the service provider to negotiate and purchase bulk upgrade packages.
Abstract:
An automatic teller machine capable of sending a facsimile of a check, money order, or other payment instrument to a payee designated by a user. The user inserts cash or allows an account to be debited to pay for the payment instrument, and the automatic teller machine faxes the payment instrument to the payee.
Abstract:
A method, apparatus, and computer instructions for managing multi-threaded conversations in an instant messaging system. The present invention provides a menu option to allow the start of a new topic of discussion within the current instant messaging session. When a new topic is selected, a new thread of conversation is created within the messaging window that is segregated from previous topics of discussion. This new thread of conversation may be created at all other locations for all of the parties involved in the instant messaging session. In this manner, each party to a messaging session containing multiple conversations may be able to understand which response is related to which thread of conversation. In addition, a menu option may be provided by the instant messaging application to allow a user to merge one or more of the threaded conversations into a single conversation.
Abstract:
A computer implemented method, apparatus, and computer usable code for shredding objects. The apparatus has a number of components including a receptacle that is configured to receive objects. A shredding unit is connected to the receptacle, wherein the shredding unit selectively destroys the objects placed into the receptacle. An object detector is used to detect the presence of an object in the receptacle. An object identifier identifies objects placed into the receptacle. The apparatus also has a memory and a connector. The connector is used to establish a communications link with a data processing system. A controller in the apparatus stores identifications of objects identified by the object identifier in the memory and sends a signal to the shredding unit to control shredding of the objects.
Abstract:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
Abstract:
A method and system for securing a removable module. Upon removal of the removable module from a computer system, the removable module is locked. The removable module may be locked by setting the removable operating system module to auto lock, by pressing a lock button on the removable module, or by setting a time delay, where the time delay determines the time after which the removable module locks after removing the removable module from the computer system. Upon reinsertion of the removable module, a user attempting to use the removable module is first authenticated. The user may be authenticated by the user entering a password and the system comparing the password to a list of authenticated passwords, by scanning the user's fingerprints using a fingerprints scanner or the user's retina using a retina scanner and comparing the image to a list of authenticated image signatures.
Abstract:
Methods, computer program products and systems for operating an application screensaver on a computer system. A screensaver activation condition is stored for one or more application programs on the computer. The screensaver is activated to overlay the client area of a running application window in response to detecting a screensaver activation condition for that application program. A screensaver process or image may be deactivated in response to no longer detecting the occurrence of the stored screensaver activation condition for that application. A screensaver activation condition may be a period of inactivity with the application program. A global desktop screensaver property may also be stored and include global desktop screensaver activation and deactivation conditions, which are used to activate and deactivate a global desktop screensaver process that overlays application program windows. Optionally, application program screensavers may be deactivated in response to deactivation of the global desktop screensaver.
Abstract:
A method, system, and computer-usable medium for sending a first notification message to a credit card agency alerting the credit card agency of a misplaced credit card, an identification of a credit card owner, and a location of the misplaced credit card; in response to receiving the first notification message, sending a second notification message to the credit card owner corresponding to the misplaced credit card; and in response to receiving the second notification message, specifying a procedure for returning the misplaced credit card to the credit card owner.
Abstract:
A method, apparatus, and computer instructions for displaying keystrokes on a display screen in the mobile communications device. In response to detecting a user input selecting a character on a keypad, the character is displayed on the display screen using a full screen display of the character. The full screen display is adjusted to the selected size after a selected period of time.
Abstract:
A method and system for creating a quiet zone. In an exemplary embodiment, the method includes receiving a request for the creation of the quiet zone and generating a quiet time data packet. The quiet time data packet may be generated by a source system and includes data specifying the start and duration of the quiet time. The quiet time data packet is transmitted from the source system to at least one destination system. Upon receipt of the quiet time data broadcast, the at least one destination system implements a quiet time for the specified duration within the destination system environment.