摘要:
An improved apparatus and method for debugging computer programs is disclosed for enabling a programmer to step backwards through instructions by checking for exceptions, remembering which instruction generates an exception, and for providing an interface that allows the programmer to easily step back through the instructions in order to isolate the cause of the exception, without the undue repetition.
摘要:
A caller telecommunication device transmits a call to an intended receiving wireless telecommunication device. In response, the caller telecommunication device transmits an instruction to a first proximate telecommunication device, wherein the instruction directs the first proximate telecommunication device to determine if the first proximate telecommunication device is within a predefined proximity of the intended receiving wireless telecommunication device. The predefined proximity is a distance within which the intended receiving wireless telecommunication device and other wireless telecommunication device can directly communicate by local signals. The caller communication device re-routes the call to the first proximate telecommunication device if the first proximate telecommunication device is within the predefined proximity of the intended receiving wireless telecommunication device.
摘要:
A method and system for notifying users of events. User activity of a user is monitored, based on user notification information in a storage location. The user notification information pertains to a scheduled event. In response to a detection, from the monitoring, of a change in the user activity, it is ascertained that the change necessitates notifying the user of the scheduled event due to the change impacting whether the user can participate in the scheduled event. Then the user is notified of the scheduled event. The user notification information in the storage location is modified, based on the detected change in the user activity, in response to receipt of an instruction from the user to change the user notification information in the storage location.
摘要:
A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication.
摘要:
The different illustrative embodiments provide a method, system, and computer program product for sharing a list passed in a shared direct communication environment after a direct communication has ended among mobile devices. A profile associated with the first mobile device in a storage of a server computer is accessed by an indirect transceiver in the second mobile device responsive to a second mobile device acquiring an information that is responsive to a list previously received from a first mobile device and responsive to the information being acquired during a time when there is no direct communication between the first mobile device and the second mobile device. A contact information is retrieved, and the information is sent to a location specified by the contact information.
摘要:
The different illustrative embodiments provide a method, system, and computer program product for sharing a list passed in a shared direct communication environment after a direct communication has ended among mobile devices. A profile associated with the first mobile device in a storage of a server computer is accessed by an indirect transceiver in the second mobile device responsive to a second mobile device acquiring an information that is responsive to a list previously received from a first mobile device and responsive to the information being acquired during a time when there is no direct communication between the first mobile device and the second mobile device. A contact information is retrieved, and the information is sent to a location specified by the contact information.
摘要:
A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device. These preferences may be stored on the caller telecommunication device or remotely stored on the host carrier network.
摘要:
A method, medium and implementing computer system are provided in which the aggregate preferences of a gathered group of individuals in a certain proximity and with respect to a predetermined perceivable and controllable function are ascertained. Individual preferences are processed to obtain a group preference and if the group preference meets predetermined criteria, the group preference is implemented with respect to the controllable function. In a specific example, movie preview playlists are modified by a control server according to the ascertained preferences of the particular group to whom the movie previews are being presented. In another example, the ambient temperature of a room in which a group of individuals is gathered is adjusted by a temperature-control server in response to the polled and ascertained preferences of each of the individuals.
摘要:
The invention is an improved integrated development environment (IDE). In particular, the improved IDE comprises a text editor, a source code analyzer, a rule database, and a solution database. The rule database stores source code patterns that represent classes of bugs, while the solution database stores source code patterns that represent corresponding alternative source code that corrects the bugs. The source code analyzer dynamically evaluates source code as a programmer develops the source code in the text editor, periodically comparing source code with the patterns in the rule database. If the source code analyzer matches a pattern with any source code, the source code analyzer displays the corresponding source code pattern from the solution database. The source code analyzer further gives the programmer the option to select the source code pattern from the solution database, at which time the editor changes the source code to conform to the appropriate pattern.
摘要:
The invention enhances mobile device software such that upon receipt of a specially formatted SMS message, the software can automatically dial a telephone number that was specified in the message after a configurable timed interval. A further enhancement comprises improvements to the integration between collaboration software (such as Lotus Notes) and mobile device software to enable employees to utilize this invention for connecting to conference calls. During the method of the present invention, a potentially contentious situation is detected. After this detection, this method, disrupts the capability of the system to automatically connect the user to a previously scheduled telephone conference, and notifies the user and querying the user and giving the user options to determine how the user desires to handle the one or more incoming calls. The user options can depend on the particular situation detected.