Abstract:
The invention pertains to an Internet conference call bridge management (ICCBM) system and method with which a person (customer) having access to the Internet may efficiently input the contact number of at least one party (call recipient) with whom the customer wants to speak. The ICCBM system then calls the customer, calls the party or parties, and the audio signals are bridged in a manner that optimizes the call signal to noise ratio, minimizes demands placed on computing resources, and provides controls with which the customer may monitor and control the telephonic access of the other participants through the duration of the conference call.
Abstract:
Systems and methods of the present invention provide for receiving an action item communication by a user, which is then imported by a task management engine into a task list of an electronic organizer. Keywords from the task may be used to search a user's preferences, partnerships or the Internet for suggested solutions to complete the task. The system may then be customized to the user's preferences.
Abstract:
Systems and methods of the present invention provide for receiving an action item communication by a user, which is then imported by a task management engine into a task list of an electronic organizer. Keywords from the task may be used to search a user's preferences, partnerships or the Internet for suggested solutions to complete the task. The system may then be customized to the user's preferences.
Abstract:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a business validation based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account, validating the business name and business email address, and determining whether the domain name is registered to and under control of the business. If the business name and business email address are both validated, and the domain name is registered to and under control of the business, the social website account's authenticity may be certified.
Abstract:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a public key certificate based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account and determining whether a public key certificate has been issued for the domain name used by the business email address. If a public key certificate has been issued, the method may further comprise determining whether the public key certificate identifies the business name and/or domain name provided in the original request. If so, the method may further comprise determining whether the business email address is under the control of the business and, if so, certifying the authenticity of the social website account.
Abstract:
Methods of the present inventions allow for generating online advertisements offering dynamic content relevant domain names for registration. An exemplary method may comprise generating at least one domain name, which may be based upon the content of a website. If the domain name(s) is/are determined to be available for registration, an online advertisement may be generated (that may list the domain name(s) as available for registration). The online advertisement then may be displayed on the website.
Abstract:
Methods of the present inventions allow for generating domain names relevant to trending topics on a social website. An exemplary method may comprise the steps of generating a domain name that relates to a trending topic on a social website, determining whether the domain name is available for registration, and providing the domain name for registration (if available).
Abstract:
Systems of the present inventions allow for generating domain names relevant to current events. An exemplary system may comprise a website (hosted on at least one server) that may have one or more fields for submitting a request for a domain name that relates to current events, wherein the request may not include a keyword, search term, or suggested domain name. The system also may comprise a domain name generation module and a domain name registration module, both of which may run on at least one server. The domain name generation module may generate at least one domain name relevant to current events, and the domain name registration module may offer such generated domain names for registration, if available. The system also may comprise a network communicatively coupling the at least one server, domain name generation module, and domain name registration module.
Abstract:
Methods of the present invention provide for coordinating schedules by assigning a priority level to a user and scheduling an event using an electronic calendar. An exemplary method may comprise the steps of a profile manager matching a recommended time slot common to a range of time slots provided by a first user and second user, and a client side application used with an electronic calendar downloading the recommended time slot.
Abstract:
A method for reducing the number of transitions generated by an LFSR is introduced. The transition monitoring window monitors the number of transitions occurring as random patterns generated from an LFSR are applied to a scan chain, and, if the number of transitions exceeds a threshold value (“k-value”), all further transitions are suppressed. The transition monitoring window monitors the patterns entering the LFSR, incrementing a counter if a transition is detected. If a transition is detected just before the exit of a lowest stage of the LFSR the counter is decremented. The signal from the counter is compared with the k-value at every clock tick, and if the count is greater than the k-value, the vector most recently applied to the scan chain is re-applied to the scan chain; if it is less than the k-value, the output from the LFSR is applied to the scan chain.