Abstract:
In accordance with the present invention, radio frequency identification (RFID) and short message service center (SMS), or follow-on technology, e.g., Mobile Multimedia Services (MMS) technology is implemented to support an identification and messaging system. A social services server tracks a user's location with a RFID or GPS or similar system and also acquires locations for user-selected contacts which are made available to the system. When a system user is near a user-selected contact or individual within a selected group that the user wants to meet, a message or other alert, such as an SMS message, is automatically sent to the user's cellular telephone or other communications device, telling the user that the selected contact is nearby.
Abstract:
An apparatus, system and method of using RFID systems to help blind and visually-impaired individuals function efficiently in society without the use of canes and/or seeing-eye dogs are provided. Generally, each object may contain an RFID tag affixed thereto. The tag will include information needed to help a blind or visually-impaired individual. The individual may create a profile within which the individual may have indicated the means to use for conveying the information. It is envisioned that the individual will carry a battery-operated RFID reader for reading information from the RFID tags and for conveying the information in accordance with the conveying means indicated in the profile.
Abstract:
A method and system are provided in which average vehicle speeds of tolled and non-tolled road segments between two locations are monitored and saved for reference in providing dynamic adjustment of the toll amount to be charged for use of the tolled segment in order to insure an efficient use of the tolled segment and a determination of an appropriate toll amount to be charged drivers in the tolled segment in view of real time traffic conditions of the tolled and the non-tolled segment. The toll adjustments are determined based upon the difference between actual average speeds of the tolled segment and actual average speeds of the non-tolled segment such that the toll adjustments are dynamic and depend upon real time traffic conditions in both the tolled and non-tolled segments of the travel route.
Abstract:
A clock control method and apparatus are provided employing a clock control circuit which generates an array clock for a memory array from a system clock and a reset control signal. The reset control signal is one of a plurality of input control signals to the clock control circuit. When the system clock is below a predefined frequency threshold, the reset control signal is an array tracking reset signal, wherein the active pulse width of the array clock is system clock frequency independent, and when the system clock is above the predefined frequency threshold, the reset control signal is a mid-cycle reset signal, meaning that the active pulse width of the array clock is system clock frequency dependent. A bypass signal is provided as a third input control signal, which when active causes the clock control circuit to output an array clock which mirrors the system clock.
Abstract:
A method, apparatus, and computer program are provided for remotely controlling the ignition of a vehicle. A variety of conditions can be placed on the vehicle for operation, such as time or geography, from a variety of remote wireless technologies. The ignition control system is also capable of effectively learning safe zones under which the vehicle can operate. Also, the ignition control system can cease operations upon request by an owner or law enforcement.
Abstract:
Customized wait state experiences for an avatar in a virtual universe are provided by determining user alternative wait context preferences, selecting alternative wait state content objects accordingly, creating a wait state context in the virtual universe system using the alternative wait state content objects, and transporting the waiting avatar to the newly created wait state context for the duration of the wait. The custom context can include scenery, sounds, and even information streams and feeds. The avatar is optionally returned to the original context upon an event, such as a customer service representative, being available and ready to interact with the user. Artificial intelligence processes are optionally used to determine probable wait state context preferences for the user. Rewards may be given to the user for waiting, and for completing games or challenges.
Abstract:
Embodiments of the present invention provide an approach for managing distributed application relationships and dependencies, and migration of applications and/or of components within the same or a disparate networked (e.g. cloud) service provider which comprise applications, upstream and downstream data, and upstream and downstream network data connections of networked services. An application dependency management program module (“ADM”), and cloud service migration management program module (“CSMM”) are provided. The ADM, manually or by deductive logic, discovers and manages relationships and dependencies of computer software applications underlying cloud services, state information of the respective computer software applications, as well as upstream and downstream network data connections. The CSMM comprises ensuring that applications are not migrated or modified in a manner that could affect overall service, ensuring that a migration is performed correctly, maintaining a list of service level requirements for monitoring whether those requirements are being met, and performing application migration.
Abstract:
A print compression method and system reduces the amount of space required to print a document such that less paper is used during the printing of a document. A user defines criteria, which is used to perform document compression. However, the document compression only applies to the form of document being printed. This compression does not affect the document being edited.
Abstract:
A system, computer program product and method of correlating safety solutions implemented in a facility with the facility's business climate are provided. The system, computer program product and method are used for designing safety solutions for a facility. While doing so, a user such as a security consultant, may derive a plurality of variables from the safety solutions. The variables are used to calculate a business climate index and a safety level from which a value for a safety/climate coefficient may be calculated. The value of the coefficient indicates whether the threat level is greater than the security level, or whether the security solutions are adequate or too intrusive.