摘要:
A method for storing data associated with a video game is provided. The method includes receiving position data indicative of a position of a wireless input device over a time interval at a video game controller. The method further includes generating a plurality of digital images associated with the video game over the time interval based on the position data, utilizing the video game controller. The method further includes storing a file having the position data and the plurality of digital images in either a central server or the wireless input device, utilizing the video game controller.
摘要:
Presently disclosed herein are a method, system, and computer-readable medium for managing a user-defined genre-based password. In one embodiment, the method includes steps for creating a genre-based tree that can be used to prompt a user in remembering a user-created password. In an exemplary embodiment, the method for creating the password includes the steps of: presenting, to a user, a first question; receiving, from the user, a first input answer to the first question; presenting, to the user, a subsequent question that is based on the first input answer to the first question; receiving, from the user, a subsequent input answer to the subsequent question; and based on the first input answer and the subsequent input answer, creating a pathway of nodes, in a genre-based tree, to a correct end-node, wherein content of the correct end-node, which is based on the subsequent input answer, provides a basis for a user-defined password, and wherein the content of the correct end-node prompts the user to remember the user-defined password.
摘要:
A method, system or computer usable program product for managing digital radio transmissions including automatically selecting a group of radio receiving units for receiving a set of digital radio transmissions based on a set of factors previously stored about users associated with the group of radio receiving units, displaying a proposed group of radio receiving units as the group of selected radio receiving units, accepting user input to confirm the proposed group of radio receiving units as the group of selected radio receiving units, and transmitting the set of digital radio transmissions by a radio transmitting unit only to the group of selected radio receiving units.
摘要:
During performance of a process task, a journaling program is used to record keystrokes and mouse activities. A journal of the process task is then sent to a parser for conversion to a markup language, such as electronic business Extensible Markup Language (ebXML) or Data Center Markup Language (DCML). The markup language version of the task is then validated against business rules, operating policy, etc., providing code by which the task can be automatically performed.
摘要:
Counterfeit electronic devices are detected by comparing a thermal profile of the counterfeit device and an authentic device under predetermined operating conditions. A thermal profile for an authentic electronic device is recorded executing an instruction set over time, such as with static infrared images at predetermined times, video infrared images over a predetermined time period or temperature measurements made at predetermined locations of the electronic device. In one embodiment, a thermal profile indicates that a processor device has been used in the place of a field programmable grid array device. In an alternative embodiment, an electromagnetic profile is detected instead of or in addition to the thermal profile. The electromagnetic profile of an authentic device is used to create an expected profile for comparison with an electromagnetic profile of electronic devices under test.
摘要:
The dynamic workflow documentation system creates an instance of a workflow program, extracts metadata properties from the workflow programs, records the metadata properties, notifies the workflow manager that a new instance of the workflow program has been created. Security and auditing functions of the dynamic workflow documentation system ensure that workflow programs execute according to the workflow requirements.
摘要:
The present invention provides a method and apparatus for conducting a confidential search. The method comprises accessing one or more terms associated with one or more nodes of a network, encrypting the accessed one or more terms and receiving an encrypted search term from a user. The method further comprises comparing the received encrypted search term with at least a portion of the encrypted accessed terms and providing a result of the comparison to the user.
摘要:
In an embodiment of a method of establishing a computer-based communication session involving a user of a computer, notification may be received from the user of a desired participant and a desired communications application for the session. A participant identifier effective to identify the desired participant to the desired communications application may then be retrieved, and the retrieved identifier may be provided to the communications application. An embodiment of a system for computer-based communications includes means for receiving notification of a desired participant in a communications session and a desired communications application for the session, means for retrieving a participant identifier appropriate to identify the desired participant to the desired communications application, and means for providing the retrieved participant identifier to the communications application. The means for receiving notification, means for retrieving a participant identifier and means for providing the identifier may include a communications aggregation program.
摘要:
Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories.
摘要:
A method for managing a user interface desktop workspace is provided. The method includes selecting applications in a desktop environment rendered in memory of a computer. The method also includes querying each of the selection applications, capturing through the querying, attributes for each of the selected applications and writing references to the selected applications and corresponding ones of the captured attributes to a workspace profile. The method further includes generating a workspace object from the workspace profile. Finally, the method includes configuring the workspace object in the desktop environment to respond to activation by loading each of the applications in the workspace profile using the corresponding ones of the captured attributes in the workspace profile.