Abstract:
A system and method is provided for displaying a selection based action bar to a user that the user is able to use to perform actions using selected data. A user selects one or more displayed selections using a selection device. After the user selections have been made, the system determines which actions can be used with the selected data. Graphical components that correspond to the allowed actions are placed in an action bar and the action bar is displayed proximate to at least one of the user's selections. The action bar is not removed and remains visible as a result of the user scrolling display or performing unrelated actions. Providing a persistent action bar in location proximate to the user's selection helps the user maintain focus on the selected data. In addition, the selection based action bar can be used as a visual placeholder are marking mechanism.
Abstract:
A system and method for managing parallel SCSI device functionality is presented. A user sends a request to a vendor whereby the request corresponds to the user changing the functionality of one of the user's SCSI devices. The vendor generates and sends a key that includes a password and a functionality value to the user. The user extracts the password, extracts the functionality value, and includes them in a command descriptor block. The user includes the command descriptor block in a SCSI command, and sends the SCSI command to the user's SCSI device whereupon the SCSI device validates the password and reconfigures itself based upon the functionality value. The SCSI device returns a message to the user indicating whether the reconfiguring process was successful. In turn, the user forwards the message to the vendor so the vendor may bill the user accordingly.
Abstract:
A method and system for storing a running image of an operating system on a removable operating system module. The module is first inserted into a first computer system. The operating system is installed on the first computer, an execution of the operating system is initiated, and a running image of the operating system is saved to the nonvolatile memory unit of the removable module. The removable module is removed from the first computer system and inserted into the second computer system where the running image of the operating system is loaded to a second memory accessible by the one or more processors included in the second computer system. The operating system is then executed by the processors. A user can update the operating system by connecting to a manufacturer's website and downloading an update or by sending the removable operating system module to the manufacturer for an update.
Abstract:
A system and method provides a detailed edit schedule for a user's recording device, such as a digital video recorder. The detailed edit schedule can be provided over a network by the user's DVR service provider, or can be provided from a third party. The detailed edit schedule describes various segments that occur within the program. This information is used by a digital video recorder to identify program segments of interest to the user. When program segments are identified, the individual segments are recorded rather than recording the entire program. The program segments can also include commercials matching the user's interests. The DVR keeps track of scenes that the user records and sends the information, along with the user's demographic information, back to the DVR service provider for creating reports for sponsors showing which commercials and program segments were watched or recorded by different groups of people.
Abstract:
A system and method that provides a platform-neutral shell application for a user interface is provided. The platform neutral shell application is performed in a way that prevents the user from accessing the underlying operating system. The desktop shell application executes in a middleware application. The operating system residing on the client computer system is booted. The middleware application is loaded on the operating system platform. The middleware application is programmed for the particular operating system being used by the client. The shell application is loaded on the middleware application. The shell application prevents the user from accessing the underlying operating system by maximizing the window in which the shell application is running, pinning the shell application window to the foreground, and removing controls from the desktop window would otherwise allow the user to bypass the desktop shell.
Abstract:
A system and method for mining data from stored telephone conversations is provided. Users request advanced data processing on the recorded data, either on the live data stream or the data in storage. Processes search the recorded data for keywords and phrases that the user provides the PTR. User can also request more sophisticated analysis of the recorded data for deeper contextual meaning of the conversations. Context information may include identifying the users, the locations and times referred to by the users during the conference, etc. Additional searches related to the obtained information are performed and the extracted information is compared to similar information obtained from previous meetings. Voice inflections and any emotional stress present in the voices of the users can also be detected and added to the collected information. Search terms can also be highlighted in the results.
Abstract:
NLS translations can be provided by extracting translatable strings from the management definition object, such as a CIM MOF file, and writing the strings into one or more translation files. A unique identifier is assigned to each translatable string. The identifier is included in the management definition object as well as the various translation files. By creating unique identifiers, a particular translated string can be found in one of the translation files. In this manner, different users can specify different languages. Display text is retrieved by retrieving the identifier located in the management definition object. The translation file corresponding to the user's preferred language is then searched for the translated string. Translated strings can be gathered for display panels when the product is packaged. Translated strings can also be gathered at runtime when called for by a particular display panel or other display object.
Abstract:
A system and method for designating and deleting expired files includes a means for storing expiration dates along with file identification data maintained by the file system. An earliest expiration date is stored in data maintained by the file system pertaining to each directory. In this manner, a check of the directory data indicates whether one or more expired files exist in the directory. The system date is compared to the earliest expiration date for a directory, for example when a “list contents of directory” command is received. If the earliest expiration date is earlier than the system date then a comparison is made with the files in the directory and individual files with expiration dates earlier than the current date are deleted. The earliest expiration date is then update to the correspond to the next earliest expiration date falling after the current date.
Abstract:
A system and method for heuristically optimizing a large set of automated test sets is presented. An automation control engine is used as a front end to a system automation engine. The automation control engine provides a set of input parameters, such as a buffer size and queue size, to the system automation engine. The system automation engine uses the input parameters along with a set of test sequences, to test a system under test. The system automation engine receives output variables from the system under test based upon the test, and sends the output variables to automation control engine. The automation control engine adjusts the input parameter values until the output variables meet one or more performance goals.
Abstract:
A processing unit includes a read-only encryption key. Loader code image is loaded into system memory from non-volatile storage. Loader code image includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.