Abstract:
A voice internet system comprises voice websites and internet broadcasting devices. When an internet broadcasting device logs into a voice website through Internet, it will broadcast voice news headlines. When a news headline is being broadcasted, pushing a play button on a control panel on the internet broadcasting device or giving a voice command, the corresponding news content under the headline will be broadcasted with voice. After completion of broadcasting the news content, the remaining headlines will be broadcasted.
Abstract:
Methods, systems, and computer program products for generating a search of attachments are described. A search request based on a business template is obtained, the business template comprising a node containing an identity of an entity to which the attachment is attached and an attachment sub-node. A search request based on an attachment template is obtained, the attachment template comprising a root node referring to the attachment sub-node of the business template and a node containing an identity of the attachment. A search is performed based on the business template and the attachment template.
Abstract:
A method for synthesizing a medical grade biodegradable material, poly(lactic-co-glycolic acid), copolycondensation of lactic acid and glycolic acid catalyzed by biomass creatinine. The present invention uses commercialized creatinine (a type of biomaterial organic guanidine compounds—the arginine metabolite creatinine (CR) in human body) as the catalyst and industrial lactic acid (LA, mass content 85%, aqueous solution) and glycolic acid (GA, 95%) as the monomer to synthesize the high biosafety of medical poly(lactic-co-glycolic acid) in terms of two steps polycondensation without solvent. The method of the present invention has the following characters: green technology is used, raw materials required are low in costs, operation is simple and convenient, and it is easy for industrialization; the catalyst, creatinine, used in the invention has high biocompatibility and biosafety, and no cytotoxicity; the poly(lactic-co-glycolic acid) synthesized is free of any metal and other toxic residues; Further, the molecular weight distribution for all synthesized products is narrow and the molecular weight is controllable within 1.8-17.7×104; and the poly(lactic-co-glycolic acid) synthesized is suitable for use as implantable material for hard tissue repair, surgical sutures, and the carrier for targeting drugs and controlled release drugs.
Abstract:
A Cloud federator may be used to allow seamless and transparent access by a Cloud Client to Cloud services. Federation may be provided on various terms, including as a subscription based real-time online service to Cloud Clients. The Cloud federator may automatically and transparently effect communication between the Cloud Client and Clouds and desired services of the Clouds, and automatically perform identity federation. A Service Abstraction Layer (SAL) may be implemented to simplify Client communication, and Clouds/Cloud services may elect to support the SAL to facilitate federation of their services.
Abstract:
Generally, this disclosure describes a method and system for automated check-out and drop-off return of products using a mobile device. A method may include purchasing at least one product of a plurality of products wherein each product is located at a respective associated product location in a store that sells the plurality of products and a point of sale of each purchased product corresponds to the respective associated product location.
Abstract:
A printed circuit board assembly (PCBA) includes a printed circuit board (PCB) with through holes, a supporting member standing on the PCB adjacent to the through holes, and an electronic component mounted on the PCB is provided. The electronic component includes a component body and a plurality of conductive leads. Fixing ends of the conductive leads of the electronic component is received in the though hole and electrically and mechanically fixed to the PCB. The component body of the electronic component is supported by the supporting member.
Abstract:
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
Abstract:
Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and a token extractor. The token extractor may be coupled to the camera and configured to analyze an image, captured by the camera. The captured image may contain a barcode and may be displayed on a client device in response to a request of a server for access to a resource. The barcode may contain a token, which may be extracted by the token extractor to be used to gain access to a resource requested from a server. Other embodiments may be described and/or claimed.
Abstract:
Technologies for establishing client-level web application runtime control using a computing device include receiving application code for a browser-based application from a web server and generating machine-executable code and an access control map for the application code. The computing device receives application security information associated with the application code from local and/or remote security applications and performs a security assessment of the application code based on the application security information and the access control map. Further, the computing device establishes a runtime security policy for the browser-based application and enforces that policy.