摘要:
A multi-provider forms processing system with retry upon failure comprises: a plurality of portable computing devices, a plurality of service providers and a paper-like forms server coupled by a network. The paper-like forms server performs the scheduling, routing, logging, verification and billing for the paper-like processing of compound documents. The paper-like forms server comprises a central schedule, a retry module and a billing module. The multi-provider forms processing system is advantageous because it monitors for failure of transactions, automatically issues a retry or replacement transactions and adjusts the billing for the failed transaction. In particular, the central scheduler tracks and determines when transaction failures occur, and based on these failures revises the billing to users and credits to service providers. The central scheduler also monitors the logs for completion as well as restarts, attempts, failure, reworked and re-performed transaction steps and modifies the bills accordingly.
摘要:
A distributed peer-to-peer document archival system provides the version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems.
摘要:
A distributed peer-to-peer document archive system provides version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems. A “keyring” is an encrypted repository that allows a user to recover and access a user's entire digital archive with a single master key. After the key is created, it does not need to be updated, and can be stored in a safe, safety-deposit box or other secure location. In the event the user's computer is stolen or destroyed, the user need only install the system on a new machine and import the master key. The system will then use that key to browse nearby servers to find and decrypt all files necessary to recreate the full digital archive in its most recent state.
摘要:
In a system for inputting and managing document collections, the order in which documents are presented to the system dictates the organization and hierarchy for the electronically stored document collection. Users can add annotations to documents and collections by writing on a coversheet; the system scans the coversheet, reads the written material, and adds the material to the electronically stored document and/or collection. In addition, in one aspect the invention provides a mechanism for granting different levels of access to different individuals, by generating coversheets that point to the same collection but that provide different levels of access to the collection.
摘要:
A Web agency is interposed between a Web client and a Web server to transform the requests from the Web client prior to sending the requests on to the Web server, to transform the document returned from the Web server prior to sending the document on to the Web client, and to store state information about the user of various Web clients connected to the Web agency. The Web agency can be transparent to, and independent of, the Web client and the Web server. The Web agency might be used as a peripheral agency, a personal service agency or a document server. One such Web agency is a printer server which transparently renders documents. For hypertext documents, the rendering process includes generating machine-readable link references.
摘要:
A system for geographic tagging of network access points comprises a plurality of access points that have been configured to provide location information as part of their beacon. Each access point provides a service set identifier (SSID) that includes an encoded value that represents the location of the access point. The use of an encoded location value in the SSID of the access point is particularly advantageous because it does not require any additional hardware be added to the access point or the portable computing device. Moreover, location can be determined by any portable device without establishing a connection to the access point. The portable computing devices are adapted to receive the beacon, extract the location information from the beacon and decode the beacon. The present invention also includes a variety of methods including: a method for geographic tagging of network access points, a method for encoding a location into a geographic code, a method for decoding a geographic code into a location, a method for encoding height into a geographic code, a method for decoding height from a geographic code and a method for determining the location using a plurality of geographic codes.
摘要:
Attendees or viewers of a presentation provide input marking specific points corresponding to a high level of interest. Received bookmarks are aggregated to generate overall level-of-interest values for various points in the presentation. A graphical depiction of these level-of-interest values is provided; users can navigate using this graphical depiction to find specific parts of the presentation having the highest level of interest or importance. User interface elements provide access to various filtering, display, and configuration options for the graphical depiction.
摘要:
Systems and methods are provided for enabling an application programmer to construct a new application program for communicating with a remote machine. The systems and methods include a parser class that retrieves during runtime a representation of object instances contained in a data file and for enabling the new application program to create in memory a plurality of object instances from the representation of the plurality of the object instances.
摘要:
Method and apparatus for recording associations with logs are described. In one embodiment, the method comprises obtaining a first media identifier corresponding to a first media; accessing a log that contains one or more entries that associate two or more media identifiers with each other; and determining that the first media is related to a second media based on the log indicating that a second media identifier is associated with, but different from, the first media identifier.
摘要:
A method for communicating with a plurality of remote machines, of a plurality of machine types, using a computer system having a memory, includes the steps of constructing within the memory a first plurality of software objects, the first plurality of software objects describing services for one of the plurality of remote machines, establishing communications with the one remote machine, and invoking operations on the one remote machine in response to requests described by services of the first plurality of software objects.