摘要:
An adaptive system enables providers to customize educational objects and support services to maximize user engagement. The system is a self-service system for education for providers that includes a learning environment with interfaces for stakeholders, metrics for measuring the level of user engagement, and a customizable service configured to maximize user engagement. The system may operate in many domains, such as higher education, retail, government, test preparation and certification services, negotiations, and others.
摘要:
This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user's files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
摘要:
This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user's files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated.
摘要:
This invention involves using an alternative driver that is located in a specified server on the Internet. For example, a person could take a floppy disk that is not compatible with their computer and transform it over the Internet through an alternate compatible driver. In order to do this, a special universal bit reader is located within the server. A second variant is that a bit reader would be located in a user's computer and it would be connected to a global server. So, all the files could be accessed through the Internet. This would allow to read and write data from/to a disk that was formatted on a different operational system. In order to solve a problem how to run applications that are not compatible to the operational system on a computer where this disk was inserted, the invention teaches the following approach. A universal driver on the server uses a program that looks for similar applications in a database server that contains a database of applications from different operational systems. The universal driver can identify what programs in the application are needed either reading names of programs on the disk or it can read a special table in which applications point to programs in different operational systems.
摘要:
A technique for providing flexible communication device usage attribution is provided. Identification information of a user of a communication device is received from the communication device at a primary service provider. It is determined if the user of the communication device is the owner of the communication device at the primary service provider. Usage information is attributed to an account of the owner on the primary service provider when the user is identified as the owner. Usage information is attributed to an account of the user when the user is not identified as the owner and the user is subscribed to one of the primary service provider and a service provider associated with the primary service provider.
摘要:
A mechanism is provided for allowing a user to manipulate the behavior of an electronic device by training the device to react to user-taught gestures in a certain manner. A user performs a characteristic gesture with the electronic device and/or changes the device position. When a user gesture movement is detected, a determination is then made as to whether the device behavior requested by the user movement was correctly presented to the user. If the device behavior is not correctly presented to a user, the user is allowed to train the electronic device to react to a user gesture movement by associating the user gesture movement with a particular device behavior.
摘要:
A system and method that provides data messages to a passive device. A passive device, for example watch, is registered together with the telephone number of a cellular telephone of a subscriber to the data message service. Since the cellular telephone periodically transmits a beacon signal, the wireless network knows its cell location. Accordingly, the system determines the cell location of the cellular telephone and establishes a communication of the subscribed data to the watch via the local cellular provider for the same cell location as that of the subscriber's cellular telephone.
摘要:
A system and method that provides data messages to a passive device. A passive device, for example watch, is registered together with the telephone number of a cellular telephone of a subscriber to the data message service. Since the cellular telephone periodically transmits a beacon signal, the wireless network knows its cell location. Accordingly, the system determines the cell location of the cellular telephone and establishes a communication of the subscribed data to the watch via the local cellular provider for the same cell location as that of the subscriber's cellular telephone.