摘要:
Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon.
摘要:
A survey document is provided on a server, for delivery to a client on a network, having questions and potential answers in a format defining branches of the questions. Programming instructions are also provided on the server for delivery to the client on the network. The instructions are for causing the client to render questions on a user interface from the survey document. The questions initially rendered include a first one of the questions. The instructions are also for causing the client to branch to and render on the user interface second or third ones of the questions responsive to the survey document and an answer received for the first question.
摘要:
The creator or author of the Web document or page at the Web site source of the page is enabled to prioritize all of the hyperlinks to other Web documents embedded in the Web page in order to optimize the needs such as the business needs of the host. The prioritization is applied in the determination of the order in which the Web documents linked to the activated embedded hyperlinks in the Web document are to be accessed. The system is implemented through the inclusion of a hypertext markup language tag associated with each of the prioritized hyperlinks indicative of the priority level of the associated hyperlink. The implementation for designating a priority level for each of the hyperlinks may be enabled to change any previously designated priority levels for said hyperlinks. Such changes in any previously designated priority levels could be made applicable to the priority levels in previously distributed copies of said Web document.
摘要:
A method and apparatus for discovering services in a service registry. When an enterprise service bus receives a service request, the enterprise service bus determines whether the service name in the request exists in a service registry. If not, the enterprise service bus parses the service name into constituent words, obtains synonyms for each constituent word, and constructs new service names using the synonyms in the same word order as the constituent words in the service name. The enterprise service bus determines whether the constructed service names exist in the registry. If so, the enterprise service bus obtains an address of a service provider application associated with the constructed service name in the registry and sends a request for the service matching the constructed service name to the service provider application.
摘要:
The user requesting the search is enabled to analyze the list of excessive hits in a manner organized through a Web content manager on the user's display screen, and reduce the excessive hits through the elimination of extraneous domains or subdomains captured by the search.An implementation for reducing an excessive number of hits in a search result received at one of the receiving display stations on the Web comprising conventional means for displaying at said receiving display station, Web documents received from sources on the Web, and means for conducting keyword searches on the Web. There are means associated with the receiving display stations for displaying the number of Web documents hit by said keyword searches, together with means, responsive to an excessive number of Web document hits, for enabling a user to display a hierarchical level of the domains of the Web documents hit by said searches with a count of the number of hits for each domain, and means enabling the user to interactively eliminate selected domains to thereby reduce the excess number of hits in said search.
摘要:
Systems, methods and media for managing software defects by aggregating potential software defect information from a plurality of user computer systems are disclosed. Embodiments may include receiving a plurality of software state logs each from an originating user computer system, where each software state log is associated with a potential software defect of an application executing on its originating user computer system and each software state log includes software state information associated with its originating user computer system. Embodiments may also include storing the received software state logs in a defect repository and analyzing the software state information of the stored software state logs to detect patterns in the software state information. Further embodiments may include verifying that a potential software defect associated with a software state log is a defect and transmitting a verification of the software defect to the particular user computer system.
摘要:
An apparatus, method, and system for determining the shape of a three dimensional object. In a preferred embodiment, the apparatus includes an array of sensors and elastic connections between the sensors within the array. When placed over a three dimensional object, the array of sensors deforms to conform to the surface topology of the three dimensional object. The sensors are connected to a data processor in which the data from the sensors is taken to construct a three-dimensional representation of the actual physical three dimensional object.
摘要:
Selecting the optimum service provider for each telephone call made so as to minimize the cost of each call. Each of the service providers is likely to be charging fees for calls at different rates determined by the measures of different sets of predetermined calling conditions that the provider sets up. An implementation for initiating a telephone call from the calling station to a selected receiving station, determining the measures of the predetermined calling conditions, determining the optimum service provider charging the minimum fee for the telephone call based on the determined measures of said service provider's set of predetermined calling conditions and routing the initiated telephone call to said receiving station through said optimum service provider.
摘要:
A method, system, apparatus and computer program product are disclosed for screening electronic messages, wherein a sentry determines whether electronic messages to a receiver include respective passes from the receiver. Responsive to such a message having a pass, the receiver is notified about the message. Responsive to the message not having a pass, a notice for the sender is generated about a pass for the message. Ultimately the pass is generated and sent, on behalf of the designated receiver of the message, to the sender. Unless the sender of the electronic message receives the pass which was returned to the sender by a screening agent for the designated receiver, and the sender returns the pass to the receiver, then the screening agent discards the message and the receiver will not ever be burdened with the message. Thus, if the sender's message has an invalid electronic message reply address, as is frequently the case for mass marketing senders, the sender will never receive the pass, and the receiver's screening agent will discard the message. Both the pass generation and sender notification may be without regard for the identity of the sender. That is, responsive to every message for which the screening agent has not already generated a pass, the recipient's screening agent automatically generates a pass and sender notification. Therefore, no significant burden is placed on the designated recipient even to merely set up rules for screening messages.
摘要:
A high performance voice transformation apparatus and method is provided in which voice input is transformed into a symbolic representation of phonemes in the voice input. The symbolic representation is used to retrieve output voice segments of a selected target speaker for use in outputting the voice input in a different voice. In addition, voice input characteristics are extracted from the voice input and are then applied to the output voice segments to thereby provide a more realistic human sounding voice output.