摘要:
A method and system for managing multiple user locks and deletion requests on a digital video recorder (DVR) is disclosed. Files associated with the DVR can be protected from deletion by allowing users to lock a recorded file utilizing a number of locking strategies. The recorded file can also be locked by multiple users and the recording can be deleted when the users specifically remove the lock. A simpler interface for each user can be provided to prevent other users from deleting recorded files, which have not yet been viewed. Such an approach allows for an administrative override to prevent users from locking recordings and never unlocking in order to prevent the DVR exhausting disk space.
摘要:
Details relating to the operation of a vehicle under adverse conditions are recorded and collected. This data is particularly useful to forestall catastrophic failures, and to provide valuable information for potential buyers of used vehicles. Among the operating conditions that are considered are high levels of air contaminants, operation in extreme hot or cold temperatures, hauling heavy loads, as well as hard braking, turning and acceleration. In addition to the detection and recording of data, prorated maintenance schedules are recalculated and adjusted to accommodate for the operation of the vehicle under these adverse or less than ideal conditions. Typically, the data is stored in the on-board computers present in most vehicles. Periodic off loading of the data to the dealer and service providers is also provided.
摘要:
Methods, systems and program products are provided for monitoring an article for fluid exposure. A plurality of liquid sensors is incorporated into an article beneath an outer layer in a furnishing installation. In response to a fluid-detected or no-fluid-detected state, polling the sensors and sometimes other data, a processor component determines fluid exposure, sensor failure and tampering events and stores event data in a memory. Pairs of the sensors are sometimes provided within expected liquid exposure saturation footprint areas. GPS coordinate, weather condition data and structural component positioning data may also be associated with event data.
摘要:
User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone.
摘要:
Systems, methods, media, and apparatuses for disabling camera functionality in a portable device are disclosed. Embodiments of the method may include establishing a connection with a camera-enabled portable device and transmitting to the portable device a request for permission to disable camera functionality. Embodiments of the method may also include receiving a response from the portable device relating to permission to disable camera functionality. Further embodiments of the method may include, in response to receiving permission to disable camera functionality, transmitting to the portable device a command to disable camera functionality or, in response to receiving an indication that the user refused permission, displaying a notification message. The command to disable camera functionality may include a command to disable camera functionality for a prescribed period, while the portable device is located within a secure geographical location, partially or fully disable camera functionality, and/or other methodology.
摘要:
Embodiments of the invention include a method that comprises receiving a request to record television content on a specified channel for a specified period of time. The method can also include tuning to the specified channel at the specified time, and recording the specified content. The method can also include determining that one or more segments of the television content is corrupted. The method can also include presenting a notification indicating that some of the television content is corrupted, retuning to the specified channel made by the request, and acquiring uncorrupted television content for use in replacing the one or more segments of corrupted television content.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
A method of and system for filtering telephone calls receives a call to a called party from a caller and determines if the called party has an event scheduled. If the called party has an event scheduled, the system determines if the caller is associated with the event. The system completes the call if the caller is associated with the event. The system sends the call to voice mail if the caller is not associated with said event unless the caller is on an exception list associated with the event, in which case the system completes the call. The system completes the call if it is determined that said called party does not have an event scheduled.
摘要:
Disclosed are a method of and system for capturing and updating travel directions in a user's local address book application. The method comprises the steps of determining a current location profile of the user, calculating a user trajectory using that profile and an intended destination, and adding the current location profile and the intended destination into a historical database. The user's local address book is checked for an entry for the address of said intended destination; and if that entry is not in the address book, the entry is created in the address book. That entry is then checked to determine if a direction/map field of the entry contains directions/map information. If the entry does not contain this information, then this information is mined from a network source and added to the address book. This direction/map information is then displayed.
摘要:
This application describes an application of resource unit brokering algorithms, chip management methods for automated brokering, chip management methods for live brokering, and chip allocation methods to the brokering of scalability characteristics of service level management within an enterprise. Typically, the scalability characteristics are derived from known capacity values that are provided by configuration managers. Calculations are made on the capacity values and maximum quantities of the availability resource units are provided to resource brokers for spot or periodic sale and auction to one or more buyer's agents.