摘要:
A method and an associated system for monitoring and instantly identifying faults in a data communication cable are disclosed. A fault monitoring program learns a reference data traffic pattern communicated through the data communication cable by reading inputs from a sensor. The reference data traffic pattern is stored and is used for determining normalcy of data traffic through the data communication cable. The fault monitoring program monitors for a fault in a data traffic, and, if a fault is detected, activates a fault indicator sending out fault signals to notify users of the fault. If the fault is not recovered within a predefined recovery period, the fault monitoring program deactivates the fault indicator and shuts down a power source for later use of the data communication cable.
摘要:
A method and an associated system for monitoring and instantly identifying faults in a data communication cable are disclosed. A fault monitoring program learns a reference data traffic pattern communicated through the data communication cable by reading inputs from a sensor. The reference data traffic pattern is stored and is used for determining normalcy of data traffic through the data communication cable. The fault monitoring program monitors for a fault in a data traffic, and, if a fault is detected, activates a fault indicator sending out fault signals to notify users of the fault. If the fault is not recovered within a predefined recovery period, the fault monitoring program deactivates the fault indicator and shuts down a power source for later use of the data communication cable.
摘要:
A method and system are provided in which a display screen of an electronic device such as a laptop computer is double-hinged to a base or keyboard unit in such a manner as to allow the display screen to be opened while the bottom portion of the display screen is free to rotate toward a user to enable the user to view the display screen when little or no space is available at the rear of the display screen. A double-hinged arrangement including an extendable coupling is provided at the sides of the laptop such that there is access to the keyboard when the display screen is rotated upwardly and the bottom of the display screen is moved toward the user.
摘要:
A method for creating a read-only shopping token that is a digitally signed record of the contract between the buyer and the seller. The shopping token starts as an XML file containing the seller's personal information, information regarding the goods purchased, and the seller's terms for the transaction. The buyer adds his personal information to the XML file. The buyer and seller are both given an opportunity to review and modify the terms. When the buyer and seller agree to the terms, they both digitally sign the XML file. Once both the buyer and the seller have digitally signed the XML file, the XML file is converted into a shopping token. The shopping token is in a format such that a user cannot modify or copy-and-paste the subject matter of the shopping token. Any attempt to alter the shopping token renders the digital signatures invalid.
摘要:
A method, apparatus, and computer program are provided for remotely controlling the ignition of a vehicle. A variety of conditions can be placed on the vehicle for operation, such as time or geography, from a variety of remote wireless technologies. The ignition control system is also capable of effectively learning safe zones under which the vehicle can operate. Also, the ignition control system can cease operations upon request by an owner or law enforcement.
摘要:
A system, computer program product and method of correlating safety solutions implemented in a facility with the facility's business climate are provided. The system, computer program product and method are used for designing safety solutions for a facility. While doing so, a user such as a security consultant, may derive a plurality of variables from the safety solutions. The variables are used to calculate a business climate index and a safety level from which a value for a safety/climate coefficient may be calculated. The value of the coefficient indicates whether the threat level is greater than the security level, or whether the security solutions are adequate or too intrusive.
摘要:
A system, a method, and a service that monitors the time a space is occupied. The time period for occupation of the space may be prepaid or the fees may accumulate while the space is occupied. The system detects when an occupant enters the space and starts a timer. The system further provides a user interface whereby a user may prepay for an allotted period of time or may accumulate time in the space and then be billed later. Identifying information about the occupant may be acquired by an imaging device. The imaging device may further poll the space to determine if and when the occupant departs from the space. Identifying information may also be acquired through a user interface in which a user may enter identifying information, such as a credit card, a license number, a VIN, a driver's license, etc. The fact that the space has been occupied, the identifying information, and any prepaid amounts are transmitted via a communication device to a control station. The control station may monitor events in the space such that when an occupant departs the space, the timer is reset. Alternatively, the control station may issue fees for use of the space, may issue penalties or even call for removal of the occupant from the space if occupation of the space exceeds the amount of time purchased or poses an abuse of the privilege of using the space.
摘要:
A print compression method and system reduces the amount of space required to print a document such that less paper is used during the printing of a document. A user defines criteria, which is used to perform document compression. However, the document compression only applies to the form of document being printed. This compression does not affect the document being edited.
摘要:
Systems, methods and media for performing auto-migration of data among a plurality of memory devices are disclosed. In one embodiment, memory access of application program data is monitored for each of one or more application programs. The data may be stored in one or more of a plurality of memory storage devices, each with its own performance characteristics. Monitored access is evaluated to determine an optimal distribution of the application programs data, typically stored in files, among the plurality of memory storage devices. The evaluation takes into account service level requirements of each application program. Periodically, data may be automatically transferred from one memory storage device to another to achieve the determined optimal allocation among the available memory storage devices consistent with service level requirements.
摘要:
A method and system are provided in which a display screen of an electronic device such as a laptop computer is double-hinged to a base or keyboard unit in such a manner as to allow the display screen to be opened while the bottom portion of the display screen is free to rotate toward a user to enable the user to view the display screen when little or no space is available at the rear of the display screen. A double-hinged arrangement including an extendable coupling is provided at the sides of the laptop such that there is access to the keyboard when the display screen is rotated upwardly and the bottom of the display screen is moved toward the user.