Abstract:
The dynamic workflow documentation system is a computer implemented process comprising the following steps: The dynamic workflow documentation system starts a workflow manager program, a class loader program in a computer memory and creates an instance of a workflow program in the computer memory. The dynamic workflow documentation system extracts metadata properties from the workflow program and records the metadata properties in the memory. The dynamic workflow documentation system notifies the workflow manager that a new instance of the workflow program has been created and repeats the steps of creating an instance of a workflow component program, extracting metadata properties, recording the metadata properties and notifying the workflow manager for all workflow components associated with the workflow program. Security and auditing functions of the dynamic workflow documentation system ensure that workflow programs execute according to the workflow requirements.
Abstract:
A method for managing a user interface desktop workspace is provided. The method includes selecting applications in a desktop environment rendered in memory of a computer. The method also includes querying each of the selection applications, capturing through the querying, attributes for each of the selected applications and writing references to the selected applications and corresponding ones of the captured attributes to a workspace profile. The method further includes generating a workspace object from the workspace profile. Finally, the method includes configuring the workspace object in the desktop environment to respond to activation by loading each of the applications in the workspace profile using the corresponding ones of the captured attributes in the workspace profile.
Abstract:
A method of and system for preventing viewing by bystanders of information displayed on a display screen displays simultaneously an active image and a second image. The display screen has a first viewing angle and a second viewing angle. The first image is visible from the first viewing angle and invisible from said second viewing angle. The obfuscating image is invisible from the first viewing and visible from the second viewing angle. The system simultaneously manipulates the first and obfuscating images in response to input by a user.
Abstract:
Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories.
Abstract:
A method, system, apparatus, and computer program product for processing e-commerce information are presented. A business entity may transfer e-commerce agreements through an electronic marketplace. The business entity retrieves dependency information about a commercial transaction from an e-commerce agreement. The business entity incorporates the dependency information, e.g., dates, costs, deliveries, etc., as dependency relationships within a project model that represents a project for a product or service for sale by the first business entity. User input is received for manipulating a scheduling dependency relationship within the project model while constraining the user input to ensure that another type of dependency relationship is not incompatible with modifications to the scheduling dependency relationship.
Abstract:
A method of and system for preventing viewing by bystanders of information displayed on a display screen displays simultaneously an active image and a second image. The display screen has a first viewing angle and a second viewing angle. The first image is visible from the first viewing angle and invisible from said second viewing angle. The obfuscating image is invisible from the first viewing and visible from the second viewing angle. The system simultaneously manipulates the first and obfuscating images in response to input by a user.
Abstract:
A method to improve polling accuracy in RFID systems is disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers.
Abstract:
The invention is a computer-implemented workflow application comprising one or more workflow components, each workflow component comprising an object having a metadata property; a workflow program comprising workflow components connected together to execute an operational workflow; a class loader program operable to introspect the objects and extract the metadata properties when each workflow component of the workflow program is executed, and store the metadata properties in a memory; and a workflow manager program operable to analyze the metadata stored in the memory and provide requested status information.