Abstract:
A method and system to monitor steps in a business process or complex tasks are described. The method may include displaying a graphical step monitor in a graphical user interface of an application, using a plurality of graphical elements indicating statuses of a plurality of steps in a sequence of steps in a process. The method may include receiving update information related to one or more steps of the plurality of steps. The method may also include updating the statuses of the steps for which the update information was received and as indicated by the plurality of graphical elements. Furthermore, the method may include displaying a description region including a further plurality of graphical elements and texts, the texts describing the steps, the statuses of which are indicated by the graphical elements.
Abstract:
A networked computer arrangement and method in which a manufacturer or service provider may communicate to a plurality of traders the items, including goods and/or services, which may be available for purchase, the quantities of those available items, and any other conditions to be met for the purchase of the available items. Traders may apply guest bidder profiles or entitlement schema to the available goods lists to produce offerings for a plurality of guest brokers. Only bid-relevant product information is presented to each guest broker as needed in order to protect the offering party's overall position on the offered good(s). Guest broker profiles or entitlement schema may be based on perspective contractual arrangements between potential brokers, traders, and a manufacturer or service provider. Offerings are presented to the guest brokers, who are restricted from participating in the bidding process.
Abstract:
A system for providing a mobile application includes a Mobile Subscriber Detection Authorization and Verification System (MSDAVS), to request and receive confidential information from a confidential information owner relating to a user who opted-in to a mobile service application, and to communicate the received confidential information to a mobile application service provider. The MSDAVS can include an opt-in database, to store opt-in or registration data of the opted-in users of the mobile service application and a service policy database. The mobile application service can be a mobile traffic alerting service, the confidential information owner a telephone number database of one of a wireless carrier or a telephone number database operator, and the requested confidential information a list telephone numbers of opted-in users in an alert area, defined by the mobile traffic alerting service.
Abstract:
A pluggable security device for protecting an electronic device, such as a laptop, is disclosed. The pluggable security device has a battery, a siren, and an optional accelerometer. The security device is triggered by unplugging from the electronic device, or by sensing acceleration, or by disconnecting the electronic device from AC power or from a network. Once the security device is triggered and its internal siren is activated, it can only be deactivated by reinserting the pluggable security device into the electronic device it has been disconnected from and by entering a password in the electronic device.
Abstract:
An apparatus, system and method are presented for scanning items presented to an assisted hybrid optical code scanner where the scanner includes a handheld imaging scanner located on the customer side of the hybrid scanner. When docked with the hybrid scanner, the handheld imaging scanner is used with a fixed laser scanner to read optical codes. When undocked, the handheld imaging scanner is used to scan items not easily presentable to the hybrid scanner.
Abstract:
A self-checkout system, particularly for retail areas of constrained floor space, has a small to zero footprint while being fully functional. In one form, the self-checkout comprises a unit mountable to a wall, pillar, or other support. In another form, the self-checkout has or is part of a columnar support. The self-checkout system has security in the form of video and weight verification. A visual and/or audio indicator provides indicia of modes of use of the self-checkout. The self-checkout further includes an interactive customer interface terminal, a scanner, and a scale. The self-checkout provides an open visual area that allows easy viewing by store personnel of transactions being performed on the self-checkout system.
Abstract:
A method of reducing the risk of fire or containing fire in a laundry appliance and an appliance incorporating said method. The appliance includes a sensor means capable of sensing an abnormal fault condition indicative of an increased fire risk or a fire within the appliance drum. In response to sensing the abnormal fault condition, the appliance controller enters a fire containment cycle which rotates the drum at a tumbling speed.
Abstract:
A passive traffic alerting method includes: identifying traffic events from analyzing traffic information; selecting an identified traffic event based on a location of a mobile communicator; and alerting the mobile communicator with a passive message regarding the selected traffic event without prompting the mobile communicator to launch an application on a mobile communication device. In some cases a user-zone and an event zone is selected and the user gets alerted when his user-zone overlaps with the event-zone. The alert can contain hierarchical messages. The method may include: determining an alert zone by rating a traffic incident and overlaying maps of the incident, the cell-phone towers, and the corresponding road network; acquiring user identification of cell phone users from data from cell-phone towers in the alert-zone; identifying subscribers from acquired cell-phone tower data; matching subscribers with alerts in appropriate formats; and sending the appropriate alert messages to cell phones of identified subscribers.
Abstract:
A computer system for a manufacturer or service provider to communicate goods or services which are available for bidding by bidders that provides collected bids in a bid database, the bids each having an associated seal status indication field queries the bid database for unsealed bids which match parameters of a Broker Profile Matrix associated with a trader console, the trader console comprising an intermediary third party user console communicably disposed between a bidder user console and broker user console, operates to buy products or services from the broker user console and to resell the bought products and services to the bidder user console; responsive to finding matching unsealed bids, delivers the matching unsealed bids to the trader console wherein delivery of delivery of sealed bids to the trader console is prevented; and displays on the trader console the delivered matching unsealed bids to a trader console user.
Abstract:
A passive traffic alerting method includes: identifying traffic events from analyzing traffic information; selecting an identified traffic event based on a location of a mobile communicator; and alerting the mobile communicator with a passive message regarding the selected traffic event with or without prompting the mobile communicator to launch an application on a mobile communication device. In some cases a user-zone and an event zone is selected and the user gets alerted when his user-zone overlaps with the event-zone. The alert can contain hierarchical messages. The method may include: determining an alert zone by rating a traffic incident and overlaying maps of the incident, the cell-phone towers, and the corresponding road network; acquiring user identification of cell phone users from data from cell-phone towers in the alert-zone; identifying subscribers from acquired cell-phone tower data; matching subscribers with alerts in appropriate formats; and sending the appropriate alert messages to cell phones of identified subscribers.