摘要:
Image or graphic elements such as pictures, icons and clip art, are intercepted during transfer from a computer source to a computer destination, such as during a cut-and-paste operation. Embedded text within the intercepted element is optically recognized, and encoded text is extracted. It is determined if the language of the text matches a desired language of the destination. If not, a translation of the optically-recognized text data is performed, and the translated text data is rendered into image data. The image data is then substituted into the intercepted element to overlay or replace the original embedded text, thereby “translating” the image or graphic element to a desired destination language. The modified image or graphic element is then delivered to the destination, such as a document, program, file or data structure.
摘要:
National language support for an application is provided by recording translations of a text string in corresponding different languages in a single property file so as to allow display of the translations in the property file. One of the translations of the text string recorded in the property file is selected for use by an application based on a locale associated with the execution of the application and the selected one of the translations is used in the execution of the application.
摘要:
The invention is an induction heating system comprising a first article having a metallic mesh lining; and a second article having a coil for receiving an alternating electrical current; wherein the coil induces a current in the metallic mesh lining when the second pad is placed in close proximity to the first pad and the coil receives an alternating electrical current; whereby the current induced in the metallic mesh lining causes the metallic mesh lining to generate heat that can be applied to a body through contact with the first article. Additionally, this inventive induction heating system may further comprise a controller circuit in the second article for detecting an eddy current in the coil and operating a switch to turn the alternating electrical current off when no eddy current is detected in the coil.
摘要:
A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
摘要:
An improved solution for allowing role based selective access to a document between a plurality of domains is provided. In an embodiment of the invention, a method for allowing selective access to a document between a plurality of domains includes: obtaining a composed section of the document at a first domain; applying a security policy at the first domain to the composed section of the document; distributing the security policy from the first domain to a second domain, wherein the second domain is different than the first domain; and applying the security policy to the document at the second domain.
摘要:
The invention described is a new and useful process for minimizing the overall rebate a provider disburses to customers when a service level agreement (SLA) breach occurs in a utility computing environment. Specifically, the process compares performance data and resource usage with the SLAs of the customers, and reallocates shared resources to those customers who represent a lesser penalty to the provider in the event of an SLA breach. The process determines which resources, used by customers representing the lesser penalty, are operating below peak capacity. The process then reallocates these under-utilized resources to those customers requiring additional resources to meet SLA thresholds. If all resources are operating at peak capacity, the process reallocates the resources to those customers whose SLAs represent a greater penalty in the event of an SLA breach as compared to those customers whose SLAs provide for a lesser penalty, thereby minimizing the total rebate due upon an SLA breach.
摘要:
A method and system for automatically creating a webpage using a scanned file created from a hard copy. A lookup table correlates a particular text symbol, such as a dollar sign (“$”), to a specific functionality. For example, if a chart in the hard copy has a dollar sign before values in the chart, then the lookup table associates the dollar sign with a pointer to an HTML routine (object) for creating an input box in a webpage. The HTML routines can be used to create new webpages or to modify existing webpages.
摘要:
A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
摘要:
A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
摘要:
An improved solution for allowing role based selective access to a document between a plurality of domains is provided. In an embodiment of the invention, a method for allowing selective access to a document between a plurality of domains includes: obtaining a composed section of the document at a first domain; applying a security policy at the first domain to the composed section of the document; distributing the security policy from the first domain to a second domain, wherein the second domain is different than the first domain; and applying the security policy to the document at the second domain.