摘要:
A method for determining storage requirements includes receiving a plurality of files to be stored, classifying the plurality of files based on business value, classifying the plurality of files based on contractual obligations, classifying the plurality of files based on empirical characteristics, and determining a storage medium based on the classified business value, classified contractual obligation, and classified empirical characteristics. The method further includes determining storage requirements based on the determined storage mediums.
摘要:
A method for determining storage requirements includes receiving a plurality of files to be stored, classifying the plurality of files based on business value, classifying the plurality of files based on contractual obligations, classifying the plurality of files based on empirical characteristics, and determining a storage medium based on the classified business value, classified contractual obligation, and classified empirical characteristics. The method further includes determining storage requirements based on the determined storage mediums.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
A system and method for automatically controlling and adjusting the audio profile of pervasive devices, like cellular phones, within controlled zones. The system and method utilizes RFID and sensors to geographically control and adjust the audio profiles based on set criteria, such as default settings and hierarchy. The audio profiles may be controlled or adjusted based on a control zone profile settings or based on the profile settings of other individual devices within the same control zone. The zones may be adjusted due to the hierarchy or rank of devices present within the zone.
摘要:
A method for the enhancement of a call on-hold operation by the utilization of on-hold calling party feedback information, wherein the method comprises the steps of initiating a primary call from an operator of a communication device, receiving the primary call at a call center, and placing the primary call received at the call center from the communication device in a primary on-hold status state, and placing the on-hold received primary call in an incoming call queue at the call center. Further, the primary call is placed in a secondary on-hold status by the actions of the communication device in order for the communication device to receive a secondary call, the primary call's position in the call queue is maintained, and a response from the communication device is transmitted to the call center upon the call center's suspension of the on-hold status of the primary call.
摘要:
Disclosure is related to idea tracking and management. The disclosure invokes a method and system for displaying and tracking ideas from a database. The invention accesses a data repository via a data connection, displays the data from the data repository, and allows the displayed data to be characterized as scheduling data, statistical data, action items, current status, and listing of individuals.
摘要:
Systems, methods and media for storing information in a common information store of a global file storage system are disclosed. Embodiments may include a common information store including a communications module to send and receive information to and from one or more servers in the global file storage system and a pattern database to store a plurality of subfiles for the global file storage system, where each subfile may include an indication of a recognizable pattern. The common information store may also include a common information store manager to analyze newly stored files and to reconstruct stored files of the global file storage system. In a further embodiment, the common information store manager may further comprise a pattern analyzer sub-module to analyze a file for recognizable patterns and to compare the recognizable patterns to the subfiles stored in the pattern database.
摘要:
A method for providing adaptive, selectable print options. The method includes parsing a document into logical sections, each of the logical sections identified by a reference. The method also includes creating a print map of references identified as a result of the parsing, displaying the print map along with selectable print options, and executing a print operation in response to a selected print option. The selected print option specifies a reference from the print map. A logical section associated with the reference is transmitted to a printer for printing.
摘要:
A method for digital rights management includes receiving a selection input from a user, associating a customer number with a file based on the selection input, embedding the customer number and a file identifier associated with the file in the file, and sending the file with the embedded customer number and file identifier to the user. One embodiment includes receiving a customer number change request, revising the central database in response to the customer number change request, determining a new customer number responsive to the customer number change request, and embedding the determined new customer number in the file. Another embodiment includes receiving an authorization request associated with a file, determining an authorization based on the central database and authorization request, and sending an authorization notice response to the determined authorization.
摘要:
The “identity authentication program” (IAP) creates a custom set of authentication questions in response to a user request to have a user password reset. The IAP accesses a record located in a data source containing information related to the user's recent computer activity and generates an authentication question and a corresponding answer based on the record. In order to reset a user password, the user must correctly answer a designated number of questions from the custom set of authentication questions. In a preferred embodiment, the IAP bases authentication questions on recent e-mail messages sent by the user. Because the questions are generated at the time of the user's request, the answers are unique and can not be memorized. Because the questions are based on recent activities of the user, the questions are hard to guess by an unauthorized person.