摘要:
The present invention is method and system for delivering road sign content information to a mobile computing device for display to the driver of a vehicle. The system consists of a wireless communication network in communication with a mobile computing device operationally coupled to a dashboard display device or a vehicle head's up display device. The wireless communication network further comprises a plurality of meshed network sign transmitting devices placed along predetermined intervals along the highway. Each sign-transmitting device is capable of transmitting road sign content information to the mobile computing device for display to the driver.
摘要:
Systems and media for sharing session data on a network are disclosed. More particularly, hardware and/or software for sharing user session data between different servers on a network are disclosed. Embodiments include a data processing system for sharing session data on a network, where the network includes an application server and an enterprise server, each providing at least part of an application to a user on the network. In some embodiments, the application server includes a session transport component for recording changes to user session data with the application server and the enterprise server includes a session transport component for requesting updated user session data from the application server. In further embodiments, the enterprise server may establish a user session based on the updated user session data received from the application server.
摘要:
A method and system for managing a multi-focus remote control session (RCS) within a computer system. A unique identifier (UserID) of each user and associated input devices are registered to the RCS. The users have shared concurrent control of a computer screen via the input devices. Responsive to selection of windows within the computer screen by the input devices, concurrently operative focus is provided to each selected window and is specific to the UserID associated with the input device that selected the window. Each selected window having focus may be accessed and manipulated by only the input devices associated with the UserID to which the focus provided to each selected window is specific. The selected windows to which focus has been provided are recording in a computer readable medium in association with the UserID specific to the selection of the windows.
摘要:
A computer implemented method and a computer usable program product for ordering a plurality of instant messages are provided. A data processing system receives at least one incoming instant message. Responsive to identifying the at least one incoming instant message as a response to at least one outgoing instant message originating from the data processing system, the data processing system associates the at least one incoming instant message with the at least one outgoing instant message to form a set of related messages. The data processing system presents the at least one incoming instant message to a first user, wherein a relationship between the at least one incoming instant message and the at least one outgoing instant message is identified.
摘要:
Methods, systems, and media are disclosed for altering the captured input within a digital pen. One embodiment includes capturing the input by the digital pen, wherein the input comprises dots and measurements. Further, the method includes modifying, within the digital pen, the input based on an attribute selected for the input, wherein the modifying produces a modified input. Such modifying may occur by conversion functions, such as to a preferred input format, e.g., Excel®spreadsheet, or a preferred stylistic format, e.g., black 12 point font, wherein the conversion functions modify the input to affect such preferences based on a position of one or more selectors located on the exterior of the digital pen. Finally, the method includes transmitting the modified input to a computer system in wireless communication, for example, with the digital pen.
摘要:
An approach that smoothes a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
A method, system, and computer program product for detecting a tailgate event between two vehicles moving in a forward motion is provided. The two vehicles include a first and second vehicle, one of the two vehicles being an offending vehicle and the other of the two vehicles being an affected vehicle. The system includes a range sensor that determines a distance between the two vehicles. The system also includes a processor that calculates a safe distance range between the two vehicles based upon speed, weight, and/or safe braking range values of one or both of the two vehicles; and compares the distance and the safe distance range. The system also includes a recording device on the affected vehicle. Based upon the comparison, the recording device is activated if the distance is less than the safe distance range indicating an unacceptable distance range value.
摘要:
A method and system for converting a voice communication to a text transcription. The method comprises receiving by a computing system in a control command center, a first transmission identifier from a vehicle. The first transmission identifier identifies the vehicle. The computing system receives voice communication data for the vehicle from a user in the control command center. A software application within the computing system converts the voice communication data into text data. The computing system transmits the voice communication data, a first copy of the text data and a second transmission identifier to the vehicle. The second transmission identifier identifies the control command center. The computing system receives a confirmation request from the vehicle to confirm if the text data comprises correct information related to the voice communication data. The confirmation request is displayed on a video monitor system. The computing system transmits confirmation data to the vehicle.
摘要:
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
摘要:
A method, system and computer program product for maintaining federated name context bindings in a name space is disclosed. A reference within a first name space of a first system is bound with a durable subscription to a second name space on a second system. The binding of the first reference to the second name space is administered with a graphical user interface. A durable subscription is established with the second system for the binding utilizing communication with the second system over a network. Notification of a change affecting the bindings from the second system is received and the reference is rebound in the first name space.