摘要:
Embodiments of the present invention provide a method, system and computer program product for a low power document editing mode for mobile computing devices. In an embodiment of the invention, a battery powered computing device can be configured for power optimized document editing, the computing device. The device can include a central processing unit (CPU), both coupled to a battery, memory, fixed storage and a display within a single computing case. The device also can include a primary personal computing operating system and also an auxiliary low-power consumption operating system each stored in fixed storage, each including a configuration to access an editable document in the fixed storage. Finally, the device can include a boot read only memory (ROM) programmed to selectively bootstrap into either the primary personal computing operating system or the auxiliary low-power consumption operating system.
摘要:
A method and system in accordance with the present invention modifies a document or a section of a document to be printed, based on available ink levels in a printer. The modification process may be carried out automatically, or may be user-selected and defined, in order to maximize the quality of the printer output.
摘要:
A method for determining availability of a conference room is disclosed. The method comprises transporting a mobile device into a conference room by a user wherein the conference room has an RFID tag, a conference room number, and is identified in a reservation system. The method further includes utilizing the mobile device to retrieve a conference room number by scanning the RFID tag within the conference room. Next, the mobile device is utilized to query the reservation system. The method further comprises determining whether the conference room is currently reserved. Next, the mobile device is utilized to alert the user if the reservation system indicates that the conference room is currently reserved.
摘要:
A method, system, and computer program product for detecting a tailgate event between two vehicles moving in a forward motion is provided. The two vehicles include a first and second vehicle, one of the two vehicles being an offending vehicle and the other of the two vehicles being an affected vehicle. The method includes determining a distance between the two vehicles. The first vehicle is ahead of the second vehicle. The method also includes calculating a safe distance range between the two vehicles based upon one or more of speed, weight, and safe braking range values of at least one of the two vehicles. The method further includes comparing the distance and the safe distance range and activating a recording device on the affected vehicle if the distance is less than the safe distance range indicating an unacceptable range value, the offending vehicle being responsible for causing the unacceptable range value.
摘要:
A mechanism for sharing tasks is provided in which individuals in a share group may signal their intent to complete individual shared tasks and communicate that intent to other individuals in the share group. A required time for completion of the shared tasks may be associated with an individual's signaling of the intent to complete the shared task. The completion of the shared task by the individual signaling intent to complete may be monitored and, if not completed within the associated required time, the performance of the shared task may again be shared with the individuals of the share group. In this way, another individual may signal that individual's intent to perform the shared task and the process may be repeated until the shared task is completed.
摘要:
Methods, apparatus, and products are disclosed for dispatching a message request to a service provider in a messaging environment that include: establishing, on a message administration device, a plurality of lookup tables for mapping request types to service providers; receiving, in the message administration device from a message requesting device, a message request of one of the request types; identifying, by the message administration device, the service provider for processing the message request in dependence upon the message request and the plurality of lookup tables; and providing, by the message administration device, the message request to the identified service provider.
摘要:
The invention provides a method, system, and program product for encrypting portions of a document using selective annotation. One method according to the invention includes: defining an annotation border adjacent a portion of a document using a digital pen; applying to the portion of the document an annotation verb specifying that the portion of the document is to be encrypted; entering into the portion of the document information to be encrypted; and encrypting the portion of the document.
摘要:
The invention provides a method, system, and program product for encrypting information. In one embodiment, the invention includes prompting a user for a password associated with a digital signature certificate stored in a digital pen, capturing a handwritten password made using the digital pen, displaying to the user the captured password, and encrypting information entered using the digital pen using the captured password. In some embodiments, the password may be captured from a predefined field on a digital page.
摘要:
A method, data processing system and computer program product for customizing a presentation. A set of individual preferences for each individual of a plurality of individuals to form a set of audience preferences is determined, wherein each preference in the set of individual preferences is associated with one of a plurality of versions of the presentation. A set of versions of the presentation from the plurality of versions of the presentation is selected based on the set of audience preferences. The set of versions of the presentation selected from the plurality of versions of the presentation is presented.
摘要:
A system, computer program product and method of keeping track of an attachment that has been detached from an e-mail message are provided. Generally, a table on which an attachment that has been detached from an e-mail message is cross-referenced to its storage location is used. Further, a link is inserted into the e-mail message to facilitate access to the detached attachment. If the attachment is ever moved from its storage location to a new storage location, the cross-referencing table is updated to reflect the new storage location. The link is also updated to facilitate access to the attachment at the new storage location.