摘要:
A method for determining a user intended number from a partial phone number includes steps for receiving a partial phone number, determining whether the partial phone number corresponds with at least one database number based on at least one selected criteria list and performing a system action based on the determination. The method may include prioritizing a list of database numbers that correspond to the partial number.
摘要:
A system and method of providing address book listings. The system and method includes determining a weight of each identifier in an address book and sorting each identifier in a descending order or ascending order according to the determined weight. The list is provided to a user based on the sorting of each identifier.
摘要:
The invention provides a method, system, and program product for encrypting information. In one embodiment, the invention includes prompting a user for a password associated with a digital signature certificate stored in a digital pen, capturing a handwritten password made using the digital pen, displaying to the user the captured password, and encrypting information entered using the digital pen using the captured password. In some embodiments, the password may be captured from a predefined field on a digital page.
摘要:
A system and method to modify avatar characteristics and, in particular, to modify avatar characteristics based on inferred conditions. The system comprises a collection engine configured to collect one or more inputs and at least one rule set. The system also comprises an emotion engine configured to accept the one or more inputs and operate on the at least one rule set by comparing the one or more inputs to the at least one rule set, the emotion engine configured to modify at least one characteristic of a user participating in a virtual universe when the comparing produces a match.
摘要:
A method and system for managing multiple user locks and deletion requests on a digital video recorder (DVR) is disclosed. Files associated with the DVR can be protected from deletion by allowing users to lock a recorded file utilizing a number of locking strategies. The recorded file can also be locked by multiple users and the recording can be deleted when the users specifically remove the lock. A simpler interface for each user can be provided to prevent other users from deleting recorded files, which have not yet been viewed. Such an approach allows for an administrative override to prevent users from locking recordings and never unlocking in order to prevent the DVR exhausting disk space.
摘要:
Details relating to the operation of a vehicle under adverse conditions are recorded and collected. This data is particularly useful to forestall catastrophic failures, and to provide valuable information for potential buyers of used vehicles. Among the operating conditions that are considered are high levels of air contaminants, operation in extreme hot or cold temperatures, hauling heavy loads, as well as hard braking, turning and acceleration. In addition to the detection and recording of data, prorated maintenance schedules are recalculated and adjusted to accommodate for the operation of the vehicle under these adverse or less than ideal conditions. Typically, the data is stored in the on-board computers present in most vehicles. Periodic off loading of the data to the dealer and service providers is also provided.
摘要:
Methods, systems and program products are provided for monitoring an article for fluid exposure. A plurality of liquid sensors is incorporated into an article beneath an outer layer in a furnishing installation. In response to a fluid-detected or no-fluid-detected state, polling the sensors and sometimes other data, a processor component determines fluid exposure, sensor failure and tampering events and stores event data in a memory. Pairs of the sensors are sometimes provided within expected liquid exposure saturation footprint areas. GPS coordinate, weather condition data and structural component positioning data may also be associated with event data.
摘要:
User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone.
摘要:
Embodiments of the invention include a method that comprises receiving a request to record television content on a specified channel for a specified period of time. The method can also include tuning to the specified channel at the specified time, and recording the specified content. The method can also include determining that one or more segments of the television content is corrupted. The method can also include presenting a notification indicating that some of the television content is corrupted, retuning to the specified channel made by the request, and acquiring uncorrupted television content for use in replacing the one or more segments of corrupted television content.
摘要:
A method, system, and computer program product for detecting a tailgate event between two vehicles moving in a forward motion is provided. The two vehicles include a first and second vehicle, one of the two vehicles being an offending vehicle and the other of the two vehicles being an affected vehicle. The method includes determining a distance between the two vehicles. The first vehicle is ahead of the second vehicle. The method also includes calculating a safe distance range between the two vehicles based upon one or more of speed, weight, and safe braking range values of at least one of the two vehicles. The method further includes comparing the distance and the safe distance range and activating a recording device on the affected vehicle if the distance is less than the safe distance range indicating an unacceptable range value, the offending vehicle being responsible for causing the unacceptable range value.