摘要:
Writing a collaborative email document with hierarchical authorities including establishing a collaborative email document on an administrator's computer, identifying one or more signatories for the document, identifying one or more collaborators who are authorized to view and edit the document, providing to the collaborators copies of the document for viewing and editing, where the collaborators' copies reside on collaborators' computers, updating the copies of the document on collaborators' computers with revisions from the collaborators, and sending the collaborative email document from the administrator's computer to addressees when the document bears valid digital signatures from all signatories. Typical embodiments also include providing at least one user authority to delegate signature authority, establishing a hierarchy of delegation authority for signatures, establishing at least one authority delegation policy including at least one rule for automated delegation of signature authority among signatories and delegating signature authority from at least one signatory to another.
摘要:
Methods, systems, and media are disclosed for altering the captured input within a digital pen. One embodiment includes capturing the input by the digital pen, wherein the input comprises dots and measurements. Further, the method includes modifying, within the digital pen, the input based on an attribute selected for the input, wherein the modifying produces a modified input. Such modifying may occur by conversion functions, such as to a preferred input format, e.g., Excel®spreadsheet, or a preferred stylistic format, e.g., black 12 point font, wherein the conversion functions modify the input to affect such preferences based on a position of one or more selectors located on the exterior of the digital pen. Finally, the method includes transmitting the modified input to a computer system in wireless communication, for example, with the digital pen.
摘要:
A method that enables automatic retrieval and transfer of bibliographical information whenever content is copied from a web page. During creation of a web page, the meta data defining each independent portion of the content is linked via paired comments or meta tags to bibliographical information associated with the content. When a person accesses the web site and copies the content from the site, the bibliographical information is automatically appended to the content. If that content is then pasted into a different document, e.g., within a word processing application, the bibliographical information is automatically transferred to a location for such information within the document. Also, if the content is saved, the bibliographical information is saved along with the content.
摘要:
An approach that smoothes a cryptographic function's timing footprint is presented. A processor includes a “function timing smoother” that smoothes out spikes in the amount of time that a particular cryptographic function requires to execute. When a cryptographic function executes, the function timing smoother tracks the amount of time that the cryptographic function executes (current execution time) and compares the time with the amount of time that the same cryptographic function took for a previous execution (previous execution time). When the current execution time is less than the previous execution time, the function timing smoother adds instructions or varies an execution unit's clock speed in order to increase the cryptographic function's current execution time. Using this approach, a malicious user is not able to decipher sensitive information from the cryptographic function's timing footprint.
摘要:
A method and system for converting a voice communication to a text transcription. The method comprises receiving by a computing system in a control command center, a first transmission identifier from a vehicle. The first transmission identifier identifies the vehicle. The computing system receives voice communication data for the vehicle from a user in the control command center. A software application within the computing system converts the voice communication data into text data. The computing system transmits the voice communication data, a first copy of the text data and a second transmission identifier to the vehicle. The second transmission identifier identifies the control command center. The computing system receives a confirmation request from the vehicle to confirm if the text data comprises correct information related to the voice communication data. The confirmation request is displayed on a video monitor system. The computing system transmits confirmation data to the vehicle.
摘要:
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
摘要:
Rendering a meta-page through a meta-engine, the meta-engine including a tag handler, the meta-page including static content, JSP dynamic content and one or more types of non-JSP dynamic content, and identifications of shared variables. Embodiments include writing to output the static content of the meta-page, rendering the JSP dynamic content to the output of the meta-engine, and inserting into the non-JSP dynamic content additional non-JSP dynamic content identifying current values of shared variables. Embodiments include rendering the non-JSP dynamic content through dynamic server page engines, including passing current values of shared variables to the dynamic server page engines, reading from the non-JSP additional dynamic content as rendered the current values of shared variables, deleting from the non-JSP dynamic content as rendered the additional non-JSP dynamic content as rendered, and writing the non-JSP dynamic content as rendered, at its location among the static content, to the output of the meta-engine.
摘要:
A data processing device includes a chassis defining a card slot opening and a card received within the chassis. The card slot is operable to receive a peripheral card in a functional position in which a portion of the peripheral card is external to the chassis and the peripheral card is electrically connected to the system. The card slot is further operable to receive the peripheral card in a housed position wherein the peripheral card is entirely enclosed within the chassis. An embodiment of the card slot further includes means, such as a push button, for transitioning the peripheral card from the housed position to the functional position. In one embodiment, the peripheral is disconnected from the system and from electrical power when in the housed positioned.
摘要:
A script evaluator analyzes script code and identifies possible problems with respect to given browsers and given browser versions. When configuring the parameters of analysis of the script evaluator, the user may select versions of known browsers for which support is desired. The script evaluator may point out functions in the script code that are not supported by certain versions of selected browsers. The evaluator may also suggest alternative functions that may be supported by all desired browser versions. Help information may be provided to assist the user. The script evaluator may receive browser support and help information from a library. The library may be collected from the browser software vendors or may be supplied with the script evaluator. The script evaluator may also include an editor or may be part of an existing developer tool.
摘要:
A system for managing code displacement may include a manager and an application operable on a server. The application may include a plurality of modules each module for performing a different operation. The system may also include priority information associated with each module to permit the manager to deactivate selected ones of the modules based on the priority information to improve performance of the application.