摘要:
An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow.
摘要:
A method, system and computer instructions for users to visually rearrange telephone call trees are disclosed. A caller can connect to an automated telephone answering service, and download the service's call tree. The caller can view a display with the call tree, and modify or rearrange the order in which the menu options of the call tree are displayed. The user can then store the modified call tree for use in the future.
摘要:
A method, apparatus, and computer program product for monitoring the performance of a system. The mechanism of the present invention provides an interface in the form of a graphical user interface (GUI) to communicate multiple layers of system performance data to an operator. An operator monitors this display of information and uses it to determine how to adjust the system to optimize system performance. This mechanism of the present invention provides immediate feedback to an operator by displaying a trail of metric points, wherein the metric points indicate the status of system performance over a period of time. In this manner, the display mechanism of the present invention immediately conveys to an operator whether the system is operating within predefined margins, the results of performance adjustments made to the system, as well as predictions or trends for the system.
摘要:
A system, system, and program for facilitating navigation of voice data are provided. Tokens are added to voice data based on predefined content criteria. Then, bidirectional scanning of the voice data to a next token within the voice data is enabled, such that navigation to pertinent locations within the voice data during playback is facilitated. When adding tokens to voice data, the voice data may be scanned to detect pauses, changes in voice inflection, and other vocal characteristics. Based on the detected vocal characteristics, tokens identifying ends of sentences, separations between words, and other structures are marked. In addition, when adding tokens to voice data, the voice data may be first converted to text. The text is then scanned for keywords, phrases, and types of information. Tokens are added in the voice data at locations identified within the text as meeting the predefined content criteria.
摘要:
Disparate robotic devices can be automatically recharged and reprogrammed by self-scheduling individual time slots for the available recharging area(s) of a charging station. These charging stations provide a nest to which each robot must return periodically for power. These nests can also provide new tasking or patches for the robotic devices. The charging station and the robotic devices are both provided with communications capabilities and a protocol by which they can negotiate to find a time slot in which the device can be recharged, as well as determining a correct connector and a battery type.
摘要:
A method, system, and computer usable program product for revising content translations using shared translation databases are provided in the illustrative embodiments. A translation of some content is presented to a user. A revision to a first portion of the translation is received from the user. A second portion of the translation is identified using the shared translation database, the second portion being a candidate for revising using the revision. The second portion is suggested for revision. The second portion may be identified without user interaction. The revision may be submitted for review along with user-selected portions, and an approval may be received. The user's access to the shared translation database may be controlled such that the user is able to interact with the shared translation database to identify the second portion but the user may be unable to modify the shared translation database.
摘要:
An example of a solution provided here comprises automatically measuring bandwidth of a network connection; comparing results of the measuring, with bandwidth parameters; preventing a transfer of a file via the network connection, if measured bandwidth is less than a minimum acceptable value; providing to an end user an option of transferring a file via the network connection, if measured bandwidth is not less than a minimum acceptable value, but is less than an optimal value; and automatically transferring a file via the network connection, if measured bandwidth is greater than or equal to an optimal value.
摘要:
Illustrative embodiments provide a computer implemented method, an apparatus in the form of a data processing system, and a computer program product for an intellectual property subscribe and publication notification service. In one illustrative embodiment the computer implemented method comprises obtaining an intellectual property source and creating a list of approved subscribers for the intellectual property source, wherein each subscriber of the list of subscribers indicates elements of interest. The computer implemented method further comprises creating a set of queries comprising the elements of interest associated with the list of approved subscribers and monitoring the intellectual property source for the elements of interest to create identified elements of interest. The computer implemented method then publishing notification of the identified elements of interest to the list of approved subscribers.
摘要:
An organic light-emitting diode (OLED) display device used as an identifier of an entity, person, or user access level in an identification badge. With the illustrative embodiments, the access and/or identifying information displayed on the badge can be altered or concealed as needed. The identification badge comprises at least one OLED display device for displaying identification information about a user associated with the identification badge. The identification badge also comprises one or more buttons affixed to the identification badge for selection by the user. User selection of a first button on the identification badge conceals visibility of the identification information displayed in the OLED display device. User selection of a second button on the identification badge enables the identification information concealed from display in the OLED display device to become visible again.
摘要:
A system and method for early detection of identity theft are provided. An authorized user establishes an identity with an organization's computing system and registers a mobile device and a notification device with the organization's computing system. When a use of the identity is attempted, a record associated with the identity is retrieved and a request is sent to the registered mobile device for location information. The current location of the mobile device is compared to the location of the source of the request for authorization. If the current location of the mobile device is not within an area of the source of the authentication request, information about the attempted use is compared with the registered notification criteria. If the conditions of the attempted use fall within the notification criteria, a notification message is sent to the notification device.