-
公开(公告)号:US08577166B1
公开(公告)日:2013-11-05
申请号:US11394346
申请日:2006-03-31
申请人: David Ferguson , Dani Suleman , Patrick Williams , James Ratliff
发明人: David Ferguson , Dani Suleman , Patrick Williams , James Ratliff
IPC分类号: G06K9/40
CPC分类号: G06F3/04845 , G06F17/3089
摘要: A method may include providing an image to be adjusted, enabling selection of a focal point of the image, and adjusting the image based on the focal point of the image. The method may include providing the image to be displayed within an image template of a web page. The method may also include comparing dimensions of the image with dimensions of the image template, and adjusting the image based on the focal point of the image and based on the comparison the dimensions of the image to the dimensions of the image template. The method may further include providing the adjusted image within the image template of the web page.
摘要翻译: 方法可以包括提供要调整的图像,使得能够选择图像的焦点,以及基于图像的焦点来调整图像。 该方法可以包括提供要在网页的图像模板内显示的图像。 该方法还可以包括将图像的尺寸与图像模板的尺寸进行比较,以及基于图像的焦点并且基于图像的尺寸与图像模板的尺寸的比较来调整图像。 该方法还可以包括在网页的图像模板内提供经调整的图像。
-
-
公开(公告)号:US20050185597A1
公开(公告)日:2005-08-25
申请号:US10783435
申请日:2004-02-20
申请人: Cuong Le , David Shackelford , Gregory McBride , James Ratliff , Kaladhar Voruganti , Sandeep Gopisetty , Robert Basham , Dinesh Verma , Kang-Won Lee , Dakshi Agrawal , Brent Yardley , Khalid Filali-Adib
发明人: Cuong Le , David Shackelford , Gregory McBride , James Ratliff , Kaladhar Voruganti , Sandeep Gopisetty , Robert Basham , Dinesh Verma , Kang-Won Lee , Dakshi Agrawal , Brent Yardley , Khalid Filali-Adib
CPC分类号: H04L41/0866 , H04L41/0893 , H04L43/50 , H04L67/1097
摘要: Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Moreover, disclosed is a technique for performing reactive configuration checking of a network. A request to perform configuration checking on an existing network configuration is received. A network data store is scanned for at least one transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Furthermore, disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
-
-