Abstract:
A method for identifying a potential vehicle incident within a communication black spot. It is identified when a vehicle has entered a communication black spot. It is further identified when the vehicle has failed to exit the communication black spot within a determined time period. It is then determined whether it is likely that the vehicle has failed to exit the communication black spot within the determined time period due to being involved in an incident (or whether there is another reasonable explanation for a vehicle's failure to exit). If it is determined that it is likely that the vehicle has been involved in an incident within the communication black spot, a third party can be alerted (by a service provider) to the potential that an incident has occurred within the communication black spot.
Abstract:
A method for identifying a potential vehicle incident within a communication black spot. It is identified when a vehicle has entered a communication black spot. It is further identified when the vehicle has failed to exit the communication black spot within a determined time period. It is then determined whether it is likely that the vehicle has failed to exit the communication black spot within the determined time period due to being involved in an incident (or whether there is another reasonable explanation for a vehicle's failure to exit). If it is determined that it is likely that the vehicle has been involved in an incident within the communication black spot, a third party can be alerted (by a service provider) to the potential that an incident has occurred within the communication black spot.
Abstract:
A system and computer program product for identifying a potential vehicle incident within a communication black spot. It is identified when a vehicle has entered a communication black spot. It is further identified when the vehicle has failed to exit the communication black spot within a determined time period. It is then determined whether it is likely that the vehicle has failed to exit the communication black spot within the determined time period due to being involved in an incident (or whether there is another reasonable explanation for a vehicle's failure to exit). If it is determined that it is likely that the vehicle has been involved in an incident within the communication black spot, a third party can be alerted (by a service provider) to the potential that an incident has occurred within the communication black spot.
Abstract:
A method, system and computer program product for identifying a potential vehicle incident within a communication black spot. It is identified when a vehicle has entered a communication black spot. It is further identified when the vehicle has failed to exit the communication black spot within a determined time period. It is then determined whether it is likely that the vehicle has failed to exit the communication black spot within the determined time period due to being involved in an incident (or whether there is another reasonable explanation for a vehicle's failure to exit). If it is determined that it is likely that the vehicle has been involved in an incident within the communication black spot, a third party can be alerted (by a service provider) to the potential that an incident has occurred within the communication black spot.
Abstract:
A method, system and computer program product for the defragmentation of a file system with little or no free space. Defragmenting file fragments in a memory file system comprises determining a defragmentation sequence for re-ordering fragments of files in the file system; determining if at least one fragment in the file system is moved more than once in the defragmentation sequence; removing the at least one fragment from the file system if it is moved more than once in the sequence; determining the defragmentation sequence without considering the at least one removed file fragment; rearranging the remaining file fragments on the file system according to the determined defragmentation sequence; and replacing the removed file fragments in the file system after the defragmentation.
Abstract:
A method and system are provided for configuring a user interface to a user role. A user model defines one or more user roles and one or more tasks, each user role being linked to: one or more user tasks via one or more user goals, and a set of skills a user performing the role must have, wherein each task is also linked to one or more skills. A software product defines one or more software functions, and means are provided for linking each user task to a sequence of software function calls. The system includes an organization modeling tool including means for customizing the user model dynamically to alter the user role to task mapping to meet the current needs of an organization including validating the goals and sets of skills of the user model. The system also includes a display structure model including means for configuring a user interface to a user role, the display structure model being a runtime component for dynamically building control menus for groups of tasks depending on the user role of the logged on user.