Abstract:
A display system suitable for controlling operations of a multifunction device, such as a printer, and a method which makes use of the display system are disclosed. The display system includes a front panel configured for selectively displaying a local user interface and being touch sensitive for controlling an associated device based on touch selectable graphic objects displayed on the local user interface. A rear panel is configured for selectively displaying the local user interface, which is viewable through the front panel. A switching component is configured for switching the display of the local user interface between the front panel and the rear panel.
Abstract:
A display system suitable for controlling operations of a multifunction device, such as a printer, and a method which makes use of the display system are disclosed. The display system includes a front panel configured for selectively displaying a local user interface and being touch sensitive for controlling an associated device based on touch selectable graphic objects displayed on the local user interface. A rear panel is configured for selectively displaying the local user interface, which is viewable through the front panel. A switching component is configured for switching the display of the local user interface between the front panel and the rear panel.
Abstract:
A system and method for document image acquisition and retrieval which find application in litigation for responding to discovery requests are disclosed. The method includes automatically acquiring image data and associated records for documents being processed by a plurality of image output devices within an organization and archiving the image data and associated records as image logs for the processed documents. When a request for document production is received by the organization, the image logs (and/or information extracted therefrom) are automatically filtered through at least one classifier trained to return documents responsive to the document request, and documents corresponding to the filtered out image logs are output. One of the filters may be configured for filtering privileged from non-privileged documents.
Abstract:
Job logs are mined in order to compute a redirection matrix for managing operation of a plurality of systems. The redirection matrix may be used to identify alternative systems in the event a user selected system becomes unavailable to which a job may be redirected. In addition, the redirection matrix may be used to compute a network printer topology and print clusters for use with network management and system analysis.
Abstract:
In a method for monitoring hardware devices of the hardware devices network to detect failures, past logged jobs are analyzed to determine a pattern of past usage of hardware devices by users of the hardware devices network. A failure of a hardware device is inferred based on a deviation in usage of the hardware devices from the pattern of past usage. In some embodiments, a state model is constructed that assigns one of two or more available operational states to each hardware device of the hardware devices network based on a recent load of jobs logged to the hardware device and a stored history of logged jobs indicative of typical loading of the hardware devices. One or more failing hardware devices are identified based on the assigned operational states.
Abstract:
In a printing method, a user at a user terminal (10) having a physically connected mobile device (20) including non-volatile storage constructs an incomplete print job envelope (32) and completing data (34). The completing data (34) are stored on the non-volatile storage of the mobile device (20). The incomplete print job envelope (32) is communicated to a printing device (12). The mobile device (20) is physically disconnected from the user terminal (10), and physically connected with the printing device (12) to reconstruct the print job at the printing device (12) from the incomplete print job envelope (32) and the completing data (34).
Abstract:
In a printing method, content of a print job is split into a main portion and a completing portion at a user terminal (10). The main portion is encrypted using the user terminal. The encrypted main portion (32) is sent to a printing device (12). The completing portion is encrypted using a mobile device (20) operatively connected with the user terminal. The encrypted completing portion (34) is stored on the operatively connected mobile device. The mobile device is operatively disconnected the from the user terminal, and is operatively connected with the printing device. After the operative connecting: (i) the encrypted main portion is decrypted using the printing device and the completing portion is decrypted using the mobile device; (ii) the decrypted main portion and the decrypted completing portion are combined to reconstruct the print job; and (iii) the reconstructed print job is executed using the printing device.
Abstract:
Methods and systems are presented for identifying potential printer failures in a networked printing enterprise, in which job tracking data is gathered for print jobs in the network, affinity data is derived from the job tracking data indicating associations between printer devices and user devices, and potential printer failures are identified based on changes in the affinity data.
Abstract:
A system and method of localizing elements (shared devices and/or their users) in a device infrastructure, such as a printing network, are provided. The method includes mapping a structure in which the elements of a device infrastructure are located, the elements comprising shared devices and users of the shared devices. Probable locations of fewer than all of the elements in the structure are mapped, with at least some of the elements being initially assigned to an unknown location. Usage logs for a plurality of the shared devices are acquired. The acquired usage log for each device includes a user identifier for each of a set of uses of the device, each of the uses being initiated from a respective location within the mapped structure by one of the users. Based on the acquired usage logs and the input probable locations of some of the elements, locations of at least some of the elements initially assigned to an unknown location are predicted. The prediction is based a model which infers that for each of a plurality of the users, a usage of at least some of the shared devices by the user is a function of respective distances between the user and each of those devices.
Abstract:
A method and system are disclosed for automatically tagging locations using collected traveler information. Traveler information, including a time/date stamp and a unique identification associated with the traveler are collected and stored in a database with locations corresponding to transportation stops. A location query, which includes a location type, an analysis period, optionally, an analysis approach, and a user selected threshold are received and a number of time/location stamps for each location is determined based upon an interval associated with the selected type. The maximum number of time/location stamps for that location is determined, and using the selected threshold, a minimum number of stamps required to designate a location as the selected type is determined. When the number of time/location stamps within the time interval for the selected type is greater than or equal to the minimum number calculated, the location is tagged as the selected location type.