摘要:
The illustrative embodiments provide a computer implemented method, apparatus, and computer program product for security cluster monitoring and notification. A security cluster comprised of a plurality of structures is monitored for a plurality of events. When an occurrence of an event as defined by a set of parameters associated with a structure in the plurality of structures is identified, information about the event is generated. The information about the event is displayed through a user interface and transmitted to a set of computing devices associated with a set of structures in the plurality of structures.
摘要:
Presently, when an e-mail message is identified as SPAM, it is deleted and the process ends. According to the system, computer program product and method provided herein, upon identifying an e-mail message as SPAM, source information, identity and data stream of the e-mail message are transferred to a database accessible by trusted ISPs. The trusted ISPs may compare the transferred data stream to data stream of incoming and outgoing e-mail messages to determine whether they are also SPAM and the transferred source information and identity may be used to determine an original sender (i.e., a spammer) of the message.
摘要:
Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider.
摘要:
Changes in user behavior of usage of wireless services from a mobile device are encouraged in order to effect shaping of traffic and utilization patterns among a plurality of cells within a rate plan region, wherein a discount indicator disposed in said mobile device is provided to notify a user of a discount available for consuming wireless service from a given cell. A geo-cost policy established for that user or mobile device in which rules and conditions according to the available discounts and class of service are defined. A service completer queues services and automatically completes queued services upon present conditions meeting said geo-cost policy rules, such as delaying and later delivering messages when the mobile device relocates to a cell where discounts are being offered.
摘要:
Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider.
摘要:
Changes in user behavior of usage of wireless services from a mobile device are encouraged in order to effect shaping of traffic and utilization patterns among a plurality of cells within a rate plan region, wherein a discount indicator disposed in said mobile device is provided to notify a user of a discount available for consuming wireless service from a given cell. A geo-cost policy is established for that user or mobile device in which rules and conditions according to the available discounts and class of service are defined. A service completer queues services and automatically completes queued services upon present conditions meeting said geo-cost policy rules, such as delaying and later delivering messages when the mobile device is relocated to a cell where discounts are being offered.
摘要:
Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider.
摘要:
Changes in user behavior of usage of wireless services from a mobile device are encouraged in order to effect shaping of traffic and utilization patterns among a plurality of cells within a rate plan region, wherein a discount indicator disposed in said mobile device is provided to notify a user of a discount available for consuming wireless service from a given cell. A geo-cost policy is established for that user or mobile device in which rules and conditions according to the available discounts and class of service are defined. A service completer queues services and automatically completes queued services upon present conditions meeting said geo-cost policy rules, such as delaying and later delivering messages when the mobile device is relocated to a cell where discounts are being offered.
摘要:
A method, program product and system are provided to enable a new software interface and program to manage DVR content including methods for separating storage partitions, e.g. by user and also on a shared basis on local media. The partitions may either be logical or physical partitions and may be allocated differently based on the user. In an exemplary illustration, a shared partition/buffer is used for multiple users who may each initiate the recording of various shows or recordings which may be shared by other users. The interactive shared partition is used to allow multi-room coordination, messaging, content cloning, user-to-user notifications, and specific user to user messaging facilities, with the capability of setting notifications for other parties on the addition/removal of content, “pushing” recommendations of shows to other users of a shared DVR system, and allowing messages to be left to other users regarding content.
摘要:
Electronic transaction receipts in remote non-networked sales equipment are sent through infrared or radio frequency means to portable electronic devices such as personal digital assistants (PDA's)/smart cellular telephones that are in the possession of the consumer. These portable devices are possessed by the consumer and are in very close proximity to the POS device transmitting the information. Security procedures also verify the receiving device to avoid inadvertent transmissions and to provide addition security for the transmission. The information and records received by these portable devices may be stored and uploaded into other electronic media at the discretion of the consumer.