摘要:
The present invention is directed to a software distribution architecture in which an enterprise has a filter that screens user requested software, software upgrade(s), software feature(s), and/or software setting option(s) against enterprise rules or policies. Disapproved software, software upgrade(s), software feature(s), and/or software setting option(s) are blocked for download.
摘要:
Embodiments of the present invention are directed to a communication system that provides various automated operations, including searches of public and private resources for third party information, performance of operations to assist a user in response to keyword identification in an audio, text or video stream, and speed dial updates based on calling frequencies to various telephone numbers.
摘要:
The present invention is directed to a software distribution architecture in which a software vendor provides a software store that is coordinated with the unique requirements of a software purchasing enterprise. Examples of the requirements include the enterprise infrastructure, information technology requirements and/or approval, account billing, and other attributes.
摘要:
A flexible Virtual Desktop Infrastructure is disclosed. In particular, mechanisms for determining location information for a client device and/or a usage context for the client device are provided. Based on the determined location and/or usage context a desktop profile may be selected from a plurality of desktop profiles mapped to the user of the client device for display by the client device.
摘要:
The present invention is directed to a software distribution architecture in which an enterprise has a filter that screens user requested software, software upgrade(s), software feature(s), and/or software setting option(s) against enterprise rules or policies. Disapproved software, software upgrade(s), software feature(s), and/or software setting option(s) are blocked for download.
摘要:
According to various illustrative embodiments of the present invention, a reader capable of identifying at least one product by providing non-visual sensory information to a user, the reader comprising: a source which stimulates a response from a marker carried by the at least one product; a detector which detects the response from the marker; a decoder which decodes the detected response to ascertain product identification information therefrom; and a transducer which provides the product identification information in non-visual form. The information may be provided in audible form, such as a tone or as speech.
摘要:
Methods and systems for providing contextually relevant information to a user are provided. In particular, a user context is determined. The determination of the user context can be made from information stored on or entered in a user device. The determined user context is provided to an automatic speech recognition (ASR) engine as a watch list. A voice stream is monitored by the ASR engine. In response to the detection of a word on the watch list by the ASR engine, the context engine is notified. The context engine then modifies a display presented to the user, to provide a selectable item that the user can select to access relevant information.
摘要:
The present invention is directed to a software distribution architecture in which a software vendor provides a software store that is coordinated with the unique requirements of a software purchasing enterprise. Examples of the requirements include the enterprise infrastructure, information technology requirements and/or approval, account billing, and other attributes.
摘要:
Embodiments of the present invention are directed to a communication system that provides various automated operations, including searches of public and private resources for third party information, performance of operations to assist a user in response to keyword identification in an audio, text or video stream, and speed dial updates based on calling frequencies to various telephone numbers.
摘要:
A security marker for use as an anti-counterfeiting or security measure is described. The marker comprising at least one security tag comprising a first dopant incorporated into a host and a second dopant incorporated into a host. The first dopant interacts with its host to luminesce in the visible region of the electromagnetic spectrum upon excitation at a first wavelength, and the second dopant interacts with its host only upon excitation at a second wavelength.