摘要:
A system for managing documents in a distributed computing environment, which may be bandwidth limited, includes a document locker server and a document locker client. The document locker client monitors user interaction with a version of a document locally replicated from a document server. Whenever the user attempts interaction with the document, such as editing or performing a workflow action, which would change said document, the document locker client requests a lock for the document from the document locker server. The document locker server grants a lock if the document is not already locked by another user and the document locally replicated is the latest version of the document. The document locker client allows the user to perform the operation if a lock is received, without having to replicate a version of the document to the local host.
摘要:
A chat system includes a chat server and a plurality of chat clients in a network that may be bandwidth constrained. Each chat client is configurable, in response to instructions from the chat server, to operate in either a master mode or a slave mode. In the master mode, a chat client is capable of initiating a chat session. In the slave mode, a chat client is incapable of initiating a chat session and may participate only in a chat session initiated by another chat client operating in the master mode. An invitor user initiates, or adds a member to, a chat session by sending an invitation to an invitee user name at a proxy address at the chat server. If the chat server determines that the invitee is logged on, the chat server forwards the invitation to the invitee at the invitee's network address. If the invitee user accepts the invitation, the invitee client sends a join message to the invitor client, and the invitor client adds the invitee's user name and client network address to a chat member list. Then, the chat session proceeds with the chat member client sending chat input to the master client and the master client sending chat session updates to the member client.
摘要:
A method of and system for assigning documents to users in a workflow system initially assigns a document to a specified role, rather than to a specified individual for review, further processing, and/or approval. The system determines the users signed on to the system in the specified role, and assigns the unassigned document to one of the signed on users. The system determines the users signed on to the system in the specified role by maintaining a role document for the specified role. The role document includes a list of the users assigned to the specified role and the signon/signoff status of each assigned user. The system assigns the document to a user on the role document whose signon/signoff status is signed on according to an assignment algorithm. The system updates the signon/signoff status of the role document whenever a user signs on to or off of the system.
摘要:
The present invention provides a 3-D time helix renderable in a virtual universe. In one embodiment, there is a time helix tool, including a construction component configured to: generate a 3-D time helix in a virtual universe, and populate the 3-D time helix with a set of data objects. The time helix tool further comprises a rendering component configured to render the 3-D time helix with at least one of the set of data objects to a user of the virtual universe.
摘要:
The present invention provides a 3-D time helix renderable in a virtual universe. In one embodiment, there is a time helix tool, including a construction component configured to: generate a 3-D time helix in a virtual universe, and populate the 3-D time helix with a set of data objects. The time helix tool further comprises a rendering component configured to render the 3-D time helix with at least one of the set of data objects to a user of the virtual universe.
摘要:
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow contract is then created based upon the specified escrow parameters. The escrowing further includes storing the digital data in a secure information vault, and storing the escrow contract, along with a pointer to the stored data, in a database. When the condition has been satisfied, the data is released to the escrow recipient. The condition(s) for release can be a payment sum, a date, an indication from a depositor, a trustee or a vault administrator, and/or fulfillment of another escrow contract.
摘要:
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow contract is then created based upon the specified escrow parameters. The escrowing further includes storing the digital data in a secure information vault, and storing the escrow contract, along with a pointer to the stored data, in a database. When the condition has been satisfied, the data is released to the escrow recipient. The condition(s) for release can be a payment sum, a date, an indication from a depositor, a trustee or a vault administrator, and/or fulfillment of another escrow contract.
摘要:
A system and method for providing an intellectual property marketplace (IM) using a secured information vault so that individual owners of intellectual property (IP) may control and manage the access and dissemination of the IP. Producers of the IP may also receive compensation for transactions in the marketplace. Multiple services for adding IP such as books, movies, video, papers, research, music, inventions, or the like, to the IM include controlling authorized access to the IP and generation of advertising based on types of IP in order to solicit potential consumers. Transactions may be securely transacted using public keying infrastructure (PKI). Consumers subscribing to the IM may also be automatically notified when IP is added to the IM based on predetermined preferences established by the consumer.
摘要:
A system and method for providing a secured information vault so that individual owners of personal data may control and manage the access and dissemination of the personal data and provides for the owner of the personal data to receive compensation for the use of the personal data, thus, in effect, the personal data becomes a valuable commodity analogous to money. Centralized protected storage of personal data is provided, which minimizes the number of copies that may be in existence. The personal data may be converted from one format to another by subscribing to format conversion services provide by the vault. The vault regularly updates stored personal data per the subscribed services so that the personal data is available in the latest data formats used by various industries. A fee may be charged for format conversions.
摘要:
A system and method for providing a Contact Management System (CMS) so that individual owners of personal contact data may control and manage the access and dissemination of the personal data. The owner of personal contact data may securely register the data with secured information vault of the CMS and specify which other parties may have access to the personal data. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party's device, such as a telephone or a PDA may access the CMS database and under public key infrastructure (PKI) controls identify themselves so that access to the owner's personal data may be verified. Once verified, the telephone number or other data may be returned to the device where a call may be automatically placed or otherwise used.