摘要:
A system for adjusting audio output including a transmitter unit adapted to be carried by a user and a sound generating system. The transmitter unit includes a memory and a signal transmitter. The sound generating system includes a sound generator, a signal receiver, means for altering a sound signal from the signal generator based upon a signal transmitted by the transmitter to the receiver, and speakers connected to the altering means.
摘要:
An encrypted audio decryption system for decrypting encrypted audio sound. The system includes a hearing device and a key FOB. The hearing device is adapted to receive the encrypted audio sound, decrypt the encrypted audio sound, and transmit signals corresponding to the decrypted audio sound to a speaker of the hearing device. The key FOB is adapted to transmit a decryption key to the hearing device. The hearing device is adapted not to decrypt the encrypted audio sound without receipt of the decryption key, corresponding to the encrypted audio sound, from the key FOB.
摘要:
An integrated calendar-phone mail system accepts input from a workstation to a calendar or to a voice-mail program periodically updating the phone mail data with new data from the calendar and updating the calendar data with new data from the phone mail.
摘要:
A method, computer program product, and network data processing system for identifying, locating, and deleting viruses is provided. In one embodiment, the network data processing system includes a local server, several client data processing systems, and a bait server. The address of the bait server is not published to the clients. Thus, any attempt to access the bait server would indicate the presence of a virus on the client attempting access. The bait server monitors itself and, responsive to an attempt from a client to access the bait server, broadcasts an indication that a virus attack is underway to all devices within the network. The bait server then ignores all further access requests by the offending client until it receives an indication that the offending client has been disinfected and directs the local server to disconnect the offending client(s) from the network. The bait server also notifies the local server and/or a network administrator of the problem and the identity of the offending client allowing appropriate action to be initiated to disinfect the offending client.
摘要:
A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.
摘要:
A system and method for associating a state with a distributed system and transitioning component states with recovery to reverse transitioning attempts includes defining a global state representing an overall provisioning state of a plurality of components involved in a system wherein a set of global states are employed as provisioning checkpoints. Individual software component methods are defined for transitioning from one state to another. Individual states are associated with a global state. A rollback method is defined by which a destination global state may be rolled back to a previous global state in an event of a failure.
摘要:
In a distributed computing network having computers interconnected with each other, a method and apparatus of providing policy based provisioning of middleware components to provide a solution for a service. With this invention, the middleware components that are necessary to provide the solution are determined. Then, the configurations of the computers are determined so as to satisfy a selected configuration policy for a selected solution. Finally, the necessary middleware components are installed on the configured computers so that the solution can be provided. Some of the selected configuration policies are: maximization of server utilization policy, provisioning of software components requiring external access based on availability of external resources, and minimization of total time to install said determined components. The progress of installation of the middleware components can also be monitored to make any necessary adjustments in the configuration of the virtual machines so that the selected configuration policy can be satisfied.
摘要:
A system and method for associating a state with a distributed system and transitioning component states with recovery to reverse transitioning attempts includes defining a global state representing an overall provisioning state of a plurality of components involved in a system wherein a set of global states are employed as provisioning checkpoints. Individual software component methods are defined for transitioning from one state to another. Individual states are associated with a global state. A rollback method is defined by which a destination global state may be rolled back to a previous global state in an event of a failure.
摘要:
A method, system and computer usable program code is disclosed for mapping a logical topology to information technology (IT) resources. The method comprises the steps of generating a logical topology of resources for a solution to a given request for resources, extracting information about shared rules and constraints on IT resources specific to a plurality of customers, and generating multiple mappings from the logical topology to the IT resources that satisfy said shared rules and constraints.
摘要:
In a distributed computing network having computers interconnected with each other, a method and apparatus of providing policy based provisioning of middleware components to provide a solution for a service. With this invention, the middleware components that are necessary to provide the solution are determined. Then, the configurations of the computers are determined so as to satisfy a selected configuration policy for a selected solution. Finally, the necessary middleware components are installed on the configured computers so that the solution can be provided. Some of the selected configuration policies are: maximization of server utilization policy, provisioning of software components requiring external access based on availability of external resources, and minimization of total time to install said determined components. The progress of installation of the middleware components can also be monitored to make any necessary adjustments in the configuration of the virtual machines so that the selected configuration policy can be satisfied.