摘要:
A system for adjusting audio output including a transmitter unit adapted to be carried by a user and a sound generating system. The transmitter unit includes a memory and a signal transmitter. The sound generating system includes a sound generator, a signal receiver, means for altering a sound signal from the signal generator based upon a signal transmitted by the transmitter to the receiver, and speakers connected to the altering means.
摘要:
An encrypted audio decryption system for decrypting encrypted audio sound. The system includes a hearing device and a key FOB. The hearing device is adapted to receive the encrypted audio sound, decrypt the encrypted audio sound, and transmit signals corresponding to the decrypted audio sound to a speaker of the hearing device. The key FOB is adapted to transmit a decryption key to the hearing device. The hearing device is adapted not to decrypt the encrypted audio sound without receipt of the decryption key, corresponding to the encrypted audio sound, from the key FOB.
摘要:
Database systems using BitSets to model and manage relationships between and/or among entities describing the corresponding fast user defined scalar and column functions used for BitSets, including a technique to model categorization and steps to perform rule evaluation from retrieving the entities associated with ancestors and descendent categories, as well as a technique to model Boolean Expression using Bitsets for relationships and the steps to perform fast Boolean evaluation.
摘要:
A method, apparatus, and computer implemented instructions for managing rights to a service in a data processing system. A request is received from a user for the service. The rights to the service are identified. Content for the service is received. The content is selectively modified based on the rights identified. The content is sent to the user.
摘要:
A method, system, and computer program product for determining the location of a portable data processing system is provided. In one embodiment, the portable data processing system determines resources that are geographically proximate to the portable computer and generates a location syndrome. The location syndrome is then compared to a set of location profiles, wherein at least some of the location profiles correspond to different geographic locations. Responsive to sufficiently matching the location syndrome to one of the set of location profiles, a label corresponding to the matched one of the set of location profiles is returned as the current location of the portable data processing system.
摘要:
A warning system and method include a memory device configured to store one or more condition criteria. A monitoring device is configured to monitor a status of the one or more condition criteria. The monitoring device is triggered by a triggering event related to the status to generate a warning signal responsive to the triggering event. A mobile computing device is configured to communicate with the monitoring device and an external network to receive the warning signal and output a warning message on the external network to one or more designated entities.
摘要:
In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event. In instances where a given service delivery does not comply with service level attributes specified in a controlling service level agreement, the methods and apparatus of the present invention take corrective action.
摘要:
Techniques are disclosed for controlling software patching activity. Techniques may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted. Patching may be performed when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. Patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. A particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.
摘要:
A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.
摘要:
The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. In still further circumstances, a particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.