摘要:
In one embodiment, path data is received. The path data is indicative of a plurality of connectivity paths to electronically connect a computer and a printer. A graphic user interface is provided for display to a user, the interface to enable sending of print jobs to a print queue. The queue is to hold the print jobs to be sent to the printer, and is without limitation to a specific path among the plurality of paths. A command for the computer to send a first print job to the printer is received via the interface. The plurality of paths is monitored to identify an available path among the plurality of paths. The first print job is caused to be sent from the queue to the printer via the available path.
摘要:
Embodiments disclosed herein relate to an encrypted payment image. In one embodiment, a processor of a mobile computing device encrypts a binary version of an invoice image with a payment information encryption key. The processor may generate a payment image of the encrypted binary of the invoice image and display the payment image.
摘要:
In one embodiment, path data is received. The path data is indicative of a plurality of connectivity paths to electronically connect a computer and a printer. A graphic user interface is provided for display to a user, the interface to enable sending of print jobs to a print queue. The queue is to hold the print jobs to be sent to the printer, and is without limitation to a specific path among the plurality of paths. A command for the computer to send a first print job to the printer is received via the interface. The plurality of paths is monitored to identify an available path among the plurality of paths. The first print job is caused to be sent from the queue to the printer via the available path.
摘要:
Examples disclose herein include receiving a master document and a first document update associated with a first time stamp from a first computing device. The first document update includes a first change to the master document. This example also compares the first document update to the master document to identify the first change. Additionally, the example provides transmitting the first change to a second computing device.
摘要:
Embodiments disclosed herein relate to an encrypted payment image. In one embodiment, a processor of a mobile computing device encrypts a binary version of an invoice image with a payment information encryption key. The processor may generate a payment image of the encrypted binary of the invoice image and display the payment image.
摘要:
Representative embodiments provide for a security lock apparatus configured to securely couple a sheet handling device in cooperative relationship with an imaging device in response to a first predefined user action, the security lock apparatus further configured to de-couple the sheet handling device from the imaging device in response to a second predefined user action, wherein the security lock apparatus is further configured to be inoperable by unauthorized personnel. The present invention provides a method including supporting a security lock apparatus with an imaging device, performing an authorized predefined locking action coupled to the security lock apparatus, and securely coupling the sheet handling device in cooperative relationship with the imaging device using the lock apparatus in response to the performing the authorized locking action.
摘要:
Scheduling operation modes of a managed device. A method embodiment of the present invention includes providing a device remote from the managed device with an interface enabling selection of options for scheduling the occurrence of operation modes for the managed device. Options selected through the interface are received from the remote device. The occurrence of operation modes of the managed device are then scheduled according to received options.
摘要:
Systems and methods for limiting access to imaging device consumable components are disclosed. In one embodiment, a system and a method pertain to receiving authorization information from a user, determining whether the authorization information is valid, and preventing specific access to a consumable component if the authorization is not valid.