摘要:
A computer implemented method, data processing system, and computer usable program code are provided for automatically initiating a set of vehicle functions for a vehicle. A set of settings is received for a set of vehicle functions. The set of settings includes a set of thresholds for the set of vehicle functions. A set of sensors are monitored on the vehicle and a signal is received from a sensor within the set of sensors indicating that a condition has occurred. Responsive to receiving the signal, a determination is made as to whether the condition meets or exceeds a threshold within the set of thresholds. Responsive to the condition meeting or exceeding the threshold, a command is sent to a device actuator to automatically perform a function within the set of vehicle functions.
摘要:
A locking digital pen system includes memory means which is available for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen or provide an entry to a coupled computer to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system.
摘要:
A method and system for converting a voice communication to a text transcription. The method comprises receiving by a computing system in a control command center, a first transmission identifier from a vehicle. The first transmission identifier identifies the vehicle. The computing system receives voice communication data for the vehicle from a user in the control command center. A software application within the computing system converts the voice communication data into text data. The computing system transmits the voice communication data, a first copy of the text data and a second transmission identifier to the vehicle. The second transmission identifier identifies the control command center. The computing system receives a confirmation request from the vehicle to confirm if the text data comprises correct information related to the voice communication data. The confirmation request is displayed on a video monitor system. The computing system transmits confirmation data to the vehicle.
摘要:
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
摘要:
A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration.
摘要:
A method of and system for providing performance information in a Universal Description, Discovery and Integration (UDDI) system periodically requests data from Web service providers that are registered in a UDDI registry. The method and system determine performance attributes for the Web service providers based upon the requested data. The method stores the latest, or most current, performance attributes in a performance metric store that is accessible by the UDDI registry. The UDDI registry services requests from Web service consumers for performance attributes of service providers that provide specified Web services. The UDDI registry accesses the performance metric store to obtain current performance attributes for the Web service providers and returns the performance attributes to the Web service consumer. The Web service consumer can use the performance attributes to select a Web service.
摘要:
A method and system are provided in which DVR viewer metrics are collected and saved in a “Watched Log” data base including identifying titles and other features of recorded DVR programs. User viewing metrics are collected and saved for use in determining whether or not future shows are recorded. After a DVR user watches a TV or other video show episode, the show episode will be added to the Watched Log. Subsequently, before recording a new TV show, the DVR device can determine the viewer's actions with regard to previous similar shows and factor such information into a decision regarding the recording of the new show.
摘要:
A method and system are provided in which one DVR device is able to coordinate scheduling of selected TV shows with other DVRs in an interconnected or network environment which includes additional remote recording resources. If one DVR is unable to perform the recording of a selected TV show, other interconnected DVR devices are accessed to record one or more portions of the selected TV program. When a user desires a playback of the recording, the recorded program is played-back from the various networked multiple storage resources, each of which may contain one or more portions of the recorded program.
摘要:
The present invention provides a computer implemented method, system, and computer program product for selective encryption of a data transmission. A data transmission is received. When the data transmission is received, the data transmission is unmarshaled. When the transmission is unmarshaled, objects and a set of sensitive fields within the data transmission are identified by referencing a metadata database. Only the set of sensitive fields within the data transmission are encrypted to form a partially encrypted data transmission. The partially encrypted data transmission is marshaled to form a marshaled data transmission. The marshaled data transmission is transmitted to a recipient.
摘要:
A method and system are provided in which DVR viewer metrics are collected and saved in a “Watched Log” database including identifying titles and other features of recorded DVR programs. User viewing metrics on both “per user” and “per show” bases are saved and used to augment existing conflict resolution techniques by removing shows that have been entirely or partially viewed in favor of shows that have not already been viewed. After a DVR user watches a TV show episode, the TV show episode will be added to the Watched Log. Subsequently, before recording a future TV show, the DVR device can verify that the scheduled TV show episode has not already been watched by the user. If the show is in the Watched Log, various rules are used to determine which recording actions to take.