摘要:
A method and apparatus is provided for notifying a telephone speaker engaged in a call or conference that the audio quality being received by one or more listeners is not acceptable. The notice is provided before the call or conference has ended, so that effective action can be taken to continue the conference. Embodiments of the invention can include both automatic and manual methods for informing a participant in a telephone call that audio distortion is occurring. An automated method uses audio sampling and comparative logic, while a manual method is accomplished using phone programming and a key entry sequence. A further embodiment provides means for any participant on a call to verify the audio quality of his or her own telephone.
摘要:
A method and system for controlling the transmission state of a radio frequency identification transponder. A value in an event indicator is changed upon occurrence of an event. The value in the event indicator is compared to a predetermined value. Responsive to the value in the event indicator equaling the predetermined value, the transmission state of the radio frequency identification transponder is selectively changed between a first state and a second state, wherein the first state activates the radio frequency identification signal transmitted by the radio frequency identification transponder, and wherein the second state deactivates the radio frequency identification signal transmitted by the radio frequency identification transponder.
摘要:
A computer implemented method and a computer program product for prioritizing a participant in a teleconference are provided. Participants in a teleconference are prioritized in order to manage the participants currently speaking and participants wanting to interrupt. A participant has an individual or a group priority level associated with the participant, which is communicated to a teleconference system. When the participant indicates a desire to interrupt a currently speaking participant, the teleconference system compares the priorities of the participant and the currently speaking participant. If the participant has the priority necessary for the interruption, the teleconference system grants the participant an ability to interrupt the teleconference. Using this ability, the participant can interrupt a currently speaking participant who has a lower priority than that of the participant, interrupt a currently speaking participant with higher priority under certain circumstances, or become an exclusive speaker for a duration or a topic.
摘要:
The present invention is a method and system of transferring any telephone call designated to a first user to the cellular telephone of a second user. The system authenticates an end user's biometric information and then allows the end user to answer an incoming landline telephone call from any location using a cellular phone. Additionally, the reverse situation is true. An authenticated end user can answer an incoming cellular telephone call from any location using an available landline telephone.
摘要:
A system and method is provided for masking traditional grey bars which are produced by displaying wide screen images within a full screen native projector and visa versa. This method allows blocking of light for unused portions of the screen thereby producing higher contrast images. In an exemplary embodiment, a physical shutter is positioned inside the projection system so that the light which would otherwise produce a grey bar area is blocked before it reaches a projection screen. Image data are analyzed to identify grey screen areas which are not being utilized for image display and light which would otherwise produce such grey areas is blocked or shuttered by the projector to eliminate the grey areas.
摘要:
A method, system, and program product transfer information from a guest virtual machine running on a host machine to a receiving machine. A monitor intercepts a request to transfer information from a sending machine, which is a guest virtual machine located on the host system, to a receiving machine. If the receiving machine is a guest virtual machine running on the host machine, the information is transferred to memory associated with the receiving machine. If, the receiving machine is not a guest virtual machine located on the host system, the information is transferred to a network.
摘要:
Systems, methods and media for testing computer programs m response to a program upgrade or installation are disclosed. In one embodiment, a computer executes software to detect when an upgrade or an installation occurs. When an upgrade or installation occurs the computer initiates a test of one or more applications and/or operating systems. The results of these tests are logged in one or more error logs that can be displayed to a program developer or operating system administrator for diagnosis.
摘要:
A method and system for converting a voice communication to a text transcription. The method comprises receiving by a computing system in a control command center, a first transmission identifier from a vehicle. The first transmission identifier identifies the vehicle. The computing system receives voice communication data for the vehicle from a user in the control command center. A software application within the computing system converts the voice communication data into text data. The computing system transmits the voice communication data, a first copy of the text data and a second transmission identifier to the vehicle. The second transmission identifier identifies the control command center. The computing system receives a confirmation request from the vehicle to confirm if the text data comprises correct information related to the voice communication data. The confirmation request is displayed on a video monitor system. The computing system transmits confirmation data to the vehicle.
摘要:
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
摘要:
A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration.