摘要:
A method for making indirect corrections or modifications to online documents by generating an offline document, the corrections are inscribed onto the offline document, then the corrected offline document is scanned into the computer to form an online version of the offline document. Software instructions or code are then executed to translate the online version of the offline document into an online document containing the corrections. In a preferred embodiment, the offline document is generated from an online document and the online version of the offline document is integrated or compared with the online document.
摘要:
A method, computer program, and data processing system for promoting an interactive discussion of lecture notes prior to an actual lecture using those notes is disclosed. An first client uploads lecture notes for perusal by students. If a student has a question regarding a particular section of the lecture notes, the student can post a question directed to that particular section of the notes. The first client is alerted that a question has been posted and may respond by modifying or augmenting the lecture notes as appropriate.
摘要:
The present invention enables a facility (home, business or industrial site) to optimize the consumption of energy in that facility. In this invention, the power companies that supply energy provide information to its client facilities on the cost and availability of energy from that company on a real-time basis. Each client facility would have a power accounting server. These servers store this and process this information to predict when the rates for using the energy will be the least expensive for a particular task or to operate a particular appliance. A homeowner (client facility) for example can program appliances such as a dishwasher or laundry machine to turn on when the cost of energy is below a particular threshold price. The present invention has the capability to receive characteristics about a particular appliance, generate a list of energy consumption options for that particular product at a particular time period and select and implement the most efficient energy supply option. This invention can also enable a client facility that generates energy to efficiently use the generated energy and sell any excess energy to another end user or to other energy consumers.
摘要:
A method, apparatus, and computer implemented instructions for presenting a Web page to a visually impaired user. A summary of the Web page is generated. The summary of the Web page is then presented in a manner other than visually prior to presenting other portions of the Web page.
摘要:
An automatic teller system and a method of operating the system wherein the system can receive a personalized normal PIN or duress PIN from a user. If the user enters the duress PIN, the system determines that it is a duress PIN and actuates a silent alarm to notify authorities of the possible crime. The system will then simulate a normal transaction, perhaps with a reduced maximum withdrawal amount, so as to not alert a thief or potential thief that the alarm has been actuated, while dispensing bills marked with special ink that is visible only when viewed under special light. Also, the serial numbers of the bills dispensed under duress are recorded by the automatic teller system and automatically communicated to authorities. Under duress conditions, it is preferable that the monitoring of the ATM be enhanced.
摘要:
A method, program and system for enabling alternate input commands by means of a stylus associated with a personal digital assistant (PDA) are provided. The method comprises applying pressure to a pressure sensor on the stylus, which invokes an application on the PDA that interprets stylus input as equivalent to a right mouse click on a computer. In response to the stylus being touched to an object displayed by the PDA, the application opens a menu associated with that object, wherein the menu allows a user to initiate specified object functions and to change specified properties of the object. Invoking the application on the PDA is accomplished via a Bluetoothnull signal between the stylus and PDA.
摘要:
A methodology is presented for a communication service that allows a user of a wireless mobile personal area network (PAN) to securely connect to a remote PAN. An operator of a wireless PAN network access provider (WPNAP) service activates a stationary PAN. In response to a determination that a wireless mobile PAN has entered a service area of the stationary PAN, the WPNAP service is offered to the wireless mobile PAN. Upon acceptance of the offer of its service, the WPNAP service allows the wireless mobile PAN to connect to a global communication network via the stationary PAN; a secure communication session may be established with a remote PAN. The communication session is monitored by the WPNAP service, and a financial transaction is then generated to charge usage fees to the user of the wireless mobile PAN for use of the WPNAP service during the monitored session.
摘要:
A methodology for operating a data sharing application in a peer-to-peer network is presented. After a first peer node receives a request for a copy of a specified file from a second peer node, the first peer node may either return a copy of the specified file or a response message containing an alternate node list associated with the specified file. The alternate node list contains a set of node identifiers indicating a set of alternate peer nodes within the peer-to-peer network that may have a copy of the specified file. The alternate node list is dynamically maintained at each peer node. The response provided by the first peer node, i.e. either a copy of the specified file or the alternate node list, can be determined based on an operational condition of the first peer node, e.g., whether or not the first peer node is experiencing an overload condition.
摘要:
A method, program, and system for checking the availability of goods and services by means of the Internet are provided. The invention comprises compiling a customer profile, which may include information related to business affiliation as well as personal preferences. The customer uses a general search engine to submit a query regarding a desired good or service, and the search engine returns a list of suppliers that satisfy the search generic criteria. Special software on the client machine then sends more detailed queries, along with the customer profile, directly to certain suppliers selected from the list. These suppliers then return information, which corresponds to the customer profile. This information may include availability of specific accommodations, special discounts, as well as exclusive goods or services not offered to the general public.
摘要:
A monitoring tool operates just before packets are sent out from a client computer. The monitoring tool identifies the destination of data being sent and determines whether the destination is a trusted site. The monitoring tool may also check the data itself. If the data is unencrypted, the tool may perform a string or binary pattern search on the data. However, if the data is encrypted the monitoring tool may check for the amount of data being sent. The monitoring tool may then warn the user or an administrator if the data being sent appears to be uncharacteristically high. The monitoring tool may also take corrective action, such as blocking the transmission or disabling the offending program. Alternatively, the monitoring tool may attempt to alter the final destination of the data to the client computer itself. If the program still works, the program may continue to operate.