摘要:
In one aspect, a method for comparing suppliers includes sending survey questions for receipt by supplier computer systems. Programming instructions are also sent for receipt and execution by the supplier computer systems. The programming instructions are for causing the supplier computer systems to return supplier survey answers to a server. The answers are included in responding documents and are defined in a certain format as data elements included in the responding documents. The data elements are then parsed from the responding documents responsive to predetermined programming instructions and evaluated the data elements responsive to a predetermined set of rules.
摘要:
An implementation for estimating the costs attributable to software failures brought on by defects, i.e. estimating that portion of the cost of owning software products that is attributable to potential damage to the software owner resulting from potential defects in the software provided by particular software suppliers. Calculating the cost of ownership of a software product obtained from a proposed supplier, including a cost of software failure factor that is estimated as follows: predetermining the quality level of an ideal supplier of the software product and then determining the deviation in quality level of the proposed software supplier from the ideal supplier level. Then, estimating the difference in product defect rate at the quality level of the proposed supplier from the defect rate of the ideal supplier, after which the cost to compensate for the damage resulting from each defect based upon the intended use of the software product is estimated. Finally, a cost of software failure factor for each unit of the software product obtained from the proposed supplier is calculated by multiplying said difference in defect rate by the cost to compensate for damage resulting from each defect.
摘要:
Systems, methods and media for searching documents based on text characteristics are disclosed. Embodiments may include receiving by a document searching system a request to search a document for a keyword and to limit the search based on one or more text characteristics associated with the keyword. Embodiments may also include performing by the document searching system a search of the document based on the keyword and the one or more associated text characteristics to find an instance of the keyword and generating by the document searching system a search result based on the performed document search. The text characteristics in some embodiments may include one or more of font style information, font emphasis information, highlighting information, or color information. In some embodiments, performing the search of the document includes finding an instance of the keyword where the keyword has characteristics that match at least one associated text characteristic.
摘要:
The present invention provides a method, system, and computer program product for checking for viruses by adding a virus scanning capability to a data transfer device. In a method of the present invention a real-time virus checker is stored on a controller. The virus checker scans data as it is being written to a file. If a virus is detected, the suspected file is flagged. Anti-virus software is then invoked to perform a scan of the entire suspected file. In this manner, demands on CPU resources to perform scans will be greatly reduced as only those files marked as possibly containing a viruse need to be scanned, rather than scanning all the files on the entire data transfer device.
摘要:
A user is provided with a simple inexpensive and interactively intuitive implementation of selectively turning spam off his receiving E-mail terminal. An E-mail distribution system for eliminating nuisance electronic mail, e.g. spam, from mail sent to said receiving terminals from sending locations remote from such terminals. Respective conventional addresses are assigned to each of the receiving terminals and there is a conventional implementation for addressing mail respectively to each of these receiving terminals. An implementation respectively at each of the receiving terminals enables the user to modify the receiving terminal address to include the designation of a server intermediate the sending location and apparatus at the intermediate server identifies and eliminates nuisance electronic mail. A routing function routes to the intermediate server, electronic mail addressed to the receiving terminal with the modified address.
摘要:
A method of doing business that enables a computer power service broker operating over the World Wide Web (Web) to distribute and track such distribution of computer power. The computer power service broker solicits: each of a plurality of client computer stations on the Web to offer for general distribution over the Web computer power in excess to the computer power requirements of each respective client computer station; and a plurality of consumer stations on the Web to request the performance of functions requiring computer power. The broker then distributes each of said requested functions requiring computer power among a plurality of said client stations offering said computer power and then tracks and bills consumer stations for computer power used in performance of requested functions. Finally, the computer power broker tracks and compensates the client stations for the excess computer power that they contribute in performance of the requested functions. The compensation may be determined by the market value of the broken down functions or tasks.