摘要:
A user is provided with a simple inexpensive and interactively intuitive implementation of selectively turning spam off his receiving E-mail terminal. An E-mail distribution system for eliminating nuisance electronic mail, e.g. spam, from mail sent to said receiving terminals from sending locations remote from such terminals. Respective conventional addresses are assigned to each of the receiving terminals and there is a conventional implementation for addressing mail respectively to each of these receiving terminals. An implementation respectively at each of the receiving terminals enables the user to modify the receiving terminal address to include the designation of a server intermediate the sending location and apparatus at the intermediate server identifies and eliminates nuisance electronic mail. A routing function routes to the intermediate server, electronic mail addressed to the receiving terminal with the modified address.
摘要:
A method of doing business that enables a computer power service broker operating over the World Wide Web (Web) to distribute and track such distribution of computer power. The computer power service broker solicits: each of a plurality of client computer stations on the Web to offer for general distribution over the Web computer power in excess to the computer power requirements of each respective client computer station; and a plurality of consumer stations on the Web to request the performance of functions requiring computer power. The broker then distributes each of said requested functions requiring computer power among a plurality of said client stations offering said computer power and then tracks and bills consumer stations for computer power used in performance of requested functions. Finally, the computer power broker tracks and compensates the client stations for the excess computer power that they contribute in performance of the requested functions. The compensation may be determined by the market value of the broken down functions or tasks.
摘要:
Systems, methods and media for searching documents based on text characteristics are disclosed. Embodiments may include receiving by a document searching system a request to search a document for a keyword and to limit the search based on one or more text characteristics associated with the keyword. Embodiments may also include performing by the document searching system a search of the document based on the keyword and the one or more associated text characteristics to find an instance of the keyword and generating by the document searching system a search result based on the performed document search. The text characteristics in some embodiments may include one or more of font style information, font emphasis information, highlighting information, or color information. In some embodiments, performing the search of the document includes finding an instance of the keyword where the keyword has characteristics that match at least one associated text characteristic.
摘要:
In one aspect, a method for comparing suppliers includes sending survey questions for receipt by supplier computer systems. Programming instructions are also sent for receipt and execution by the supplier computer systems. The programming instructions are for causing the supplier computer systems to return supplier survey answers to a server. The answers are included in responding documents and are defined in a certain format as data elements included in the responding documents. The data elements are then parsed from the responding documents responsive to predetermined programming instructions and evaluated the data elements responsive to a predetermined set of rules.
摘要:
The present invention provides a method, system, and computer program product for checking for viruses by adding a virus scanning capability to a data transfer device. In a method of the present invention a real-time virus checker is stored on a controller. The virus checker scans data as it is being written to a file. If a virus is detected, the suspected file is flagged. Anti-virus software is then invoked to perform a scan of the entire suspected file. In this manner, demands on CPU resources to perform scans will be greatly reduced as only those files marked as possibly containing a viruse need to be scanned, rather than scanning all the files on the entire data transfer device.
摘要:
Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon.
摘要:
A survey document is provided on a server, for delivery to a client on a network, having questions and potential answers in a format defining branches of the questions. Programming instructions are also provided on the server for delivery to the client on the network. The instructions are for causing the client to render questions on a user interface from the survey document. The questions initially rendered include a first one of the questions. The instructions are also for causing the client to branch to and render on the user interface second or third ones of the questions responsive to the survey document and an answer received for the first question.
摘要:
The creator or author of the Web document or page at the Web site source of the page is enabled to prioritize all of the hyperlinks to other Web documents embedded in the Web page in order to optimize the needs such as the business needs of the host. The prioritization is applied in the determination of the order in which the Web documents linked to the activated embedded hyperlinks in the Web document are to be accessed. The system is implemented through the inclusion of a hypertext markup language tag associated with each of the prioritized hyperlinks indicative of the priority level of the associated hyperlink. The implementation for designating a priority level for each of the hyperlinks may be enabled to change any previously designated priority levels for said hyperlinks. Such changes in any previously designated priority levels could be made applicable to the priority levels in previously distributed copies of said Web document.
摘要:
A method and apparatus for discovering services in a service registry. When an enterprise service bus receives a service request, the enterprise service bus determines whether the service name in the request exists in a service registry. If not, the enterprise service bus parses the service name into constituent words, obtains synonyms for each constituent word, and constructs new service names using the synonyms in the same word order as the constituent words in the service name. The enterprise service bus determines whether the constructed service names exist in the registry. If so, the enterprise service bus obtains an address of a service provider application associated with the constructed service name in the registry and sends a request for the service matching the constructed service name to the service provider application.
摘要:
The user requesting the search is enabled to analyze the list of excessive hits in a manner organized through a Web content manager on the user's display screen, and reduce the excessive hits through the elimination of extraneous domains or subdomains captured by the search.An implementation for reducing an excessive number of hits in a search result received at one of the receiving display stations on the Web comprising conventional means for displaying at said receiving display station, Web documents received from sources on the Web, and means for conducting keyword searches on the Web. There are means associated with the receiving display stations for displaying the number of Web documents hit by said keyword searches, together with means, responsive to an excessive number of Web document hits, for enabling a user to display a hierarchical level of the domains of the Web documents hit by said searches with a count of the number of hits for each domain, and means enabling the user to interactively eliminate selected domains to thereby reduce the excess number of hits in said search.