摘要:
This invention concerns a method and apparatus for manufacturing a sheet and a two-dimensional matrix of plastic optical fibers. The fibers may be of the step-index or graded-index type. Co-extrusion through a specially designed die is used to produce a sheet composed of a fiber array. The fiber sheet (ribbon) can be used for transmitting optical signals. These arrays may also be stacked and fused at high temperatures to form the two-dimensional matrix required for many applications such as large area image transfer. In addition, a high-speed, continuous manufacturing method is disclosed to produce a massive two-dimensional matrix of fibers. The method of manufacture permits high quality image transfer at low manufacturing cost in a wide array of geometries.
摘要:
This invention concerns a method and apparatus for manufacturing a sheet and a two-dimensional matrix of plastic optical fibers. The fibers may be of the step-index or graded-index type. Co-extrusion through a specially designed die is used to produce a sheet composed of a fiber array. The fiber sheet (ribbon) can be used for transmitting optical signals. These arrays may also be stacked and fused at high temperatures to form the two-dimensional matrix required for many applications such as large area image transfer. In addition, a high-speed, continuous manufacturing method is disclosed to produce a massive two-dimensional matrix of fibers. The method of manufacture permits high quality image transfer at low manufacturing cost in a wide array of geometries.
摘要:
Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user.
摘要:
Included are method, article of manufacture, and device that serve to identify one or more tracked categories in a document, the tracked category representing a portion of the document, identify a change in one or more of the tracked categories of the document, identify a client to notify of the change in the tracked category, and send a notification to a client, where the notification provides notice that a change has occurred in a tracked category of a document.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
A pattern corresponds to a task that a computing system can perform. The pattern at least indirectly identifies one or more sub-application programs of one or more application programs that the computing system can run and that are relevant to the task. Application of the pattern to sub-application programs of application programs currently running on the computing system identifies a working set of one or more sub-application programs of one or more application programs currently running on the computing system and that are relevant to the task. The computing system hides, within a graphical user interface that the computing system presents, the sub-application programs of the application programs currently running on the computing system that are not part of the working set, and the application programs currently running on the computing system that do not include any sub-application program that is part of the working set.
摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise.
摘要:
In a method and system for removing email forwarding duplication, when an email was sent for the first time, the email was assigned a unique identifier. An aggregate recipient list was created and associated with the unique identifier. When the email is to be forwarded, the aggregate recipient list has recipients previously forwarded the email. The recipient list of the forwarding email is compared with the aggregate recipient list. If duplicate email addresses are found, the duplicate email addresses are displayed to a sender of the forwarding email. If the sender chooses not to send the forwarding email to the duplicate email addresses, the duplicate email addresses are removed from the recipient list of the forwarding email. New recipients of the forwarding email are added to the aggregate recipient list. The forwarding email with the unique identifier is sent to the recipient list.
摘要:
A method and apparatus for managing resources is provided. Responsive to a request for a set of resources by a user, a token is added to a response to the request generated by a server application. The requests are monitored from the user. The token identifies the user. A pattern of use by the user is identified. A determination is made as to whether overuse of the set of resources has occurred based on the pattern of use and a policy.