摘要:
The present invention provides a method, system and program product for deploying and allocating resources, and addressing threats in an autonomic sensor network ecosystem. Specifically, under the present invention, the autonomic sensor network ecosystem includes a set (e.g., one or more) of sensor networks each having a set of sensor peers and at least one super peer; a set of micro grid gateways; and a set of enterprise gateways. Each micro grid gateway is typically adapted to receive requests from a sensor network, an enterprise gateway, and/or another micro grid gateway. Moreover, each micro grid gateway includes a request broker for receiving the requests; a request queue manager for queuing the requests; a scheduler for scheduling the requests; and a resource manager for monitoring the set of sensor networks.
摘要:
The present invention provides a computer-implemented method, system, and program product for tracking a location of a user of a wireless device in a private network environment. Specifically, under the present invention, a wireless device user will form a data connection with a private network through a public network such as the Internet. At such a time “location” information will be communicated from the wireless device to the provider of the private network, which will use the information to track the location of the wireless device user. In addition, the provider of the private network can query the wireless device when updates to the information are desired. At this or any other time, the wireless device can be queried for any such updates.
摘要:
The present invention provides a method, system, and program product for managing conference calls. Specifically, under the present invention, a moderator and a set (at least one) of invitees (collectively referred to herein as participants) of a conference call are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. Thereafter, unique conference call numbers associated with the moderator and each of the set of invitees are determined (e.g., by accessing profiles for each participant contained within a directory or the like). Calls are then received from the moderator and invitees(s) using the unique conference call numbers assigned thereto. Although the calls were made using unique conference call numbers, the calls will then be joined under the present invention to initiate the conference call.
摘要:
The present invention provides a smart RFID infrastructure and method. Specifically, under the present invention, the infrastructure includes a set (e.g., one or more) of smart RFID tags adapted to communicate with one another, wherein each operating smart RFID tag is adapted to create an individual table of information pertaining to operation of other smart RFID tags. In addition, the infrastructure includes a set of writeable RFID tags adapted to communicate with and receive the individual table of information from each operating smart RFID tag, wherein each of the set of writeable RFID tags is further adapted to create a master table of information based on the individual table of information received from each operating smart RFID tag.
摘要:
The present invention provides a method, system, and program product for managing conference calls. Specifically, prospective conference call participants (e.g., moderators and/or invitees) will initially provide user profiles. A participant's profile will include, among other things, a set of contact numbers at which the participant can be reached. Thereafter, a moderator and a set of invitees of a conference call to be held are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. When the moderator later initiates the conference call, the present invention will access the profile of each invitee that accepted the invitation, and then call the invitees at the respective contact numbers set forth therein. When contact is made with an invitee, the call will be merged into the conference call with the moderator.
摘要:
The present invention provides a touch sensor track point (and methods) for a computer such as a laptop or portable device (e.g., PDA, cellular phone, etc.). The touch sensor track point includes a shaft (e.g., typically positioned on a keyboard) and a set (at least one) of directional sensors positioned over a top surface of the shaft. The set of directional sensors can detect manipulations in three dimensions (up-down, left-right, and in-out). In a typical embodiment, the touch sensor track point will cause a computer cursor to move in a direction that corresponds to a location on the set of directional sensors at which a vertical touch is applied. With such a capability, the touch applied to the set of vertical sensors can optionally be substantially horizontally motionless.
摘要:
The present invention provides a method, system, and program product for managing conference calls. Specifically, prospective conference call participants (e.g., moderators and/or invitees) will initially provide user profiles. A participant's profile will include, among other things, a set of contact numbers at which the participant can be reached. Thereafter, a moderator and a set of invitees of a conference call to be held are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. When the moderator later initiates the conference call, the present invention will access the profile of each invitee that accepted the invitation, and then call the invitees at the respective contact numbers set forth therein. When contact is made with an invitee, the call will be merged into the conference call with the moderator.
摘要:
The present invention provides a touch sensor track point (and methods) for a computer such as a laptop or portable device (e.g., PDA, cellular phone, etc.). The touch sensor track point includes a shaft (e.g., typically positioned on a keyboard) and a set (at least one) of directional sensors positioned over a top surface of the shaft. The set of directional sensors can detect manipulations in three dimensions (up-down, left-right, and in-out). In a typical embodiment, the touch sensor track point will cause a computer cursor to move in a direction that corresponds to a location on the set of directional sensors at which a vertical touch is applied. With such a capability, the touch applied to the set of vertical sensors can optionally be substantially horizontally motionless.
摘要:
The present invention provides a smart RFID infrastructure and method. Specifically, under the present invention, the infrastructure includes a set (e.g., one or more) of smart RFID tags adapted to communicate with one another, wherein each operating smart RFID tag is adapted to create an individual table of information pertaining to operation of other smart RFID tags. In addition, the infrastructure includes a set of writeable RFID tags adapted to communicate with and receive the individual table of information from each operating smart RFID tag, wherein each of the set of writeable RFID tags is further adapted to create a master table of information based on the individual table of information received from each operating smart RFID tag.
摘要:
The present invention provides a method, system, and program product for managing conference calls. Specifically, under the present invention, a moderator and a set (at least one) of invitees (collectively referred to herein as participants) of a conference call are identified. This is typically done based on synchronization with a calendar application used to send and accept an invitation to the conference call. Thereafter, unique conference call numbers associated with the moderator and each of the set of invitees are determined (e.g., by accessing profiles for each participant contained within a directory or the like). Calls are then received from the moderator and invitees(s) using the unique conference call numbers assigned thereto. Although the calls were made using unique conference call numbers, the calls will then be joined under the present invention to initiate the conference call.