摘要:
Methods for monitoring user specific information on websites by searching websites and displaying the results based at least partially on geographical region are disclosed. Embodiments may include receiving a search request including one or more keywords and searching a database based on the received search request to generate search results, where the search results include an indication of one or more websites each with an associated geographical region. Embodiments may also include generating a geographical user interface page based on the search results, where the page includes an indication of the one or more opinion websites superimposed on a map based on their associated geographical region. Embodiments may further include transmitting the generated geographical user interface page. Further embodiments may include generating geography-based directed advertising based on the search results or receiving and storing a rating for a website from a user.
摘要:
Systems, methods and media for managing software defects by aggregating potential software defect information from a plurality of user computer systems are disclosed. Embodiments may include receiving a plurality of software state logs each from an originating user computer system, where each software state log is associated with a potential software defect of an application executing on its originating user computer system and each software state log includes software state information associated with its originating user computer system. Embodiments may also include storing the received software state logs in a defect repository and analyzing the software state information of the stored software state logs to detect patterns in the software state information. Further embodiments may include verifying that a potential software defect associated with a software state log is a defect and transmitting a verification of the software defect to the particular user computer system.
摘要:
Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon.
摘要:
A survey document is provided on a server, for delivery to a client on a network, having questions and potential answers in a format defining branches of the questions. Programming instructions are also provided on the server for delivery to the client on the network. The instructions are for causing the client to render questions on a user interface from the survey document. The questions initially rendered include a first one of the questions. The instructions are also for causing the client to branch to and render on the user interface second or third ones of the questions responsive to the survey document and an answer received for the first question.
摘要:
The creator or author of the Web document or page at the Web site source of the page is enabled to prioritize all of the hyperlinks to other Web documents embedded in the Web page in order to optimize the needs such as the business needs of the host. The prioritization is applied in the determination of the order in which the Web documents linked to the activated embedded hyperlinks in the Web document are to be accessed. The system is implemented through the inclusion of a hypertext markup language tag associated with each of the prioritized hyperlinks indicative of the priority level of the associated hyperlink. The implementation for designating a priority level for each of the hyperlinks may be enabled to change any previously designated priority levels for said hyperlinks. Such changes in any previously designated priority levels could be made applicable to the priority levels in previously distributed copies of said Web document.
摘要:
A method and apparatus for discovering services in a service registry. When an enterprise service bus receives a service request, the enterprise service bus determines whether the service name in the request exists in a service registry. If not, the enterprise service bus parses the service name into constituent words, obtains synonyms for each constituent word, and constructs new service names using the synonyms in the same word order as the constituent words in the service name. The enterprise service bus determines whether the constructed service names exist in the registry. If so, the enterprise service bus obtains an address of a service provider application associated with the constructed service name in the registry and sends a request for the service matching the constructed service name to the service provider application.
摘要:
The user requesting the search is enabled to analyze the list of excessive hits in a manner organized through a Web content manager on the user's display screen, and reduce the excessive hits through the elimination of extraneous domains or subdomains captured by the search.An implementation for reducing an excessive number of hits in a search result received at one of the receiving display stations on the Web comprising conventional means for displaying at said receiving display station, Web documents received from sources on the Web, and means for conducting keyword searches on the Web. There are means associated with the receiving display stations for displaying the number of Web documents hit by said keyword searches, together with means, responsive to an excessive number of Web document hits, for enabling a user to display a hierarchical level of the domains of the Web documents hit by said searches with a count of the number of hits for each domain, and means enabling the user to interactively eliminate selected domains to thereby reduce the excess number of hits in said search.
摘要:
Systems, methods and media for managing software defects by aggregating potential software defect information from a plurality of user computer systems are disclosed. Embodiments may include receiving a plurality of software state logs each from an originating user computer system, where each software state log is associated with a potential software defect of an application executing on its originating user computer system and each software state log includes software state information associated with its originating user computer system. Embodiments may also include storing the received software state logs in a defect repository and analyzing the software state information of the stored software state logs to detect patterns in the software state information. Further embodiments may include verifying that a potential software defect associated with a software state log is a defect and transmitting a verification of the software defect to the particular user computer system.
摘要:
A user is provided with a simple inexpensive and interactively intuitive implementation of selectively turning spam off his receiving E-mail terminal. An E-mail distribution system for eliminating nuisance electronic mail, e.g. spam, from mail sent to said receiving terminals from sending locations remote from such terminals. Respective conventional addresses are assigned to each of the receiving terminals and there is a conventional implementation for addressing mail respectively to each of these receiving terminals. An implementation respectively at each of the receiving terminals enables the user to modify the receiving terminal address to include the designation of a server intermediate the sending location and apparatus at the intermediate server identifies and eliminates nuisance electronic mail. A routing function routes to the intermediate server, electronic mail addressed to the receiving terminal with the modified address.
摘要:
An apparatus, method, and system for determining the shape of a three dimensional object. In a preferred embodiment, the apparatus includes an array of sensors and elastic connections between the sensors within the array. When placed over a three dimensional object, the array of sensors deforms to conform to the surface topology of the three dimensional object. The sensors are connected to a data processor in which the data from the sensors is taken to construct a three-dimensional representation of the actual physical three dimensional object.