摘要:
A method, computer program product, and a data processing system for distributing attendee information for use in a physical encounter involving multiple attendees is provided. An identifier assigned to a first data processing system associated with a first attendee is received by wireless transmission. A query including the identifier is formulated. The query is executed on an attendee database. A record of the database including an identity of the first attendee is wirelessly transmitted to a second data processing system associated with a second attendee responsive to execution of the query.
摘要:
Screensaver functionality is provided at the individual window level. A windows security module monitors the windows displayed by the computer to detect when a window becomes inactive in the display, for example by the user clicking and working within another window in the display. Upon becoming inactive, the windows security module overrides the application data being sent to a secured window and displays a predetermined screensaver-type image in its place, thereby hiding sensitive information from being displayed by the window during periods of inactivity. The windows security module can implement any user selected security type to hide or obscure the windows content such as blanking the individual window, displaying a text message or other graphic in the window, or minimizing the individual window upon becoming inactive. A time delay can also be set to delay the assertion of the security feature until a specified time following the window becoming inactive.
摘要:
A means by which possession of a credit card can be validated in transactions over the Internet is presented. As part of the payment transaction, a vendor instructs the user to use an electronic camera to take a picture of the credit card in a specific situation, such as being held in the user's hand or held against a generated computer screen. The resulting picture is emailed to the vendor, who forwards the image to the credit card company for verification.
摘要:
A method and system for searching source code of computer programs using parse trees are provided. With the method and system, a search query is provided in terms of the utility desired from source code meeting the search query. For example, a series of functions or operations to be performed by source code, that are indicative of the source code that is desired to be found by a user, may be entered as a search query. The search query is converted to one or more parse trees which are then compared against parse trees of source code maintained by the source code search engine database. Parse trees that have nodes matching the parse tree(s) of the search query are identified and a ranking of the extent of the matching between the parse trees is generated. Ranked search results are then returned identifying the source code that matches the search query.
摘要:
The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security clearance. Movement of the person in the zone is detected. A message is broadcast to selected data processing systems associated with the zone, wherein the data processing systems initiate actions to protect data in the selected data processing systems.
摘要:
Methods, systems, and computer program products are provided for spell checking URLs in a resource. Embodiments include identifying within a resource a URL, determining whether the URL is valid, and marking the URL as misspelled if the URL is invalid. In typical embodiments, determining whether the URL is valid is carried out by resolving a domain name contained in the URL. Typical embodiments also include suggesting an alternative spelling for the URL. In some embodiments, suggesting an alternative spelling for the URL is carried out by identifying a keyword in the resource, querying a search engine with the identified keyword, and selecting a URL in dependence upon search results returned by the search engine.
摘要:
A method and system for notifying an owner of a mobile electronic device of an unauthorized movement of the mobile electronic device from a physical location.
摘要:
Weight based upselling, including receiving a purchase request for an item from a customer; determining a weight of the item; identifying, in dependence upon the weight of the item, a shipping weight range and a shipping cost for the item, where the shipping weight range includes a maximum shipping weight; calculating a difference between the weight of the item and the maximum shipping weight in the shipping weight range; selecting an upsell item in dependence upon the difference between the weight of the item and the maximum shipping weight in the shipping weight range; and offering the upsell item to the customer, including offering to ship both the item and the upsell item for only the identified shipping cost.
摘要:
A data processing system that is capable of providing dynamically adjusted renderings of images is disclosed. The data processing system uses an operating system that provides a graphical user interface (GUI) displayable in a first color scheme. The data processing system further includes a least one, preferably more, device drivers supporting a second color scheme. More particularly, the system performs dynamically adjusted rendering from the first color scheme to the second color scheme. To perform such rendering, the system renders a graphic primitive in the first color scheme to a second color scheme and stores the rendered graphic primitive as a new second color scheme surface. This is repeated iteratively until such a time as the rendered surface has been completed. Preferably, the second color scheme is CYAN, MAGENTA, and YELLOW (CMY) and may further include BLACK (K).
摘要:
The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security clearance. Movement of the person in the zone is detected. A message is broadcast to selected data processing systems associated with the zone, wherein the data processing systems initiate actions to protect data in the selected data processing systems.