摘要:
A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset.
摘要:
A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset.
摘要:
Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied.
摘要:
Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied.
摘要:
An apparatus, system, and method are disclosed to dynamically estimate a response time while composing an email. A recipient module determines a set of email recipients identified by a user. The set of email recipients comprises intended recipients of a new email message from the user. A response time identification module determines a response time trend for each email recipient. Each response time trend has information relating to previous email response times of an email recipient. An estimate module determines an estimated response time for the new email message based on the retrieved response time trends. A display module displays a visual representation of the response time to the user.
摘要:
The present invention discloses an email application that includes a subject evaluation engine, which is able to automatically generate a subject heading suggestion for an email message based upon content contained in the email message. The subject evaluation engine can also compare a pre-existing subject heading of the email message against content contained in the email message. User selectable interface elements can be included in the email application for invoking the suggestion and comparison functions of the subject evaluation engine. Further, the subject evaluation can automatically be initiated before an email message is sent, can be used to notify a user when the message's subject is inconsistent with the message's content, and can suggest one or more replacement subject headings for the current heading.
摘要:
A method of managing the entry of individuals or email groups into their intended recipient field within a sender's email is disclosed. A predefined, static association between an intended recipient or email group and a To, CC, or BCC recipient field may be created by a sender. A new email message graphical user interface having General, To, CC, and BCC fields contained within the header is provided. When an individual or group is entered into the General recipient field it is automatically delegated to the To, CC, or BCC field with which it is associated. Provisions for ensuring that recipients with multiple field associations do not exist, that recipients with a predefined association are not entered into an incorrect field, for creating a predefined association with two recipient fields, and for creating a predefined association when none exists are also provided.
摘要:
Systems and methods for providing information regarding mailing list aliases to recipients of email messages that are sent using mailing list aliases are provided in the present invention. A method for providing information regarding mailing list aliases in an email message is provided. The method includes displaying an email message including at least one mailing list alias, and displaying a scope indicator in association with the mailing list alias, wherein the scope indicator provides a visual indication that a plurality of email addresses are mapped to the mailing list alias.
摘要:
A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input (403) of speech in the form of an audio communication from an input speaker (401) and generating a voice dataset (404) for the input speaker (401). The method includes receiving a text input (411) at the same device as the audio input (403) and synthesizing (312) the text from the text input (411) to synthesized speech including using the voice dataset (404) to personalize the synthesized speech to sound like the input speaker (401). In addition, the method includes analyzing (316) the text for expression and adding the expression (315) to the synthesized speech. The audio communication may be part of a video communication (453) and the audio input (403) may have an associated visual input (455) of an image of the input speaker. The synthesis from text may include providing a synthesized image personalized to look like the image of the input speaker with expressions added from the visual input (455).
摘要:
A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.