摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A system and associated method for migrating from a first application to a second application where the second application is an alternative to the first application with respect to functionality. Overlaying a first graphical user interface (GUI) onto the second application where the first GUI corresponding to the first application. Sending to a display device a set of steps which if executed would invoke a feature utilizing a second GUI after the feature was invoked utilizing the first GUI. Removing the first GUI with respect to the feature and displaying the second GUI with respect to the feature after satisfying a condition. Finally, repeating the steps of sending to a display device and removing the first GUI for all features common to both the first application and the second application.
摘要:
A system and associated method for migrating from a first application to a second application where the second application is an alternative to the first application with respect to functionality. Overlaying a first graphical user interface (GUI) onto the second application where the first GUI corresponding to the first application. Sending to a display device a set of steps which if executed would invoke a feature utilizing a second GUI after the feature was invoked utilizing the first GUI. Removing the first GUI with respect to the feature and displaying the second GUI with respect to the feature after satisfying a condition. Finally, repeating the steps of sending to a display device and removing the first GUI for all features common to both the first application and the second application.
摘要:
A system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
摘要:
A system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
摘要:
A system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
摘要:
System, method, and program storage device for adaptive generation of problem determination decision procedures are provided. The decision procedures may be used, for example, for isolating problems and determining solutions to the problems in complex systems, such as IT systems and consumer electronics products. In one aspect, an optimal decision procedure is generated from an universal representation of system states and actions.