摘要:
A method, apparatus and computer product that, in a system having a client computer, and apparatus for connecting the client computer to a network having a server for backing up the client computer, enables transferring data from the client computer to the server, by connecting the client computer to the network; backing up data on the client computer to a storage device attached to the network when the client computer is connected to the network; and transferring the data from the storage device to the server, preferably at a time determined by the server.
摘要:
This invention provides systems, apparatus and methods for object management, employing agents for all personal computer objects. Personal objects survive in direct proportion to the degree to which they possess attributes that give them a competitive advantage in the use of the computing systems storage and name spaces. It employs an important competitive attribute of future utility. Since it is not always possible to accurately predict future utility, assessment of competitive advantage is based on secondary attributes that can be computed and that correlate with future utility, to a greater or lesser degree. It uses a ‘coordinating mechanic’ that monitors and controls relationships between personal objects and their agents. The term “object management” applies to computer systems, but is not necessarily limited to computer entities
摘要:
A method, apparatus and computer product for masking speech. The system includes a signal acquiring apparatus for generating an electrical signal representative of the speech; a processing apparatus for using the electrical signal to provide an audio signal which cancels the speech; and a signal generator, also referred to as a babble generator, for providing a speech masking signal to mask any speech not canceled. The masking signal is generated by processing the speech in one of several ways so that its content is not intelligible.
摘要:
A device 60 for time-shifting a first signal set with respect to a second signal set, as compared to the time sequence in which they were received, includes a receiver 44B, 46B, a storage means 44C, 46C, 70, a central processing unit 66, and a user interface 72. The first signal set 38 bears a cache marker 34 that directs the CPU to store it in a local storage. The second signal set 40 bears a recall marker 36 that uniquely identifies the first signal set 38 through the cache marker 34, and that determines a sequence in which the first and second signal sets are to be output. The CPU uses the recall marker and cache marker to sequence the first and second signal sets relative to one another in time that differs from the timed relation in which they were received. By storing the first signal set in a local storage, it need be broadcast or transmitted only once, eliminating the need to re-broadcast recurring commercial advertisements and conserving bandwidth.
摘要:
A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.
摘要:
A method, apparatus, and computer instructions for locating files. An input is received indicating that a file is to be saved. The file is saved in association with a unique identifier in a data store. The data store describes associations between files and unique identifiers, and files are retrieved based on unique identifiers in response to receiving the input.
摘要:
Systems and method for providing an auction. A computer server has a searchable database of items offered for sale by a plurality of sellers. The database is accessible by a plurality of sellers and a plurality of buyers. A conglomeration agent running on the server identifies related items for sale as a single conglomeration and stores the conglomeration in the database. The buyer may view both individual items for sale and conglomerations of items for sale, and place a bid on a conglomeration of such items or the individual item. If the bid matches the conditions set forth by the sellers, the sale of either a conglomeration or an individual item is completed. The system also generates a performance metric for both buyers and sellers which are also made available to buyer and sellers and may be used to assess the desirability of dealing with certain buyers or sellers.
摘要:
A combination of non-rotating storage and associated software temporarily transfers storage functions from a hard disk to the non-rotating storage. This invention provides for the “on the fly” adaptation and transfer of an application's disk requirements to be instead sent to a flash storage, non-spinning memory device, solid state memory, or similar device while the hard drive is powered down. This not only makes operations faster, but results in a large savings in battery power.