摘要:
Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records.
摘要:
In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route.
摘要:
A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.
摘要:
A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.
摘要:
A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.
摘要:
A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account.
摘要:
A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.
摘要:
A method for automatically merging e-mail replies containing reviewer comments to open source software code is disclosed. Individual reply messages may be identified for merger and evaluated for comments for each line of code. Comments, context information, and reviewer information may then be extracted and incorporated into a merged reply message where each line of code commented on contains comments associated with that line of code. The merged reply message may then be transmitted back to the sender with the incorporated comments.
摘要:
In response to a payor planning a specific payment for a given amount to a payee, the given amount is reserved from a balance of a financial account of the payor from which the specific payment is to be made. As such, the given amount reserved from the balance is only available for settling the specific payment and is otherwise unavailable. After the payor has planned the specific payment for the given amount to the payee, in response to the specific payment for the given amount actually being made to the payee, the given amount reserved from the balance of the financial account is used to settle the specific payment for the given amount being made to the payee.
摘要:
Methods and systems for using radio frequency identification (“RFID”) to automatically lock and unlock a mobile computing device. An RFID transceiver is installed in connection with a locking device. The locking device can secure the mobile computing device to a cable, which is securable to a physical structure. An RFID transmitter is configured to detect a signal from the RFID transceiver within a predetermined distance range and send a response signal to the RFID transceiver. If the RFID transmitter is within the range, the RFID transceiver detects the response signal from the RFID transmitter and issues an unlocking signal to change the position of the locking device to an unlocked position. If the RFID transmitter is outside of the range, the RFID transceiver does not detect a response signal from the RFID transmitter, and issues a locking signal to change the locking device position to a locked position.