摘要:
A system, method, and computer-usable medium for mitigating audible acknowledgement volume in a vehicle security system. A preferred embodiment of the present invention includes measuring an amplitude of a valid signal, in response to receiving the valid signal; in response to determining the amplitude of the valid signal, comparing the amplitude to a first predetermined threshold; in response to the comparison, adjusting a volume setting of an audible acknowledgement; further adjusting the volume setting in response to measuring ambient noise of a surrounding location; and emitting the audible acknowledgement.
摘要:
A system, method, and computer-usable medium for mitigating audible acknowledgement volume in a vehicle security system. A preferred embodiment of the present invention includes measuring an amplitude of a valid signal, in response to receiving the valid signal; in response to determining the amplitude of the valid signal, comparing the amplitude to a first predetermined threshold; in response to the comparison, adjusting a volume setting of an audible acknowledgement; further adjusting the volume setting in response to measuring ambient noise of a surrounding location; and emitting the audible acknowledgement.
摘要:
Dynamic language checking includes identifying questionable language usage; creating a query in dependence upon the questionable language usage; querying a search engine with the query; receiving from the search engine search result statistics describing the search results for the query; and determining, in dependence upon search results statistics returned by the search engine, whether the questionable language usage is proper language usage.
摘要:
A method of regulating electronic message traffic is proposed. The method comprises sending an electronic message as part of a thread, receiving a response to the message, and tabulating said response in a counter. A data processing system compares the counter to a threshold and, in response to the comparing step, designates the thread as off-topic.
摘要:
Methods, systems, and computer program products are described for logging off a user from a website, including detecting through a browser a predefined exit channel for a website; detecting a user's leaving the website outside the predefined exit channel; and guiding browser operation toward the predefined exit channel.
摘要:
A system, system, and program for facilitating navigation of voice data are provided. Tokens are added to voice data based on predefined content criteria. Then, bidirectional scanning of the voice data to a next token within the voice data is enabled, such that navigation to pertinent locations within the voice data during playback is facilitated. When adding tokens to voice data, the voice data may be scanned to detect pauses, changes in voice inflection, and other vocal characteristics. Based on the detected vocal characteristics, tokens identifying ends of sentences, separations between words, and other structures are marked. In addition, when adding tokens to voice data, the voice data may be first converted to text. The text is then scanned for keywords, phrases, and types of information. Tokens are added in the voice data at locations identified within the text as meeting the predefined content criteria.
摘要:
A WIFI-enabled and GPS-enabled user device executes a hotspot location utility, which enables the device to detect WIFI hotspots and update a locally-stored hotspot location database (LHLD) containing geographically-mapped hotspots. When a hotspot is detected, the device accesses the hotspot, retrieves identification information and usage terms from the hotspot, and measures performance metrics of the hotspot. The utility stores the identified hotspot with the current GPS coordinate as an entry within the LHLD. When a user later desires to locate hotspots within a particular geographic location, the user enters the physical address of the location, and hotspots with matching (or proximate) GPS coordinates of the entered address are presented to the user. The user may specify certain preferences for usage terms, performance metrics, and location criteria, and the utility filters all geographic hits and returns only hotspots in the geographic location that also satisfy these preferences.
摘要:
A method, system, and computer program product for efficiently generating a substantially accurate list of available hotspots in geographic locations. A computer system configured with a hotspot location utility operates as a Provider. The Provider receives from a mobile device a hotspot operability/ayailability transmission (HOT), which includes an identification of a currently operating and available hotspot. The Provider concurrently receives a current GPS coordinate of the device transmitting the HOT. Then, the provider stores the HOT and associated GPS coordinate within a hotspot locator database. When the Provider later receives a request from a user searching for hotpots within a particular geographic location, the Provider determines which acceptable entries of the multiple entries are in geographic locations in proximity to the particular geographic location and then provides an output of the acceptable entries to the user.
摘要:
A method, system, and program provide for voice mail management. A voice mail filtering controller calculates a separate Bayesian score for each voice mail message from among multiple voice mail message entries received into a voice mailbox for a user, wherein each separate Bayesian score indicates a probability that the associated voice mail message is unwanted by said user. During playback, the voice mail filtering controller automatically deletes a selection of the voice mail messages each with a separate Bayesian score greater than a particular Bayesian score of the last played voice mail message from the voice mailbox.
摘要:
Safe deposit boxes, services, and methods for physically secure data storage are provided that include securing a network-enabled computer within a safe deposit box, receiving, in the network-enabled computer, data transmitted from a remote computer coupled for data communications with the network-enabled computer; and storing the data in the memory of the network-enabled computer. Securing a network-enabled computer within a safe deposit box may be carried out by providing a locked safe deposit box having the networked enabled computer stored within. Securing a network-enabled computer within a safe deposit box may be carried out by providing a lockable safe deposit box having the networked enabled computer integrated within.