摘要:
A method and apparatus in a data processing system for modifying content of a document. A request is received for modified content. The document is compressed using a set of rules, wherein selected content in the document is removed to increase a speed at which a user can read the document.
摘要:
The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. This process is similar to the existing word processor capability to highlight areas on a document and then assign rich text attributes, such as BOLD, ITALICS, etc., to those areas. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
摘要:
Content is transferred from one computer resource to another by enabling automatic cutting-and-pasting in a destination first, source second sequence, a user selecting insertion points in the contents of a destination computer resource, followed by the user selecting information elements in a source computer resource, subsequently automatically intercepting transfer of the selected information elements to the destination, determining which intercepted information elements are expressed in a natural language not matching a user-specified natural language, invoking a rule management user interface to allow the user to define an action to be taken, performing the specified language handling actions on the intercepted information elements, and transferring translated information elements to the destination computer resource.
摘要:
Modeling grid projects is provided. A prediction of processor and network availability in a grid computing system are identified during a period of time. A grid project description model is generated utilizing a modeling language designed to describe phases of the grid project. The grid project description model is processed to determine an amount of processor and network resources needed for execution of the grid project. A graph is generated including a first curve representing the prediction of processor availability and a second curve representing the prediction of network availability. A simulation of execution of the grid project is generated based on the prediction of processor and network availability. A plot of utilization of processor and network resources required to complete execution of the grid project is added to the graph while keeping utilization of processor resources within the first curve and utilization of network resources within the second curve.
摘要:
Systems and media for awarding credits based on provided usage information are disclosed. More particularly, hardware and/or software for collecting and disseminating usage information related to electronic documents and for awarding usage credits to users in exchange for providing usage information are disclosed. Embodiments include receiving an indication of the usage of an electronic document by a user and aggregating the received usage indication for the document with usage indications relating to other users. Embodiments may also include creating document utilization information for the electronic document based on the aggregated usage indications and awarding usage credit to the user based on the user's providing statistics on the usage of the electronic document. Further embodiments may include transmitting an indication of the awarded usage credit to the user and receiving a request to use the usage credits.
摘要:
A method and apparatus for a grid project throttle control for controlling the rate at which a grid job utilizes processor and network resources at the grid node. This throttling mechanism controls the rate of network and processor utilization based on a determination of the expected network and processor availability determined when a grid project is scheduled so that the grid project does not adversely affect the functioning of the nodes with regard to their regular, non-grid work.
摘要:
A method and implementing computer system are provided in which selected information is embedded within computer program structures without requiring separate bit strings. In an exemplary embodiment, the embedded selected information includes an identification of a licensed user together with a serial number of the associated licensed program. That information is converted into a binary representation, and a transfer function is used to embed the binary representation into the structure of the licensed program. In the example, when a licensed program is compiled, linked and downloaded over an interconnection network, the order or sequence of the modules of the licensed program is arranged in a manner to correspond to the embedded selected information. The embedded information can then be extracted from the program by analysis of the organization of the modules comprising the program.
摘要:
The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
摘要:
A method and system are provided in which teleconference calls are scheduled in advance and, at an appropriate predetermined time, calls are automatically made to the designated participants of the conference calls thereby avoiding the need for the participants to call into a teleconference center. In a preferred embodiment, when teconferences are scheduled, the telecon participants are designated and their phone numbers are input or otherwise determined, for example, through access to a centralized database. A calendar is monitored and at a predetermined time relative to the scheduled start of the telecon, a server system application initiates the calling of the participants for connection to the telecon. The system may be configured to require participants to enter a password before the connection is completed. The status of the called participants is determined and displayed on individual display devices of the other participants in the telecon. In one example, designated participants are called back at selected intervals if the initial automated call is unanswered.
摘要:
A digital camera which allows voice annotations to be recorded for each picture, but which includes text annotations with each such picture when the picture is transmitted from the camera. The digital camera includes an image sensing apparatus operable to receive light comprising an image and output image data representing the image, a first memory operable to store the image data, a sound sensing apparatus operable to receive a sound and output sound data representing the sound, wherein the sound is speech and the sound data is voice data, a second memory operable to store the voice data, a third memory operable to store text data; and a voice recognition apparatus operable to access the second memory, translate the stored voice data into text data and store the text data in the third memory, when the digital camera is provided with external power. In one embodiment, the voice recognition apparatus includes a microprocessor operable to execute image capture routines, voice recording routines and voice recognition routines. The microprocessor may be further operable to execute data transfer routines.