摘要:
A system and method for preventing user-input text strings of illegal lengths from being submitted to a database where, for each character in the string, a character length is determined in quantities of digital units of storage according to an encoding schema, the character lengths are accumulated into a total string length, also measured in digital units of storage, and the total string length is compared to one or more database input field requirements such as non-null and maximum length specifications. If a limit is not met, the system and method are suitable disposed in a manner to block or prevent submission of the user-input string to the database. The invention can alternatively be realized as a plug-in for database front-end application programs, as a stand-alone web services provider, or as a plug-in for a client-side database access program such as a web browser.
摘要:
A method for viewing and controlling data intermediately between source and destination by receiving from a graphical user interface a user designation of a plurality of sets of copy command destination positions within contents of a computer file, wherein each destination point is allowed to be included in more than one set of destination points; displaying to the user information elements contained in an operating system clipboard transfer buffer; receiving a user selection of information elements in the clipboard transfer buffer; receiving a user definition of a subset of the previously-designated copy command destination positions; and automatically copying the selected information elements to positions in the computer file according to the user defined subset of copy command destination positions.
摘要:
A system and method for preventing user-input text strings of illegal lengths from being submitted to a database where, for each character in the string, a character length is determined in quantities of digital units of storage according to an encoding schema, the character lengths are accumulated into a total string length, also measured in digital units of storage, and the total string length is compared to one or more database input field requirements such as non-null and maximum length specifications. If a limit is not met, the system and method are suitably disposed in a manner to block or prevent submission of the user-input string to the database. Overflow sub-strings are extracted and stored from input strings which exceed the input length limit, and are further processed to yield additional storage and resource allocation.
摘要:
A method for viewing and controlling data intermediately between source and destination by receiving from a graphical user interface a user designation of a plurality of sets of copy command destination positions within contents of a computer file, wherein each destination point is allowed to be included in more than one set of destination points; displaying to the user information elements contained in an operating system clipboard transfer buffer; receiving a user selection of information elements in the clipboard transfer buffer; receiving a user definition of a subset of the previously-designated copy command destination positions; and automatically copying the selected information elements to positions in the computer file corresponding according to the user defined subset of copy command destination positions.
摘要:
An Intermediate Viewer having a user interface which allows viewing, manipulation, and transfer of information elements contained in a transfer buffer to be transferred to a plurality of destination points or areas, with the destination points or areas being defined as belonging to one or more sets of destination points or areas.
摘要:
A process of segmenting a single email so that portions of it may be directed to or away from select recipients is disclosed. The sender highlights portions of the email and right clicks (or key command, button, or menu item) and selects an option to select recipients. The operator interface then provides the sender with the option of selecting recipients from their address book or the server's address book. To speed the process along, the sender may select those already on the To, Cc, or Bcc distribution lists. The sender then selects whether those chosen will receive the highlighted portion or if they will be excluded from receiving it. Lastly, the sender will have the option of providing text that is unique to each of the selected groups.
摘要:
A system and method for storing IM text in a repository where it can be searched by topic or participant based filters is disclosed. The repository may be a centralized database on the server side or it may be distributed in the client environment. The system comprises an IM Topic (IMT) program, an IM Filter (IMF) program, an IM save program (IMS), and an IM automatic alert (IMAL) program. The IMT program assigns topic tags to turns and topic shifts in the IM conversation. The IMF program searches the repository based on user selection of filters as well as full text search. There may be any number of topic tags. The IMS program automatically scans IM transcripts for topic tags and identifiers and saves transcripts or transcript segments that match pre-selected topic tags or identifiers to the repository. The IMAL program sends notifications and/or exports transcripts or transcript segments to pre-designated addresses when a match is made between a topic or identifier in a transcript and a pre-selected topic or identifier.
摘要:
Systems, methods and media for sharing input device movement information between users of an instant messaging system on a network by facilitating transmission and display to one user input device movement information from another user are disclosed. Embodiments may include receiving tracking information by a first client computer system where the tracking information relates to input device movement associated with a second client computer system. Embodiments may also include determining an equivalent movement based on the received tracking information and displaying the equivalent movement by the first client computer system. Tracking information may include one or more of a beginning or ending point for highlighting, a beginning or ending point for pointer movement, or an indication of velocity or emphasis. Displaying the equivalent movement may include displaying a moving ghost pointer or highlighting at the first client computer system.
摘要:
A method for grouping IM statements together into a plurality of topics and displaying the topics in separate windows comprising a Configuration Program (CP), a Topic Creation Program (TCP), and a Statement Classification Program (SCP). The CP allows a user to configure the global options for the present invention such as designating the parties authorized to create a topic, specifying whether the topic name and/or keywords are negotiable, and specifying whether icons should be displayed with the topic name. The TCP allows a user to create a topic by specifying the topic name, selecting a statement classification method, designating keywords to be used in searching the statements, and adding an icon to the topic name. When a statement is submitted to an IM channel, the SCP places the statement into one of the topics based on the statement classification method selected in the TCP.
摘要:
A method and apparatus is provided for automatically detecting display sharing, setting display sharing status, and generating alerts in instant messaging. If the display is shared, the present invention intercepts an instant message before it is displayed and generates alerts to senders. Senders have options to display the message, delete the message, or allow the message to be queued until display is no longer shared. Alternatively, if the sender's instant messaging application supports the functionality, the mechanism of the present invention may present the user with options to display the message or allow the message to be queued until display is no longer shared without sending an alert message. A privacy list of contacts may be automatically built when integrated with a calendar system for controlling instant messaging access and behavior.