Abstract:
An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The audio system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device.
Abstract:
An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices.
Abstract:
An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device.
Abstract:
The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user.
Abstract:
A method and system creates virtual email identifications and dynamically map the virtual email-ids to the real email identities. A virtual email identify will be described in a specific fixed syntax that is easy for the users to remember and implement. The virtual email-id is dynamically mapped to one or more real email-ids by using a database of employees or other personnel maintained by the organization. The database can have various configurations that will be a function of the organization of the entity and the relationships of the persons in the entity.
Abstract:
The present invention provides a mobile station implemented method for managing a requested name and phone record. The method comprises steps of the requester associated device receiving a user's identification from a mobile station phonebook owner and a search term. The requester associated device transmits the user identification of the mobile station phonebook owner and the search term. Receiving at least one matching name and phone record, the requester associated device presents the at least one matching name and phone record to a user. The requester associated device receives a user management command to perform an action on the name and phone record. The method may complete when the requester associated device performs the action on the name and phone record.
Abstract:
A method is disclosed to assign Priority to Processes based on Roles. The method calculates the process priority of the process using a scheduler running in the computer system, based on either a first weight of a first role, a second weight of a second role, or a calculated weight if both the first and second roles can unlock access to the process. The method then assigns a share of the computer system's time to the process, the share of time being based on the process priority calculated for the process.