Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A stocktaking asset article system using a mobile terminal in which correct and rapid updates or new registrations of assets in an asset management master database may be accomplished. The mobile terminal has a specified database storing data necessary for the stocktaking, means for reading specific information from the asset article, means for retrieving information regarding the asset article from the specified database on the basis of the specific information, and inputting means for inputting information regarding an asset article recognized as not existing in the specified database. An assets management apparatus has means for extracting the data necessary for the stocktaking from the master database and registering the data as the specified database, and means for reflecting the information inputted from the inputting means upon the stocktaking on the master database.
Abstract:
A management system for an Internet Data Center, comprising an Information Technology and Network Management System IT&N for managing the Data Center, a Building Management System BMS for monitoring facilities related to the IDC such as access control, fire protection and intruder protection, and a Facility Management System FMS for maintaining geographical views and information about equipment, furniture and building space. The BMS is connected to the IT&N for transmitting event data whenever an event occurs, such as when a parameter associated with the event leaves a predetermined range. The IT&N comprises an Operational Support Service OSS for processing event data, defining actions resulting from the processing and transmitting commands to the BMS and/or to the IT&N in response to the defined actions.
Abstract:
In one embodiment, optimizing inventory includes accessing service level band sets. Each service level band set is associated with a policy group, and includes service level bands. Each service level band of a service level band set has a service level priority with respect to any other service level bands of the same service level band set. An inventory band set is determined for each service level band set. Each inventory band set includes inventory bands, where each inventory band satisfies a corresponding service level band assuming an unconstrained network. Each inventory band of an inventory band set has an inventory priority with respect to any other inventory bands of the same inventory band set. A feasible supply chain plan that satisfies the inventory band sets is generated in order of the inventory priorities until a constrained network is depleted.
Abstract:
A management system for an Internet Data Center, comprising an Information Technology and Network Management System IT&N for managing the Data Center, a Building Management System BMS for monitoring facilities related to the IDC such as access control, fire protection and intruder protection, and a Facility Management System FMS for maintaining geographical views and information about equipment, furniture and building space. The BMS is connected to the IT&N for transmitting event data whenever an event occurs, such as when a parameter associated with the event leaves a predetermined range. The IT&N comprises an Operational Support Service OSS for processing event data, defining actions resulting from the processing and transmitting commands to the BMS and/or to the IT&N in response to the defined actions.
Abstract:
A management system for an Internet Data Center, comprising an Information Technology and Network Management System IT&N for managing the Data Center, a Building Management System BMS for monitoring facilities related to the IDC such as access control, fire protection and intruder protection, and a Facility Management System FMS for maintaining geographical views and information about equipment, furniture and building space. The BMS is connected to the IT&N for transmitting event data whenever an event occurs, such as when a parameter associated with the event leaves a predetermined range. The IT&N comprises an Operational Support Service OSS for processing event data, defining actions resulting from the processing and transmitting commands to the BMS and/or to the IT&N in response to the defined actions.
Abstract:
A method of automatically detecting damage following a loss causing incident is disclosed. The method includes capturing image information about a group of physical objects in their initial states and comparing these with image information about the group of physical objects in their modified states following a loss causing incident. The method includes detecting discrepancies between the initial and modified states and automatically assesses the degree of damage and/or loss.
Abstract:
In one embodiment, optimizing inventory includes accessing service level band sets. Each service level band set is associated with a policy group, and includes service level bands. Each service level band of a service level band set has a service level priority with respect to any other service level bands of the same service level band set. An inventory band set is determined for each service level band set. Each inventory band set includes inventory bands, where each inventory band satisfies a corresponding service level band assuming an unconstrained network. Each inventory band of an inventory band set has an inventory priority with respect to any other inventory bands of the same inventory band set. A feasible supply chain plan that satisfies the inventory band sets is generated in order of the inventory priorities until a constrained network is depleted.