摘要:
Systems and methods for processing autonomic e-mails, which each have at least one unique identifying number attached to them, are disclosed. Internally within an organization, e-mails are often sent to multiple recipients, such as to all members of a particular distribution list, to request information or ask that a task be performed by one or more, but less than all, of those recipients. The disclosed systems and methods help minimize the overall time burden to those recipients in responding to or trying to track such e-mails, and help the sender and recipients alike more easily view, manage and control such e-mails and their ultimate disposition, including the sender's e-mail and the plurality of responses sent by recipients. Separate viewable areas for each string or chain of related autonomic e-mails within each user's e-mail in-box and other e-mail storage areas are provided. These areas are preferably organized in a certain hierarchical manner and facilitate the user's ability to review and process such e-mails with greater dispatch and confidence. The e-mail's sender and at least certain recipients can help decide whether to terminate a particular thread of autonomic e-mail communications by designating it as completed or canceled. In either such situation, those e-mails which have not yet read by recipients can be moved to a “completed” folder or deleted altogether. This in turn saves the review time of those recipients who have been away or too busy to check the e-mails within their respective in-boxes.
摘要:
Domain name system (DNS) servers provide Internet protocol (IP) addresses that computers must have for finding websites on the Internet. A recent problem with navigating the Internet is that hackers have discovered ways to change the IP addresses stored on the DNS servers. An altered IP address will cause an Internet user to be directed to an incorrect or fraudulent website. In the present invention, an Internet user's computer stores domain names and corresponding IP addresses of all websites visited with the computer. Each time a website is accessed, the IP address received from the DNS server is compared to the IP address stored in the database. If the IP addresses are identical, then the newly received IP address is likely legitimate. If the IP addresses are different, then the newly received IP address is likely fraudulent, and the user can be warned before loading the website.
摘要:
An exemplary embodiment of the invention relates to a method, system, and storage medium for providing web-based electronic research and presentation functions via a document creation application. The method comprises scanning an active document on a computer device for identifying relevant keywords, and searching at least one database for reference materials relating to the relevant keywords. The active document includes data currently being entered or edited by a user on the computer device. Results relevant to the active document are automatically shown on the computer screen. The method also includes converting the reference materials if they are in a format different from the format used in creating the active document, and displaying the converted reference materials on the computer device. Embodiments of the invention also include a system and a storage medium.
摘要:
While documents which may be subject to existing copyrights are scanned to form electronically transmissible files, information is extracted from the copyright notice, supplemented by manual or automated research and processed by performing calculations of critical dates for geographical areas of interest preferably provided from memory as a table of algorithms to determine if the document is in the public domain or if a license for electronic distribution can be obtained. Automated generation and/or transmission of license requests is also provided. Deletion of electronic files from local storage for particular areas and identifiers thereof form indices for particular areas are also provided if a license for electronic distribution of particular documents is not obtained.
摘要:
During a presentation conducted between a presentation computer and a user/participant computer, synchronization of displayed pages on the presentation computer and a user/participant computer is achieved consistent with allowing the user/participant to browse the presentation pages by storing a page identifier responsive to each page change at the presentation computer and, at each such page change, sending a “go to [page number]” command to the user/participant computer to display the current page, after which browsing may be resumed, if desired. Automatic selection between available communication links for communicating the “go to [page number]” command is also provided.
摘要:
A method of modifying text or images on a display having defective pixels, in order to make the text or images more legible. The image or text is shifted away from nonfunctioning pixels, moving the picture to a suite of pixels that are functioning. Second, the image or text is resized to prevent the nonfunctioning pixels from interfering with the readability of the displayed picture. Resizing the image or text effectively enlarges or miniaturizes the display on an array of functioning pixels. Third, the system is programmed to select different wording or a different picture having the same meaning or effect as the original display. The selected replacement picture display is formatted and shifted to accommodate an array of functioning pixels, or at least more functioning pixels than the original display.
摘要:
Methods, brokerage systems and program products for enabling a mobile electronic device communicate with another electronic device for accomplishing a requested task without interrupting a user of the other electronic device. A task is requested at the mobile device and a transmission signal locates other electronic devices within a receivable range of the transmission signal. A number of scenarios of various combinations of located other devices is built, whereby each scenario is capable of accomplishing the requested task. One of these scenarios is selected, information relating to the task is sent to the electronic devices within such scenario, and then the requested task is performed by such selected electronic devices. Upon completion of the task, deliverables may be transmitted from the selected electronic device to a predetermined destination. Owners of the selected electronic devices may be rewarded for usage of their devices.
摘要:
Systems and methods for processing autonomic e-mails, which each have at least one unique identifying number attached to them, are disclosed. Internally within an organization, e-mails are often sent to multiple recipients, such as to all members of a particular distribution list, to request information or ask that a task be performed by one or more, but less than all, of those recipients. The disclosed systems and methods help minimize the overall time burden to those recipients in responding to or trying to track such e-mails, and help the sender and recipients alike more easily view, manage and control such e-mails and their ultimate disposition, including the sender's e-mail and the plurality of responses sent by recipients. Separate viewable areas for each string or chain of related autonomic e-mails within each user's e-mail in-box and other e-mail storage areas are provided. These areas are preferably organized in a certain hierarchical manner and facilitate the user's ability to review and process such e-mails with greater dispatch and confidence. The e-mail's sender and at least certain recipients can help decide whether to terminate a particular thread of autonomic e-mail communications by designating it as completed or canceled. In either such situation, those e-mails which have not yet read by recipients can be moved to a “completed” folder or deleted altogether. This in turn saves the review time of those recipients who have been away or too busy to check the e-mails within their respective in-boxes.
摘要:
A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
摘要:
During a presentation conducted between a presentation computer and a user/participant computer, synchronization of displayed pages on the presentation computer and a user/participant computer is achieved consistent with allowing the user/participant to browse the presentation pages by storing a page identifier responsive to each page change at the presentation computer and, at each such page change, sending a “go to [page number]” command to the user/participant computer to display the current page, after which browsing may be resumed, if desired. Automatic selection between available communication links for communicating the “go to [page number]” command is also provided including a voice over Internet protocol (VoIP) link separte from the communication link used for conducting the presentation.