Abstract:
A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer implemented method, apparatus and computer usable program for managing files. SOLUTION: A set of origination locations for a plurality of files is identified to form a set of identified origination locations in response to a request to view the plurality of files. Each origination location in the set of identified origination locations identifies a location from which a file in the plurality of files is received. A representation of the plurality of files is presented using a set of graphical indicators based on the set of identified original locations. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a device and a method for transmitting the depth queue of an image in a Web page to a visually disabled user. SOLUTION: A first form provides, a depth queue method and comprises scanning a depth map corresponding to the image in response to a user input. A non-visual queue corresponding to the depth value of the depth map is outputted at each pixel. A second form provides a computer program product and comprises a program for scanning the depth map corresponding to the image in response to the user input so that the non-visual queue corresponding to the depth value of the depth map is outputted at each pixel. A third form provides a data processing system and comprises a circuit for scanning the depth map and a circuit for outputting the non-visual queue corresponding to the depth value of the depth map. The non-visual queue is outputted at each pixel.
Abstract:
A portable apparatus (120) includes telecommunications circuitry (375) operable to communicate on a wireless carrier system, and a slave device (470) coupled to the telecommunications circuitry. The slave device (470) is operable to: receive a close-range, standard-protocol signal notification (440) from a master device (430) affixed to a vehicle, and trigger the telecommunications circuitry (375) to transmit to the wireless carrier system notification of an emergency event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.
Abstract:
A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
Abstract:
A system and method for using semantic analysis to configure a voice reader is presented. A text file includes a plurality of text blocks, such as paragraphs. Processing performs semantic analysis on each text block in order to match the text block's semantic content with a semantic identifier. Once processing matches a semantic identifier with the text block, processing retrieves voice attributes that correspond to the semantic identifier (i.e. pitch value, loudness value, and pace value) and provides the voice attributes to a voice reader. The voice reader uses the text block to produce a synthesized voice signal with properties that correspond to the voice attributes. The text block may include semantic tags whereby processing performs latent semantic indexing on the semantic tags in order to match semantic identifiers to the semantic tags.
Abstract:
A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
Abstract:
A portable apparatus includes telecommunications circuitry operable to communicate on a wireless carrier system, and a slave device coupled to the telecommunications circuitry. The slave device is operable to i) receive a close-range, standard-protocol radio signal notification from a master device affixed to a vehicle, and ii) trigger the telecommunications circuitry to transmit a wireless carrier system notification of the event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.
Abstract:
A method, program and system for providing access to alternate formats within an electronic document are provided. The invention comprises parsing a web page and creating a document object model (DOM), and then parsing the alternate format attribute of an image element within the DOM. The browser then displays the web page containing an image (or images) according to the default settings of the browser. A user interface is specified which allows the user to select alternate formats for the default image. This user interface may be in the form of a pop up menu that is presented to the user in response to an input command, such as a right mouse click on the default image. The user can then select an alternate format which replaces the original image in the web page. Alternate formats may include text, audio, or tactile formats.
Abstract:
A portable apparatus includes telecommunications circuitry operable to communicate on a wireless carrier system, and a slave device coupled to the telecommunications circuitry. The slave device is operable to i) receive a close-range, standard-protocol radio signal notification from a master device affixed to a vehicle, and ii) trigger the telecommunications circuitry to transmit a wireless carrier system notification of the event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.