Described are methods to accommodate user interests in content available in information-rich software environments. As a dynamic process, user profiles are surreptitiously obtained by discerning and collating user interest based upon patterns of search and selection of displayed descriptor-based content. Based upon encapsulated user profiles, content characteristics of interest to users may be discerned, and content display altered to optimize individual user interest potential.
For client/server network connectivity, clients connect to a server at a predesignated address. With client/server connectivity, if client-to-client communication is required, even for extended duration, the server acts as an intermediary or host—clients communicate with each other through the server. Herein described are processes for altering communications patterns after an initial client-server communications session has been established, specifically data transmission paths, from the nominal client-to-client communication through server intermediary known in the prior art and described foregoing, to a communication pattern of direct client-to-client communication, possibly with one or more clients dynamically assuming a hosting role analogous to that of a server, thus directly communicating with other clients, rather than continuing to use the server in an intervening manner. Further, once direct client-to-client communication commences, continued connectivity to the server used as the original connection point may be superflous. In short, once client-server connectivity is established, clients may communicate directly client-to-client, or dynamically act as hosts for other clients.
Digital Video Display Employing Minimal Visual Conveyance
Select areas and specific pixels of a digital video display screen may be updated at video frame rate while other areas or pixels are not updated at video frame rate. Further, select pixels may be updated more than once within the normal update timing of a single video frame. Selective updating may be accomplished by indicating data video processing requirements.
A group of toolbar tools may be configured by direct user manipulation. Groups of tools on a toolbar may be directly expanded or compressed by user manipulation to optimize toolbar configuration. These operations may be accomplished modelessly. Tools or groups of tools may be automatically rearranged based upon usage frequency to optimize toolbar configuration. A toolbar may be made to wrap around to avoid disappearance resultant from window resizing.
The present invention is computer software that automatically finds, saves, and displays links to documents topically related to document links residing in a directory without a user having to search.
The disclosed technology applies the principle of anonymous reciprocity to facilitate remote backups. A local computer stores other computer's backup files, while storing backup copies of local files on other computers connected through a network. Each computer may securely maintain and manage storage for other computers' files. Application may be constrained to a local area network, or work on the Internet. The disclosed technology works in a peer-to-peer environment; no central server is required. The same disclosed technology may also apply to file sharing.
Computer login may comprise any user-determined submission. A user may select the input devices used, and which types of signals from input devices are to be used for login authentication. Account identification may be inferred by signature rather than explicitly stated. A plurality of discontiguous data blocks in a plurality of files may be employed for validation. The paths to data used in validation may be multifarious, regardless of the prospects for successful authorization.
Computer login may comprise any user-determined submission. A user may select among different devices for input, select the signal content, and as well select the types of signals used for a login signature. Account identification may be inferred by signature rather than explicitly stated. A plurality of discontiguous data blocks in a plurality of files may be employed for validation. The paths to data used in validation may be multifarious, regardless of the prospects for successful authorization.
Senior Tour since Mar 2010
Senior Golf Professional
IBM Apr 1979 - May 2009
Senior Project Executive, Associate Partner
US Air Force Reserve Sep 1975 - Feb 1981
NCO
Education:
Aiken Technical College
Associate's degree, Electronic Engineering
Glendale Career College
Executive Masters of Business Administration, Business Administration, Management and Operations