Patent application number | Description | Published |
20110091753 | Rechargeable lithium ion button cell battery - A rechargeable lithium ion button cell battery having a sealed housing comprises an inner casing and an outer casing, both casings have at least one flat area as top or bottom of the battery, and a round or oval side wall vertically formed to the flat area. Said side walls are single wall not folded double walls. An insulation gasket is positioned between said side walls, and the outer casing opening is mechanically crimped to complete the seal of the battery. Inside the sealed housing the anode & cathode electrodes are spiral wound with separator to be a round or oval roll. Said roll axis is vertical to the said flat areas of the casings. The two electrodes are tapered in width and comprise current collectors of metal foils coated with lithium-intercalating active materials, leaving small area of uncoated metal foils as welding tabs for connecting to the casings. The tabs are welded to the casings respectively, or for the tab of the electrode which connecting to outer casing, welded to an aluminum flake first and said flake is pressed on the outer casing by said gasket. Two insulation washers could be applied to inner side of the casings to prevent short circuit. Such battery has high energy density, low impedance, high reliability and long cycle life. | 04-21-2011 |
20140315061 | Rechargeable Lithium Ion Button Cell Battery - A rechargeable lithium ion button cell battery having a sealed housing comprises an inner casing and an outer casing, both casings have at least one flat area as top or bottom of the battery, and a round or oval sidewall vertically formed to the flat area. An insulation gasket is positioned between said sidewalls, and the outer casing opening is mechanically crimped to complete the seal of the battery. Inside the sealed housing the anode and cathode electrodes are spiral wound with separator to be a round or oval roll. Said roll axis is vertical to the said flat areas of the casings. The two electrodes are tapered in width to fully utilize the inner space. The electrodes comprise current collectors of metal foils coated with lithium-intercalating active materials, leaving small area of uncoated metal foils as conductor tabs for connecting the electrodes to the casings. The tabs could be welded or by tight contacting to the casings, in several options. Insulation washers or tapes are applied to the naked metal surfaces of the electrodes or casings inside of the housing to prevent short circuit and enable the battery to have longer cycle life. | 10-23-2014 |
20140320089 | Smart charging algorithm of lithium ion battery - A charging algorithm of lithium ion battery comprises at least one final stage wherein a maximum charging voltage is reached and the charging stops at said voltage. The state of charge or remaining capacity at the end of last discharging is measured and recorded, and said maximum charging voltage of last charging is also recorded. The maximum charging voltage of a new charging will be determined by said state of charge of last discharging and said maximum charging voltage of last charging. This novel charging algorithm provides longest possible cycle life for the daily used electronic devices while fully utilizes the battery capacity, and also fits the individual user's battery capacity consumption. | 10-30-2014 |
Patent application number | Description | Published |
20100223264 | REPORTING INCLUDING FILLING DATA GAPS AND HANDLING UNCATEGORIZED DATA - A reporting system is described herein that allows a report author to declare data reporting structures that specify to a reporting application how to dynamically categorize data with changing or potentially unknown characteristics. The reporting system may extend RDL and the data grouping provided by Microsoft SQL Server Reporting Services by adding new elements to the XML-based RDL schema. The reporting system allows the report author to specify for the system to fill gaps in the data, so that the report has a similar layout even as data changes from period to period. The reporting system also allows the report author to specify whether data that does not fit any predefined group bucket is displayed in a report. Thus, the reporting system allows unsophisticated database users to define reports that group data consistently regardless of missing values or other changes in the underlying data. | 09-02-2010 |
20120143859 | REAL-TIME PERSONALIZED RECOMMENDATION OF LOCATION-RELATED ENTITIES - A location-related entity ranking technique is described that allows a user see the ranking of location-related entities near a desired location in response to a query. The technique can leverage the searches performed by a community of mobile device users at a given location and at a given time to infer the location-related entities that are popular at this specific location and time window. The technique can also filter out or re-rank these location-related entities based on the personal preferences of the person that submits the query and group preferences of a group to which the user belongs. The personal preferences can also be context specific (i.e. different restaurant preferences for lunch and dinner times). | 06-07-2012 |
20140149230 | PROGRAMMATIC BUYING OF ONLINE DISPLAY ADVERTISEMENTS - Systems, media, and methods are provided to select advertisements for available impressions associated with a publisher's impression inventory. The selected advertisements may correspond to advertisement campaigns managed by buyers that seek to promote goods or services on web pages or media. The advertisement campaign is generated via an interface that receives a request for reserved or non-reserved portions of the publisher's impression inventory. The advertisement engine suggests a price for first chair access to the reserved portion or non-reserved portion via the interface. The advertisement engine selects advertisements based on the profiles of the advertisement campaigns. The profiles indicate placement preferences for advertisements and whether a portion of the impression inventory is reserved or non-reserved for the advertisement campaigns. The advertisement engine may provide remnant portions of the impression inventory to an advertisement exchange that receives bids for accessing the impressions of the remnant portions. | 05-29-2014 |
20150058350 | REPORTING INCLUDING FILLING DATA GAPS AND HANDLING UNCATEGORIZED DATA - A reporting system is described herein that allows a report author to declare data reporting structures that specify to a reporting application how to dynamically categorize data with changing or potentially unknown characteristics. The reporting system may extend RDL and the data grouping provided by Microsoft SQL Server Reporting Services by adding new elements to the XML-based RDL schema. The reporting system allows the report author to specify for the system to fill gaps in the data, so that the report has a similar layout even as data changes from period to period. The reporting system also allows the report author to specify whether data that does not fit any predefined group bucket is displayed in a report. Thus, the reporting system allows unsophisticated database users to define reports that group data consistently regardless of missing values or other changes in the underlying data. | 02-26-2015 |
20150149471 | REPORTING INCLUDING FILLING DATA GAPS AND HANDLING UNCATEGORIZED DATA - A reporting system is described herein that allows a report author to declare data reporting structures that specify to a reporting application how to dynamically categorize data with changing or potentially unknown characteristics. The reporting system may extend RDL and the data grouping provided by Microsoft SQL Server Reporting Services by adding new elements to the XML-based RDL schema. The reporting system allows the report author to specify for the system to fill gaps in the data, so that the report has a similar layout even as data changes from period to period. The reporting system also allows the report author to specify whether data that does not fit any predefined group bucket is displayed in a report. Thus, the reporting system allows unsophisticated database users to define reports that group data consistently regardless of missing values or other changes in the underlying data. | 05-28-2015 |
20150263981 | RUN-TIME EXPERIMENTATION WITH USER INTERFACE CONFIGURATIONS - Disclosed herein are systems, methods, and software for implementing runtime experiments with user interface configurations. In at least one implementation, an online application service receives access requests associated with various client applications attempting to access the online application service. In response to the access requests, the online application service communicates with an experiment control service to identify an experimental configuration in accordance with which to present a user interface to the online application service. The experiment control service selects the experimental configuration from various experimental configurations. The user interface is then presented in accordance with the experimental configuration identified for each of the client applications. | 09-17-2015 |
Patent application number | Description | Published |
20080312925 | System and Method for Implementing Voice Print-Based Priority Call Routing - A system, method, and computer-usable medium for routing a call. A server receives a call from a client. A routing engine captures a voice print from the call. In response to the routing engine capturing the voice print from the call, the routing engine compares the voice print to a database that includes a collection of voice prints. In response to the routing engine matching the voice print to at least one voice print among the collection of voice prints, an interactive voice response (IVR) module routes the call to an appropriate call queue based on the matching of the voice print. The appropriate queue routes the call from the appropriate call queue to a call center corresponding to the appropriate call queue. | 12-18-2008 |
20090049136 | Method of and System for Dynamically Managing a System of Servers - A method and system manage a plurality of servers coupled to a network. Each of the servers is identified by a server name. At least one of the servers is identified by an old server name. The method notifies at least some of the plurality of servers that at a specified time the old server name will be changed to a new server name. | 02-19-2009 |
20090080639 | CALL VOLUME BASED IVR CALL DURATION AND PORT ADJUSTMENT - A method, system and computer-readable medium are disclosed for adjusting port usage and call duration in an interactive voice response (IVR) system based on changes in call volume. In one embodiment, the method comprises monitoring usage of one or more ports within an IVR system. A determination is made whether the usage of the ports exceeds a predetermined threshold for port usage. In response to determining port usage exceeds the predetermined threshold, the method adjusts one or more call flows within the IVR system to reduce call duration within the IVR system. | 03-26-2009 |
20090268883 | Dynamically Publishing Directory Information For A Plurality Of Interactive Voice Response Systems - Methods, apparatus, and products are disclosed for dynamically publishing directory information for a plurality of interactive voice response (‘IVR’) systems through an IVR directory service that include: providing a description of a web services publication interface for the IVR directory service; receiving, on behalf of one or more IVR systems, web services publication requests through the publication interface; determining, in response to the web services publication requests, directory information for each IVR system requesting publication; adding the directory information for each IVR system to an IVR system directory; generating a voice mode user interface to reflect the directory information for each IVR system added to the IVR system directory; and interacting, using the voice mode user interface, with a caller to identify a particular IVR system in dependence upon the IVR system directory and query information provided by the caller and to connect the caller with the identified IVR system. | 10-29-2009 |
20110110502 | REAL TIME AUTOMATIC CALLER SPEECH PROFILING - A computer-implemented method, system, and computer program product for recognizing a voice input to an interactive voice recognition system is presented. An initial caller voice input is received from a caller. In response to determining that the initial caller voice input is a computer-unintelligible voice input that does not match any entry from a lexicon of known voice inputs, the caller is prompted to transmit a secondary input to clarify the computer-unintelligible voice input. The secondary input is utilized to match the computer-unintelligible voice input with a specific known voice input from the lexicon of known voice inputs. The lexicon of known voice inputs is then updated with the computer-unintelligible voice input. | 05-12-2011 |
20110196676 | ADAPTIVE VOICE PRINT FOR CONVERSATIONAL BIOMETRIC ENGINE - A computer-implemented method, system and/or program product update voice prints over time. A receiving computer receives an initial voice print. A determining period of time is calculated for that initial voice print. This determining period of time is a length of time during which an expected degree of change in subsequent voice prints, in comparison to the initial voice print, is predicted to occur. A new voice print is received after the determining period of time has passed, and the new voice print is compared with the initial voice print. In response to a change to the new voice print falling within the expected degree of change in comparison to the initial voice print, a voice print store is updated with the new voice print. | 08-11-2011 |
20120257730 | DYNAMICALLY PUBLISHING DIRECTORY INFORMATION FOR A PLURALITY OF INTERACTIVE VOICE RESPONSE SYSTEMS - Some example embodiments include a method of dynamically publishing directory information for a plurality of interactive voice response (‘IVR’) systems. The method includes receiving, by the IVR directory service on behalf of one of the IVR systems, a web services update request. The method includes determining, by the IVR directory service in response to the web services update request, updated directory information for the IVR system. The method includes updating the IVR system directory with the updated directory information for the IVR system. The method includes generating an updated voice mode user interface to reflect the updated IVR system directory with the updated directory information for the IVR system. The generating includes creating one more voice dialogs in accordance with the directory information, the one or more voice dialogs specifying a call flow defining the interaction between a caller and the IVR directory service. | 10-11-2012 |
20120328085 | REAL TIME AUTOMATIC CALLER SPEECH PROFILING - A computer-implemented method, system, and/or computer program product recognizes a voice input received by an interactive voice recognition system. An unintelligible voice input is received from a caller. The unintelligible voice input is unintelligible to a computer due to background noise at a caller environment of the caller. Upon determining that the unintelligible voice input does not match any entry from a lexicon of known voice inputs, the caller is prompted to transmit a non-verbal electronic input to clarify the unintelligible voice input. This non-verbal electronic input is used to match the unintelligible voice input with a specific known voice input from the lexicon of known voice inputs, which is updated with the unintelligible voice input. The updated lexicon is subsequently used in future phone calls from the user to match the unintelligible voice input to the user-requested activity for the caller. | 12-27-2012 |
20130166301 | ADAPTIVE VOICE PRINT FOR CONVERSATIONAL BIOMETRIC ENGINE - A computer-implemented method, system and/or program product update voice prints over time. A receiving computer receives an initial voice print. A determining period of time is calculated for that initial voice print. This determining period of time is a length of time during which an expected degree of change in subsequent voice prints, in comparison to the initial voice print and according to a speaker's subsequent age, is predicted to occur. A new voice print is received after the determining period of time has passed, and the new voice print is compared with the initial voice print. In response to a change to the new voice print falling within the expected degree of change in comparison to the initial voice print, a voice print store is updated with the new voice print. | 06-27-2013 |
20130226576 | Conference Call Service with Speech Processing for Heavily Accented Speakers - Speech recognition processing captures phonemes of words in a spoken speech string and retrieves text of words corresponding to particular combinations of phonemes from a phoneme dictionary. A text-to-speech synthesizer then can produce and substitute a synthesized pronunciation of that word in the speech string. If the speech recognition processing fails to recognize a particular combination of phonemes of a word, as spoken, as may occur when a word is spoken with an accent or when the speaker has a speech impediment, the speaker is prompted to clarify the word by entry, as text, from a keyboard or the like for storage in the phoneme dictionary such that a synthesized pronunciation of the word can be played out when the initially unrecognized spoken word is again encountered in a speech string to improve intelligibility, particularly for conference calls. | 08-29-2013 |
20140064464 | Real Time Automatic Caller Speech Profiling - A computer-implemented method, system, and/or computer program product recognizes a voice input received by an interactive voice recognition system. An unintelligible voice input, which is unintelligible due to background noise at the caller's location, is received from a caller. Upon determining that the unintelligible voice input does not match any entry from a lexicon of known voice inputs, the unintelligible voice input is stored in a no-match-based user profiles database, and the caller is prompted to transmit a non-verbal electronic input to clarify the unintelligible voice input. This non-verbal electronic input is used to match the unintelligible voice input with a specific known voice input from the lexicon of known voice inputs, which is updated with the unintelligible voice input. The updated lexicon is subsequently used in future phone calls from the user to match the unintelligible voice input to the user-requested activity for the caller. | 03-06-2014 |
20140093070 | MATRIX CODE FOR ENCRYPTION, STORAGE, AND TRANSMISSION OF DATA - A computing device utilizes matrix codes to securely communicate information with a variety of servers. The computing device receives public user data, and generates a display of a base matrix code for reading by a scanner associated with a first server, wherein the base matrix code includes the public user data in a first mask. Responsive to the display of the base matrix code to the scanner associated with the first server, the computing device receives first private user data from the first server. The computing device generates a display of a first combined matrix code for reading by a scanner associated with a second server, wherein the first combined matrix code includes the public user data in the first mask and includes the first private user data in a second mask. The computing device can receive the public and first private user data in a matrix code. | 04-03-2014 |
20140095888 | MATRIX CODE FOR ENCRYPTION, STORAGE, AND TRANSMISSION OF DATA - A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and identifies a first mask within a data region of the matrix code, wherein the first mask includes public user data, and identifies a second mask within the data region of the matrix code, wherein the second mask include private user data. The computer decodes the public user data and the private user data from the matrix code, and decrypts one or both of the public user data and the private user data. The computer also removes a distortion operation from the second mask, wherein removing the distortion operation includes reversing a transformation, rotation, skew, shear, reflection, or projection operation. | 04-03-2014 |
20140188472 | ADAPTIVE VOICE PRINT FOR CONVERSATIONAL BIOMETRIC ENGINE - A computer-implemented method, system and/or program product update voice prints over time. A receiving computer receives an initial voice print. A determining period of time is calculated for that initial voice print. This determining period of time is a length of time during which an expected degree of change in subsequent voice prints, in comparison to the initial voice print and according to a speaker's subsequent age, is predicted to occur. A new voice print is received after the determining period of time has passed, and the new voice print is compared with the initial voice print. In response to a change to the new voice print falling within the expected degree of change in comparison to the initial voice print, a voice print store is updated with the new voice print. | 07-03-2014 |
20150326719 | USING AN ISDN MESSAGE HEADER TO SUPPORT TIME ZONE IDENTIFICATION - Inserting time zone information within an Integrated Services for Digital Network (ISDN) message header is provided. A time zone indicator corresponding to an origin of a communication is inserted into a time zone indicator field within a header of an ISDN message. The ISDN message with the inserted time zone indicator corresponding to the origin of the communication within the header is sent to another data processing system via a network. | 11-12-2015 |
Patent application number | Description | Published |
20120232038 | CRYSTALLINE FORMS OF (3R, 3AS, 6AR) - HEXAHYDROFURO [2,3-B] FURAN-3-YL (1S,2R) - (1-{4-[ (DIETHOXYPHOSPHORYL) METHOXY] PHENY1}-3-HYDROXY-4- [4-METHOXY-N- (2-METHYLPROPYL) BENZENESUL - FONAMIDO] BUTAN-2-YL) CARBAMATE - The present inventions provides crystalline forms of (3R,3aS,6aR)-hexahydrofuro[2,3-b]furan-3-yl (1S,2R)-(1-{4-[(diethoxyphosphoryl)methoxy]phenyl}-3-hydroxy-4-[4-methoxy-N-(2-methylpropyl)benzenesulfonamido]butan-2-yl)carbamate, methods of preparing the crystalline forms, pharmaceutical compositions containing the crystalline forms, and therapeutic uses thereof. | 09-13-2012 |
20130065856 | TENOFOVIR ALAFENAMIDE HEMIFUMARATE - A hemifumarate form of 9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine (tenofovir alafenamide), and antiviral therapy using tenofovir alafenamide hemifumarate (e.g., anti-HIV and anti-HBV therapies). | 03-14-2013 |
20130252976 | POLYMORPHIC FORMS OF (S)-2-(1-(9H-PURIN-6-YLAMINO)PROPYL)-5-FLUORO-3-PHENYLQUINAZOLIN-4(3H)-ON- E - Polymorphs of (S)-2-(1-(9H-purin-6-ylamino)propyl)-5-fluoro-3-phenylquinazolin-4(3H)-one, compositions thereof, methods for their preparation, and methods for their use are disclosed. | 09-26-2013 |
20130324496 | SOLID FORMS OF AN ANTIVIRAL COMPOUND - Amorphous and crystalline solid forms of the anti-HCV compound (1-{3-[6-(9,9-difluoro-7-{2-[5-(2-methoxycarbonylamino-3-methyl-butyryl)-5-aza-spiro[2.4]hept-6-yl]-3H-imidazol-4-yl}-9H-fluoren-2-yl)-1H-benzoimidazol-2-yl]-2-aza-bicyclo[2.2.1]heptane-2-carbonyl}-2-methyl-propyl)-carbamic acid methyl ester (Compound I) were prepared and characterized in the solid state: | 12-05-2013 |
20140187773 | TENOFOVIR ALAFENAMIDE HEMIFUMARATE - A hemifumarate form of 9-[(R)-2-[[(S)-[[(S)-1-(isopropoxycarbonyl)ethyl]amino]phenoxyphosphinyl]methoxy]propyl]adenine (tenofovir alafenamide), and antiviral therapy using tenofovir alafenamide hemifumarate (e.g., anti-HIV and anti-HBV therapies). | 07-03-2014 |
20150080572 | POLYMORPHIC FORMS OF (S)-2-(1-(9H-PURIN-6-YLAMINO)PROPYL)-5-FLUORO-3-PHENYLQUINAZOLIN-4(3H)-ON- E - Polymorphs of (S)-2-(1-(9H-purin-6-ylamino)propyl)-5-fluoro-3-phenylquinazolin-4(3H)-one, compositions thereof, methods for their preparation, and methods for their use are disclosed. | 03-19-2015 |
20150141659 | SOLID FORMS OF AN ANTIVIRAL COMPOUND - Amorphous and crystalline solid forms of the anti-HCV compound (1-{3-[6-(9,9-difluoro-7-{2-[5-(2-methoxycarbonylamino-3-methyl-butyryl)-5-aza-spiro[2.4]hept-6-yl]-3H-imidazol-4-yl}-9H-fluoren-2-yl)-1H-benzoimidazol-2-yl]-2-aza-bicyclo[2.2.1]heptane-2-carbonyl}-2-methyl-propyl)-carbamic acid methyl ester (Compound I) were prepared and characterized in the solid state: | 05-21-2015 |
20150175606 | POLYMORPHIC FORMS OF A HYDROCHLORIDE SALT OF (S)-2-(1-(9H-PURIN-6-YLAMINO)PROPYL)-5-FLUORO-3-PHENYLQUINAZOLIN-4(3H)-ON- E - Polymorphs of a hydrochloride salt of (S)-2-(1-(9H-purin-6-ylamino)propyl)-5-fluoro-3-phenylquinazolin-4(3H)-one, compositions thereof, methods for their preparation, and methods for their use are disclosed. Solvent forms of a hydrochloride salt of (S)-2-(1-(9H-purin-6-ylamino)propyl)-5-fluoro-3-phenylquinazolin-4(3H)-one, compositions thereof, methods for their preparation, and methods for their use are also disclosed. | 06-25-2015 |
20150175646 | SOLID FORMS OF AN ANTIVIRAL COMPOUND - Crystalline solid forms of the anti-HCV compound (S)-isopropyl 2-((S)-(((2R,3R,4R,5R)-5-(2,4-dioxo-3,4-dihydropyrimidin-1(2H)-yl)-4-fluoro-3-hydroxy-4-methyltetrahydrofuran-2-yl)methoxy)(phenoxy)phosphorylamino)propanoate (Compound I) are described | 06-25-2015 |
20150197535 | SOLID FORMS OF TENOFOVIR - The present invention relates to solid forms of tenofovir and methods for preparation, use and isolation of such forms. | 07-16-2015 |
20150344488 | SOLID FORMS OF AN ANTIVIRAL COMPOUND - Amorphous and crystalline solid forms of the anti-HCV compound (1-{3-[6-(9,9-difluoro-7-{2-[5 -(2-methoxycarbonylamino-3-methyl-butyryl)-5-aza-spiro [2 .4]hept-6-yl]-3H-imidazol-4-yl}-9H-fluoren-2-yl)-1H-benzoimidazol-2-yl]-2-aza-bicyclo[2.2.1]heptane-2-carbonyl}-2-methyl-propyl)-carbamic acid methyl ester (Compound I) were prepared and characterized in the solid state: | 12-03-2015 |
20150361050 | (N-(CYANOMETHYL)-4-(2-(4-MORPHOLINOPHENYLAMINO)PYRIMIDIN-4-YL)BENZAMIDE - The present invention relates to stable novel salt forms of N-(cyanomethyl)-4-(2-(4-morpholinophenylamino)pyrimidin-4-yl)benzamide that are suitable for the preparation of pharmaceutical formulations thereof, and their therapeutic use. | 12-17-2015 |
20150361085 | SOLID FORMS OF AN ANTIVIRAL COMPOUND - Crystalline solid forms of methyl {(2S)-1-[(2S,5S)-2-(9-{2-[(2S,4S)-1-{(2R)-2-[(methoxycarbonyl)amino]-2-phenylacetyl}-4-(methoxymethyl)pyrrolidin-2-yl]-1H-imidazol-5-yl}-1,11-dihydroisochromeno[4′,3′:6,7]naphtho[1,2-d]imidazol-2-yl)-5-methylpyrrolidin-1-yl]-3-methyl-1-oxobutan-2-yl}carbamate (Compound I) were prepared and characterized in the solid state: | 12-17-2015 |
Patent application number | Description | Published |
20130309212 | LACTOBACILLUS SALIVARIUS AND METHOD FOR PREPARING METABOLITE THEREOF, COMPOSITION OF LACTOBACILLUS SALIVARIUS AND METABOLITE THEREOF AND USE OF THE COMPOSITION - Provided is a | 11-21-2013 |
20150199258 | CONDITIONAL COMPONENT BREAKPOINT SETTING SYSTEM AND METHOD - A method, computer program product, and computer system for setting, at a computing device, a breakpoint of a plurality of breakpoints for use by a debugger at an entry point of a plurality of entry points for a component of a plurality of components, wherein the breakpoint is set automatically. While executing the debugger on the component, it is determined whether the breakpoint is reached from outside of the component by a program. If the breakpoint is reached from outside of the component, the program executed by the debugger stops. If the breakpoint is reached from inside of the component, the program executed by the debugger continues. | 07-16-2015 |
20150199260 | CONDITIONAL COMPONENT BREAKPOINT SETTING SYSTEM AND METHOD - A method, computer program product, and computer system for setting, at a computing device, a breakpoint of a plurality of breakpoints for use by a debugger at an entry point of a plurality of entry points for a component of a plurality of components, wherein the breakpoint is set automatically. While executing the debugger on the component, it is determined whether the breakpoint is reached from outside of the component by a program. If the breakpoint is reached from outside of the component, the program executed by the debugger stops. If the breakpoint is reached from inside of the component, the program executed by the debugger continues. | 07-16-2015 |
20150281377 | METHOD, DEVICE AND SYSTEM FOR EVENT REMINDING - The present disclosure discloses a method, a device, and a system for event reminding. The method includes: acquiring a reminder event in an alarm channel, the alarm channel providing an event reminder service to a plurality of clients at the same time; acquiring a subscription list of the alarm channel, the subscription list comprising the clients subscribing to the alarm channel; and sending the reminder event to the clients on the subscription list, the reminder event instructing each of the clients to issue an event reminder according to the reminder event. | 10-01-2015 |