Stephen P. Capps - San Carlos CA Joseph G. Ansanelli - Palo Alto CA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 1760
US Classification:
345762, 345808
Abstract:
A computer system is disclosed which may adopt one of many personas, depending upon the role that its owner is currently playing. The computer system includes a central repository of extensible personas available to all applications running on the computer system. Each such persona has associated therewith a suite of parameters, or specific values for parameters, which are appropriate for conducting computer implemented transactions under a particular persona. The computer system further includes a graphical user interface which allows the user to switch from persona to persona by selecting a particular persona from a list of available personas displayed on a display screen of the computer system. By selecting such persona, the user causes the computer system to globally change the entire suite of parameter values so that subsequent transactions conducted with the computer system employ the parameter values of the current persona.
Stephen P. Capps - San Carlos CA, US Joseph G. Ansanelli - Palo Alto CA, US
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 17/60
US Classification:
715762, 715808, 715751
Abstract:
A computer system is disclosed which may adopt one of many personas, depending upon the role that its owner is currently playing. The computer system includes a central repository of extensible personas available to all applications running on the computer system. Each such persona has associated therewith a suite of parameters, or specific values for parameters, which are appropriate for conducting computer implemented transactions under a particular persona. The computer system further includes a graphical user interface which allows the user to switch from persona to persona by selecting a particular persona from a list of available personas displayed on a display screen of the computer system. By selecting such persona, the user causes the computer system to globally change the entire suite of parameter values so that subsequent transactions conducted with the computer system employ the parameter values of the current persona.
Stephen P. Capps - San Carlos CA, US Joseph G. Ansanelli - Palo Alto CA, US
Assignee:
Apple, Inc. - Cupertino CA
International Classification:
G06F 17/60 G06F 15/00
US Classification:
715762, 715853
Abstract:
A computer system is disclosed which may adopt one of many personas, depending upon the role that its owner is currently playing. The computer system includes a central repository of extensible personas available to all applications running on the computer system. Each such persona has associated therewith a suite of parameters, or specific values for parameters, which are appropriate for conducting computer implemented transactions under a particular persona. The computer system further includes a graphical user interface which allows the user to switch from persona to persona by selecting a particular persona from a list of available personas displayed on a display screen of the computer system. By selecting such persona, the user causes the computer system to globally change the entire suite of parameter values so that subsequent transactions conducted with the computer system employ the parameter values of the current persona.
Method And Apparatus To Report Policy Violations In Messages
Chris Jones - San Francisco CA, US Hai Chen - Belmont CA, US Joseph Ansanelli - San Francisco CA, US Michael R. Wolfe - San Francisco CA, US Kevin T. Rowney - San Francisco CA, US
Assignee:
Symantec Corporation - Mountain View
International Classification:
G06F 7/04 G06F 17/30 G06F 7/00 H04N 7/16
US Classification:
726 26, 707758, 707781, 707783
Abstract:
A method and apparatus for reporting policy violations in messages is described. In one embodiment, a violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.
Personal Computing Device-Based Mechanism To Detect Preselected Data
Kevin T. Rowney - San Francisco CA, US Michael R. Wolfe - San Francisco CA, US Mythili Gopalakrishnan - San Francisco CA, US Vitali A. Fridman - Belmont CA, US Joseph Ansanelli - San Francisco CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 7/00 G06F 17/30 G06F 15/173 G06F 15/16
US Classification:
707747, 707694, 707711, 709224, 709225, 709229
Abstract:
A method and apparatus for detecting pre-selected data stored on a personal computing device is described. In one embodiment, contents of data storage media of a personal computing device are searched for pre-selected sensitive data. In one embodiment, if at least a portion of the pre-selected sensitive data is detected, a notification of the detection of the pre-selected data is sent to a system via a network. In another embodiment, if at least a portion of pre-selected sensitive data is detected, the access to this data is blocked.
Method And Apparatus To Report Policy Violations In Messages
Chris Jones - San Francisco CA, US Hai Chen - Belmont CA, US Joseph Ansanelli - San Francisco CA, US Michael R. Wolfe - San Francisco CA, US Kevin T. Rowney - San Francisco CA, US
A method and apparatus for reporting policy violations in messages is described. A violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.
Method And Apparatus For Remotely Accessing Files From A Desktop Computer Using A Personal Digital Assistant
Peter E. Alley - Saratoga CA Joseph G. Ansanelli - Palo Alto CA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 1730
US Classification:
707 10
Abstract:
A method and apparatus for selecting and retrieving computer data files from a remote computer includes an automatic file translation mechanism. In one embodiment, the data being retrieved and the file translation mechanism are located on the same computer. The method of the invention includes establishing a data transfer link with the remote computer, displaying the files available for retrieval from the remote computer, selecting a file to be transferred, and translating the file prior to transfer. In one embodiment, the apparatus includes a pen-based computer and the remote computer is a desktop computer.
Method And Apparatus For Modifying A Display Matrix In A Computer Window By Adding One Column Or Row At A Time
Seth T. Odam - Palo Alto CA James R. Harker - Los Altos CA Joseph G. Ansanelli - Palo Alto CA John L. Welde - Pope AFB NC
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 1724 G06T 340
US Classification:
395765
Abstract:
A method of modifying a display matrix in a matrix display area in a window on a computer display screen. The method includes the steps of displaying data in a matrix format, thereby forming a display matrix in the matrix display area, the matrix display area having a first dimension, and increasing, responsive to a selection of an increase activator, the number of existing columns of matrix cells in the display matrix by adding an additional column of matrix cells to the display matrix. The method further includes the step of computing, using a central processing unit, a computed width of a column of matrix cells in the existing columns of matrix cells if the column of matrix cells is reduced in width to accommodate the additional column of matrix cells. The method also includes the steps of reducing the width of the column of matrix cells to accommodate the additional column of matrix cells within the first dimension if the computed width does not fall below a predefined minimum column width, and increasing a width of the matrix display area to accommodate the additional column of matrix cells if the computed width falls below the predefined minimum column width.
Risk Management Negotiation Contract Negotiation Cross-functional Team Leadership Social Networking Start-ups Leadership Executive Coaching Strategic Partnerships Venture Capital SaaS Entrepreneurship Corporate Development Go-to-market Strategy Product Marketing Enterprise Software Business Development Cloud Computing Mergers Product Management Analytics Mobile Devices CRM Strategy Security Mobile Applications Mergers & Acquisitions Executive Management Competitive Analysis Angel Investing Business Strategy Big Data Business Alliances Lead Generation Business Modeling
Youtube
The Ingredients for a Bullet-Proof Business P...
Drawing from his experience both as an entrepreneur and now a partner ...
Duration:
1h 11m 15s
Joseph Ansanelli, CEO of Gladly & Partner at ...
Joseph Ansanelli talks about how he overcame the fear of failure and c...
Duration:
11m 33s
5.2 Joseph Ansanelli: Making Flexibility Real
Joseph Ansanelli describes how to engage people at work through flexib...
Duration:
10m 54s
Joseph Ansanelli 1: Fear of Failure
Joseph Ansanelli talks about how he overcame the fear of failure and c...
Duration:
11m 7s
Joseph Ansanelli 3: Where You're Going
Joseph Ansanelli speaks about why he advises young entrepreneurs, the ...
Duration:
13m 27s
5.3 Joseph Ansanelli: Knowing Where You're Go...
Joseph Ansanelli speaks about why he advises young entrepreneurs, the ...