Most, if not all, of the computer and,
software packages' information are at least partially incompatible with one another.
This fact further exacerbates the difficulty in synergistically and cohesively integrating the separate and distinct computer unit /
software combinations into an effective common tool for an organization.
Therefore, an enormous burden is placed on an entity to
train its personnel in the use of such a "networked"
system as well as maintain such systems, especially when adding or upgrading software / hardware, which is a monumental task.
It is no wonder that even modestly sized businesses have been forced into the expense of
Information Processing Departments.
It is often the case, particularly with small businesses and individuals, that they can simply not afford the cost of software training.
For larger businesses, training does not produce immediate benefits, as it takes time for users to assimilate the information they are presented with at a training session.
Further, due to the inherent conflicts in naming screens, and procedure requirements to initiate a particular task in any given software program as compared to the next, a worker skilled in one brand of
word processing software, for example, will have substantial difficulty when asked to start using a different brand.
Such errors in judgment cost time and money and either leave the user with hardware that they did not originally require or cannot operate, or software that they will not use to its full potential.
Consequently, the attempt to provide every possible
software feature to every user necessitates the depth, nesting and complexity of current GUI systems.
As a result, the GUI is an inefficient fit, to a greater or lesser degree, for each individual user especially those unfamiliar with computers.
Because of their inherent limitations, none have been successful.
Users find it very difficult to develop an mnemonically consistent scheme for remembering such key combinations.
The combinations tend to be so arbitrary that it is difficult to use mnemonic logic to memorize the cryptic key combinations.
Further, many key combinations only work a given way in specific application programs, further restricting the combinations that are available.
The user's limited ability to remember and reflexively recall more than a few cryptic key combinations severely limits the
usability of
macro utilities.
Many people are so intimidated by the cryptic nature of macros they refuse to even consider their use.
To expect a new user to make use of this ability is not practical.
Recognition of the user's words by these utilities is limited to the purpose of replacing one
text string with another.
They do not enable the user to use this concept for controlling computer processes and functions.
The existing shortcut utilities, however, do not offer the user an
integrated approach to creating, managing and using shortcuts for content services, retrieval services and commands.
Their interfaces are inconsistent and far too difficult to organize and remember.
Because the user must assemble his / her shortcuts using a collection of different software products, he / she loses any potential
advantage due to the
delay with cumbersome and time-consuming management of these shortcuts.
Self-actualization is a difficult process.
In fact, most humans never reach self-actualization, in part, because of his / her inability to utilize the entire capacity of the brain as well as the demands of fulfilling basic needs first.
However, the prior art incorrectly attempts to solve this problem by creating macros and icons.
These disadvantages include: a long
learning curve to master several software applications, the inability to ergonomically adapt to a particular user, the language barriers, the "80 / 20" problem, etc.
Although software exists that can do practically anything a user requires as noted above, the human user cannot keep abreast of the potential benefits of all existing software.
Rather, software applications vary so greatly with respect to general set-up that a computer user must learn every new application, making mastery of a great many applications time-prohibitive.
Rather,
MICROSOFT OFFICE provides semi-similar screens, with very different applications, thereby making it virtually impossible to fully transfer the knowledge one has of WORD, for example, to EXCEL.
While the screens are similar, there are also significant differences between applications for, essentially, identical button selections.
Although this invention allows for user-specific menu options, the inherent problem still exists; the user must design these menus using his / her "vital few".
However, this does not solve the problem of providing a common tool bar for each application.
If it is required immediately after it was turned `off`, both the time required turning the device `off` and the time required to restore it to its power `on` state are wasted.
This
delay will
impact the responsiveness of the system.
However, the industry focuses on
laptop computers only, and does not contemplate the potential of
peripheral devices running off the
laptop computer battery.
Peripheral modules such as a
scanner, a printer, and a fax
machine cannot be controlled by this programmable power supply.
Although this device minimally controls the life of the
laptop battery, it does so only on an `all or nothing` basis.
Thus, this device is not conditioned by the use of certain components or modules connected with the laptop, but rather only by whether the laptop is turned `on` or `off`.
Therefore, considering the above inventions, although many attempts of curbing this problem have been publicly disclosed, these solutions would not be applicable to a device consisting of more than just the computer apparatus, such as
peripheral computer modules including a fax
machine,
scanner, printer and the like.
However, these ever-expanding portable offices are very bulky, heavy and inconvenient.
These portable offices also lack such necessary items as a scanner, fax
machine, photocopier and printer.
All of these attempts to create a "portable" office, although valiant, have not quenched the need of a truly portable and mobile office.
With the ever-increasing
clock frequencies of
digital electronics,
radiation from the computing electronics to the receiving unit will become more and more of a problem, irrespective of the kind of
access method used (TDMA, FDMA, CDMA, etc.).
First, an interrupt
signal is sent from a
transceiver to a computing device when the transceiver is about to transmit or receive information.
Another problem experienced by today's "portable office" user is the
threat of a breach of secure information.
To many, this is of utmost concern because his / her laptop often contains confidential files that have the potential of creating substantial damage if released to the public.
Often the passwords are short and the code can easily be broken.
Additionally, this security does not prevent someone from removing the hard drive or from simply taking the entire
portable computer home with them to work on breaking the
operating system security code.
Although these devices work well in a large scale building or office, the
excess weight and space some of these devices would add to a portable office is significant, particularly considering the current desire to constantly design lighter and more compact portable computing units.
The voice recognition device, however, could be integrated into the hard drive of the unit and thus take up only limited memory space.
However, there is a
disadvantage to a voice recognition device.