Information processing apparatus and method

ABSTRACT

An information processing apparatus and method consisting of the modules 1) peripheral control including power management resulting in increased battery life where a plurality of peripherals use a single power source to eliminate external power supplies, 2) universal conversion, an extensible system for taking any information as input and converting to any desired feasible output, 3) virtual user production, which creates a digital representation of a user through constant recording and analysis of completed work, which is disintegrated and stored in lists comprising tasks and related options. A list captures and represents the user&#39;s preferences. Dynamic and evolving lists define a virtual user capable of repeating any previously recorded task. A corresponding Web based communication provider automatically feeds additional tasks and options to the invention, which can grow substantially unassisted by the user.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the invention

[0002] The present invention generally relates to a computer system thatfacilitates the completion of work through the creation and reuse of anevolving set of frequently used tasks. The invention permits sharing thetasks, representing captured knowledge, with a plurality of other users.To increase the invention's awareness of the user's actions, a universalconversion module and a peripheral control module are provided tocommunicate the user's selection of various input output options.

[0003] 2. Description of the Prior Art

[0004] For many years mobile users have had to suffer the hardship ofcarrying excessively heavy baggage “loaded to the nines” with so called“portable” peripherals. These peripherals, while being portablecollectively, still represent an uncomfortable weight. A significantproportion of the weight in any such peripheral is generally representedby power supply, either in the form of batteries or power supplyadapters.

[0005] For those traveling on an international level, this burden isincreased by the need to carry additional converters, which alter thepower connector format of peripherals to match that of the domesticpower supply of the country being visited. A European user traveling inEurope and certain other parts of the world has little extra burden. Butone switching from the United States to Europe has a significantproblem, namely how to supply devices which require 110VAC from a powersupply equipped to feed 220VAC-240VAC. This typically means carryingadditional step-down transformers in the guise of power converters.

[0006] Users that require portability often times do not requireoperation away from an electrical outlet. For example, business userssimply move their laptop from the office to home and back again on aregular basis. However, the time involved in packing up all the powersupplies and interconnecting cables often means that the whole thing issimply not worth the hassle, other than in extreme cases. As a result,the user will potentially carry the laptop home and leave the restbehind, reducing available functionality when reaching home.

[0007] When users are away from an electrical outlet, they often needthe use of their portable computer, powered by batteries, for shortperiods of time. However, at those times, when the system is needed tooperate away from the main power supply, typical peripherals such asprinters, scanners, etc., even though such are designed to be easilytransported, still require an electrical attachment to an outlet. Atbest, one or two peripherals have their own rechargeable batteries, butthey again are a source of weight burden to the user.

[0008] What has not been addressed is the potential for utilizing thepower supply, which can be furnished by the laptop computer itself. Thiscan take two forms, firstly modern laptop computers are accompanied by auniversal power supply, typically able to function from 90VAC to 250VAC,and secondly they are equipped with batteries that have an everincreasing life away from an electrical outlet.

[0009] There are not too many difficulties to overcome when drawingpower from the universal power supply of a laptop computer, as the useris not really troubled by switching everything on when the laptop isswitched on, and anyway everything would be switched off when the laptoppower supply was disconnected from the electrical outlet. The realproblems are encountered when trying to integrate the power supplyrequirements of all the connected peripherals such that they can all bepowered from the laptop battery. Due to the light use of theseperipherals, battery life would not be significantly affected, as longas the user remembered to constantly switch things off when they are nolonger in use.

[0010] Many devices consists of power saving features by entering astandby mode, but several targeted at the laptop market appear to lackthis functionality, and even in standby mode each peripheral still drawspower so collectively the peripherals in standby still consume aproportion of battery capacity. Again, the only option for the user isto keep switching things on and off as their work flow progresses.

[0011] Power saving features seem to be focused at too large or toosmall a scale for the laptop user to benefit. For example, peripheralsincluding monitors and printers typically have a standby mode whichyields significant savings, and laptop devices consists of options forswitching off specific chips, reducing the speed of the processor, e.g.INTEL SPEEDSTEP, but again these do not extend to manage externaldevices which are all potentially serviced from a single battery source.

[0012] U.S. Pat. No. 5,905,900, issued to Combs et al. on May 18, 1999,discloses a mobile client computer and power management architecture.This reference discloses an energy management control program having aplurality of cooperating components permitting a designer to choose fromamong a plurality of foci for energy management.

[0013] U.S. Pat. No. 5,796,982, issued to Iwami on Aug. 18, 1998,discloses a switching regulator, information processing apparatus and acontrol method for same. The switching regulator is controlled by afeedback voltage, which is selected to be of minimum value from amongstthe various power lines present. Although this invention succeeds inminimizing output voltage based on a minimum required voltage from aplurality of feedback voltages, this invention fails to completely shutoff voltage from a peripheral computer module not presently in use.

[0014] Another area of frustration for mobile users is communication andagain some of these frustrations emanate from a lack of closeintegration. A modem which is completely self-contained in terms ofhaving cellular capabilities (the same as a mobile phone) and land linecapabilities such as any traditional modem for use by an IBM COMPATIBLEPC is not found in the prior art. Of course, many laptop modems haveoptional kits which permit connecting the laptop modem to the user'smobile phone, but then this restricts use of the phone to the task oflaptop communication, and moreover the constant connection anddisconnection of data cables.

[0015] Even if such connection problems are dismissed, when a userwishes to utilize a cellular modem, when typically the landline modem isthe default for Web connections, the user must, with extreme care,manipulate system settings in order to instruct the laptop to utilize acellular modem. When use of the cellular modem has ceased, then thesettings must once again be manipulated to bring the landline modem backinto operation. Prior art has not addressed the need of the user withrespect to automatically switching between landline and cellularcommunication while simultaneously adjusting system settings tocorrespond with available communication methods.

[0016] A final source of difficulty is the lack of close integration ofvoice audio features when multiple modems are in use. This feature issupported by a surprisingly small number of modems. The difficulty hereis the diverse range of audio levels encountered when switching from onemodem to another, causing the user to constantly alter software volumecontrols.

[0017] Interference problems arise when a cellular modem, such as theSIEMENS M20T, is integrated with an audio device and both share a commonpower supply. For example, if the modem was connected with an in-caraudio system, to facilitate integration between the voice-communicationfeatures of the modem and the audio inputs/outputs of the in-car audiosystem, due to the fact that both devices share a common power supply(namely the car battery), interference is known to travel along powerconnections shared by the two devices. Annoying interference bleeds fromthe cellular modem and manifests itself on the audio output of thedevice to which it is connected, thus audio quality and intelligibilityare grossly affected.

[0018] The general trend in consumer electronics today is toward theintegration of communicating and computing facilities into a singleunit. Examples are laptops wirelessly connected to remote hosts (e.g.PDA/PC at home), personal communicators that combine a phone, anorganizer, and many more functions into a single electronic device, etc.This integration of wireless communications and computing raisespotential problems with Electromagnetic Interference (EMI) andElectromagnetic Compatibility (EMC).

[0019] During wireless transmission, radiation from a transceiverinterferes with the processors and other electronics in the computingsection of the device. This is especially the case for highinstantaneous power, discontinuous transmission as found in timedivision multiple access (TDMA) communications (e.g., GSM, D-AMPS,DECT). Transmission takes place in a burst format with short, butrepetitive bursts with high energy levels. Cross-talk between thetransceiver and the computing electronics will likely disturb the signallevels in the digital electronics, giving rise to errors in thecomputing process. Other access methods that use continuous transmission(FDMA, or CDMA) can use lower instantaneous power levels, which are lesslikely to interfere with the computing electronics.

[0020] During wireless reception, the transceiver is opened to receivethe burst from the antenna. However, now any electromagnetic radiationfrom the computing electronics can disturb the reception. This isespecially a problem in high-speed, digital electronics, where steepedges and spikes at the signal level transitions can produceconsiderable radiation. With the ever-increasing clock frequencies ofdigital electronics, radiation from the computing electronics to thereceiving unit will become more and more of a problem, irrespective ofthe kind of access method used (TDMA, FDMA, CDMA, etc.).

[0021] If future integrated communications/computing devices continue touse TDMA wireless cellular communications now implemented worldwide,then an efficient means of suppressing the mutual interference betweentransceiver and computing electronics must be found.

[0022] One attempt to reduce such interference is disclosed in U.S. Pat.No. 5,842,037, issued to Haartsen on Nov. 24, 1998. This inventionprovides for an interference reduction in TDMA-communications/computingdevices. First, an interrupt signal is sent from a transceiver to acomputing device when the transceiver is about to transmit or receiveinformation. In response to the interrupt signal, the computing devicestacks current status and enters an interrupt routine; the computingdevice is then released from the interrupt routine after the informationhas been transmitted or received. Although this invention works toreduce the interference, because there is only an interrupt signal andnot a complete isolation of the TDMA ground return from the Computersystem ground return, an elimination of audio interference is notaccomplished. Therefore, there exists a desire in the art for a novelcircuit construct to reduce the effect of this unwanted noise byisolating the TDMA (e.g. GSM) ground return from the Computer systemground return.

[0023] In order to significantly ease the life of laptop usersparticularly when traveling, a single unified device is needed thatintegrates the power supply requirements of peripherals and improves theintegration of cellular and landline communication while harmonizingaudio features of integrated modems. This method is not presently foundin the prior art.

[0024] System interoperability and data compatibility have long been anissue in the field of Information Technology. To answer this problem,utility vendors have produced devices that can translate informationoutput from one program and change it into a form compatible withanother, where the program may be a graphics system or word-processorand the like. However, these conversions are restricted in the number oftypes of output they can provide, basically because they were devisedwith a single purpose in mind, for example, to take a document from oneword-processor and re-write it so it is compatible with another wordprocessor, e.g. convert a WORD-PERFECT document so it can be loaded byMICROSOFT WORD.

[0025] When this software was developed, it was not envisaged to havethe potential to be made part of a larger network of converters.Therefore, it is not easy for a user to take a document and pass itthrough successive conversion processes. In order to do this, a usertypically has to load information into one device and execute theconversion process, then load the information into the next device andso on, until the final product is reached. This is beyond the capabilityof all but the most expert users.

[0026] During the 1990's, the emergence of the Web as a means ofexchanging information has given rise to an explosion of dataavailability. This information is expressed in an immensely diversemanner. Due to the nature of the Web, little has been done to introducestandards, which are widely adopted by information authors, other thanHTML.

[0027] Technologies and standards such as XML provide a means oftransmitting information where the information contains a description ofthe format of its content. Day-to-day web explorers will seldom comeinto face-to-face contact with information in this form, as it isgenerally used as a means of providing interoperability between webbased systems.

[0028] A more widely understood method of transmitting information usingan easily recognizable format is to add a file extension to the end ofthe filename. For example, a document called “Sales Report” willtypically have an extension of “DOC” giving a total filename of“SalesReport.DOC”. Many users seeing this filename will immediatelyassume it is a MICROSOFT WORD document, if they are using the WINDOWSoperating system, but other users of systems such as APPLE MAC wouldnaturally assume that the information was formatted for their use.

[0029] For these reasons, confusion occurs so the ever increasing needfor users to exchange information on a corporate as well as global scalelacks truly universal support.

[0030] Some current art is designed to integrate with other devices, themost common example being a speech recognition package, such as DRAGONNATURALLY SPEAKING integrating with MICROSOFT WORD for the purpose ofallowing a user to dictate documents. However, the close integration ofsuch devices is rare and examples of voice driven systems are currentlyrare, in terms of day-to-day use by a reasonable number of users.However, such devices are ideal input methods, which enable a user tocollect information. What is needed is a means of forwarding thecollected information to other devices, which can usefully manipulatethe information. This, again, causes us to return to the core problem ofcompatibility and the user needing to know how to render the informationcompatible with other devices.

[0031] One surprising example, described in further detail during thedetailed discussion of the related drawings, is a particular web servicethat can translate text in English to either Spanish or French, but maylack the ability to translate from Spanish to French and vice versa. Theuse of an inter-lingua, such as English, is known. However, the qualityof multi-step translations executed in this manner while far fromperfect, are still perfectly understandable.

[0032] One only has to examine the work of the JPEG group, whichprovided a method of compressing photographic images, to see that anover zealous compression, while eliminating much of the sourceinformation, can still render an image that is easily recognizable, eventhough the size of the resultant data file containing the image has beensignificantly reduced. Similarly, AUDIO CODECS, which can provide ameans of compressing and decompressing audio information, can speed upthe transmission of audio signals by reducing quality. Again, the pointhere is that the information when received is still intelligible by itshuman recipient. Therefore, translations, conversions and the like whichemploy “lossy compression” are easily paralleled with multi-stepconversion processes where some sensibility is lost, but the usefulnessto the user remains substantially unaffected.

[0033] While a static language inter-lingua is known, a dynamicuniversal “inter-lingua” that permits conversion from a spoken Italianmessage to an ADOBE ACROBAT English message involving many steps andvarious “inter-lingua” intermediaries yet requiring only a one initialstep by the user is not known in the prior art.

[0034] The theory of self-actualization hypothesizes that a human'snormal behavior is to satisfy the basic needs of food and shelter first,and then to move on to satisfy more complicated needs. As soon ascomplicated needs are fully satisfied, a human can then move to a stateof self-actualization, which is to become all that a human is capable ofbeing. Self-actualization is a difficult process. In fact, most humansnever reach self-actualization, in part, because of their inability toutilize the entire capacity of the brain coupled with the demands offulfilling basic needs first.

[0035] A machine that can assist a human toward self-actualization isnot known in the prior art. However, if a computer could learn theuser's procedures utilized to satisfy basic need, and assist in thatneed directed process through enhancement of the senses and intellect,the computer would increase the speed at which the user could grow andself-actualize.

[0036] Thus, by definition such a computer would self-administer to theuser. By functioning essentially as the user's virtual representative, adigital stand-in, the computer is the user's alter ego . . . keepingtrack of and performing the user's tasks whether simple or complex,either with or without the direct involvement of the user.

[0037] Thus, a symbiotic relationship is created. The virtualrepresentative learns from the user through analysis of daily tasks,which are constantly recorded and analyzed, such that the proceduresselected by the user to fulfill basic needs become evident. In this way,the user and the virtual together, would be able to accomplish asubstantial increase in the number and complexity of tasks per day thatotherwise could not be accomplished with the user's unassisted abilitiesand time constraints.

[0038] The abilities of the virtual would grow with the user. As theuser grows and becomes more experienced, so would the virtual.Additionally, if the virtual is able to find more efficient methods forthe completion of tasks, the move towards self-actualization would thusbe accelerated.

[0039] Typically, 80% of a user's work is accomplished through repeateduse of only 20% of their software's available features. This is commonlyreferred to as Pareto's Rule, with the 20% commonly referred to as the“vital few”.

[0040] The current state of the art has attempted to a much lesserdegree to fulfill a user's need for fast and efficient access tofrequently used procedures. However, the prior art incorrectly attemptsto solve this problem by creating macros, icons, unfamiliar gesturesystems, scripting languages and the like.

[0041] One attempt to correct this problem is disclosed in U.S. Pat. No.5,805,167, issued to von Cruyningen on Sep. 8, 1998. This patentdiscloses a popup menu with directional gestures. Using this invention'scapabilities, the computer operator can design menus containing mostfrequently used commands and use these menus with existing applicationswithout revising the applications. Thus, menus with many items aremanaged by scrolling or by progressive disclosure of the menu items.Although this invention allows for user-specific menu options, theinherent problem still exists; the user must design these menus usingtheir “vital few”. Where the user will only be able to create thesecustom menus using their “vital few”, the remaining 80% of thesoftware's capabilities, including those capabilities that maydramatically increase the user's efficiency, will be unknown to theuser.

[0042] U.S. Pat. No. 5,974,413, issued to Beauregard on Oct. 26, 1999,discloses a semantic user interface, wherein a user is allowed to enter“commands” in his/her everyday natural language in order to control theoperations of the computer. All commands are language-based anduser-defined. These commands can be entered from any context of theuser's computer (any application or operating system workspace). Thecommands allow a user to launch applications and navigate withinapplications by using language rather than clicks from a pointing devicesuch as a mouse. It also allows the replacement of keystrokes withstored words or keystrokes. The system also keeps a complete archivalrecord of all the text content the user provides as input, regardless ofwhich application program or operating system window the user isoperating in at the time. The combined set of all user defined commandsand the memory of all the input text that is stored in the archiveconstitutes the personality profile and is transportable from onecomputer to another. However, as the personality profile is unique toeach user, it is not a standardized form capable of transferringexpertise across an international group of users utilizing disparatesoftware packages.

[0043] Technicians have for many years sought artificial intelligence,which is without doubt the “Holy Grail” of the field of informationtechnology. Artificial intelligence generally attempts to deliver amethod of building a system that “thinks”.

[0044] Automation is shown in many forms of prior art. The most popularof these, in modern software, is referred to as a macro. The useridentifies in advance that a particular sequence of keystrokes, mouseclicks and the like, are likely to be frequently executed. The user thenindicates to the system in use that macro recording is to begin, andafter the sequence of keystrokes and other inputs is complete indicatesthat recording is to end. If a keystroke is omitted the user has littlechoice but to begin the recording process all over again, hopefully notmaking any mistakes on the next attempt.

[0045] This form of macro is inflexible, and is merely a “parrot style”system of repeating input to a system. There is often no flexibility toapply a macro in combination with other macros or with other forms ofinput, or even to vary the use of the macro in any sense. The nextproblem arises when users try to remember how to trigger macros. Oftenthey are assigned to obscure combinations of key presses, such as CTRL-Cand CTRL-V, system defined macros which copy and paste items. There areno set rules or even many recommendations as to how macros should beorganized on one's keyboard.

[0046] Predefined macros such as CTRL-C and CTRL-V, as described above,often contain many strange and disturbing inconsistencies, whichfrustrate the novice user. For example, MICROSOFT WORD has a predefinedmacro for centralizing text by pressing CTRL-E, but this samecombination does not centralize text in MICROSOFT EXCEL, rather whenCTRL-E is pressed in MICROSOFT EXCEL an uninformative bleep is emittedby the software. So, inconsistent organization and application of macrosis evident in current art.

[0047] Systems have also been suggested and devised which are operableby instructions issued in plain English, not very helpful for speakersof other languages. However, this is still a move in the rightdirection, i.e. closer to the domain of the user and away from thedomain of computer jargon and confusing screen layouts.

[0048] Customizable screens are now the mode in all modern softwarecomprising toolbars, yet another task that the user has to do before apersonalized and ergonomic system becomes available. The mostfrustrating aspect of toolbar customizations is that they are notcarried from application to application. Again, MICROSOFT WORD carriesmany toolbars that the user can fine tune, or the user can even createempty toolbars and arrange commonly used tools one by one to appear onthem. However, when moving to other MICROSOFT programs the same toolbarcannot be employed, despite the fact that many identical buttons existin related programs. The user has to repeat the steps of customizationall over again, in the case of every application in use, a task, whichmost users will find intolerable.

[0049] An interesting development, which came further into public viewin the year 2000, was the work occurring in the field of OPEN AGENTARCHITECTURE. This art proposes an expandable collection of agents, eachhaving special abilities, which operates under the control of agoverning device, which acts as an interface between the user and thecollection of agents. The user expresses a desire to have a taskcompleted and the agents are described as being organized in order tofulfill the goal of the task. This requires that the user makes the taskrequest on each occasion and no form of expertise appears to be capturedor learned by the collection of agents.

[0050] Another trend, popular in modern software, is that the softwareshould consists of a specialist programming language which users areexpected to learn in order to extend the functionality of the softwarein use. This is obviously time consuming and therefore, beyond the scopeof novice users and those not concerned with programming in general.However, the inclusion of VISUAL BASIC FOR APPLICATIONS, MACROPROGRAMMING LANGUAGES, JAVA SCRIPTS and the like have all been createdat some time or another to plug a gap. That gap is special to everyuser, which operates a software package, in other words it is impossiblefor any software system to cater for all the specialist needs of 100% ofthe user base. It is extremely likely that less than 5% of users utilizesuch programming features, leaving the other 95% to share the cost ofdeveloping those features not utilized by the majority.

[0051] Many users have tried and failed to automate their software usingthe aforementioned art, resulting in junk accumulating within theirsoftware, in the form of abandoned macros, forgotten code snippets andthe like, being accrued in the software to which they relate.

[0052] The next group of prior art related to the invention is that oftask scheduling. This traditionally involves executing a computerprogram, such as a virus scan followed by a backup, at predeterminedtimes. The scheduling process will happily allow the backup program toexecute, even though the virus scan found a virus. This situation isclearly undesirable in the eyes of any computer operator. Executionschedulers are, therefore, found to be unsuitable in automating theday-to-day tasks of users, over and above those that execute once perday etc.

[0053] Users above all else tend to face an ever-growing learning curveas burgeoning software, unkindly referred to by the computer press asbloat-ware. More and more features are added in order to out-do thecompetition in a features war. This does the user no favors at all andjust leads to ever increasing sequences of dialogs, more “are you sure”message boxes and increasingly large drop down lists of fonts, fontsizes, and other information which must be sifted through in order tofind the desired option.

[0054] Some art is adopting a “most used appears first” philosophy forlists. For example, commonly used fonts are placed at the top a list, asopposed to being in alphabetical order. This is used so rarely as to beinconsistent and, therefore, increases user frustration as this ratherdesirable feature now appears out of place. Users are not able torestrict the number of choices in system-defined lists and are often notable to assign default values. What would be more useful is if thecontext of work defined which tools and which options were available,and in what order they are displayed. Users would then be presented witha more refined interface, sensitive to context and responsive to theirunique patterns of work.

[0055] Therefore, a self-adapting, self-optimizing system, thatconstantly records and optimizes tasks and their related tools andoptions, comprising a method of sharing expertise, while providing a wayto automatically re-enact any task(s), according to desired options andexternal constraints, is not found in the art.

SUMMARY OF THE INVENTION

[0056] It is an aspect of the present invention to provide aninformation processing apparatus and method having a smart power systemthat automatically senses the use and non-use of a plurality ofperipherals and either increases, decreases or eliminates the voltage tothe plurality of peripherals accordingly.

[0057] It is another aspect of the present invention to provide aninformation processing apparatus and method having an internationallymobile, one-package portable office, comprising high functionality andlow weight burden.

[0058] It is a further aspect of the present invention to provide aninformation processing apparatus and method having a one-packageportable office that includes a personal computing device, a cell phone,fax, photocopier, scanner and printer, GPS, camera, etc. functioning asan integrated unit.

[0059] It is another aspect of the present invention to provide aninformation processing apparatus and method having a circuit thatreduces the effect of interference noise experienced when using acellular and a landline modem connected to an audio device (PC-Soundcard etc.) when sharing a common power supply.

[0060] It is another aspect of the present invention to constantly saveas much time and effort for the user when completing their tasks,regardless of location, through creating a virtual representative andincreasing automation by utilizing contemporary technology and thevirtual representative to lessen the work burden on the user of theinvention.

[0061] It is another aspect of the present invention to provide the mostergonomic and dynamic interfaces and front ends in the user's chosenlanguage along with the utmost automatic adaptation and personalizationcapabilities.

[0062] It is another aspect of the present invention to provide theshortest possible learning curve for the user to learn, operate and bekept updated combined with a dynamic, interactive and intuitive trainingmethod.

[0063] It is another aspect of the present invention to provide anefficient turnkey, long life, robust and reliable product (integratedand tested in a harmonized environment), which is economical to operateand maintain while being supported by a dynamic auto-update system.

[0064] It is another aspect of the present invention to provide asubstantially indestructible memory to store and protect the user'slifetime personal, work, environmental and other information and data,allowing it to exist theoretically indefinitely.

[0065] It is another aspect of the present invention to provide aninformation processing apparatus and method that facilitates anergonomic work environment through the elimination of repetition and theoptimization of work patterns.

[0066] It is another aspect of the present invention to provide aninformation processing apparatus and method having a universalconversion module that can convert any format of information such ase-mail, fax, application data file, etc., to any different format with asingle button click.

[0067] It is a further aspect of the present invention to provide aninformation processing apparatus and method that enables the user toaccess the World Wide Web to locate optimized work procedures andteaching mentors.

[0068] It is the final aspect of the present invention to support anintegrated software application external to, but interacting with, theinvention in order that the software application can be self-adapting tothe users needs with regard to streamlining the user interface,providing personalization and one-click access to all basic needs.

[0069] The invention is an information processing apparatus and methodintended to function in harmony with an operation model. An operationmodel is any software To application, which can function, or can bemodified to function with the invention such A that work done with theoperation model can be automatically recorded and re-enacted by theinvention according to the styles, abilities and principles of the user.As such the invention, by analyzing the user's tasks, related options,documents and other data into coded form instructions (CFI), formulatesa digital autobiography of the user.

[0070] The apparatus facilitates a high degree of awareness of what theoperation model is being instructed to do by its user, based on modules,which ensure the user has every possibility to use the inventionregardless of physical location or information formats being sent andreceived. To this end, support for the power requirements of a pluralityof peripherals, even in a mobile context is featured. The user will havethe highest availability of equipment, and the highest possibility tocomplete work through the invention at all possible times.

[0071] A universal converter is included, capable of changing any inputto any output that is sensible and feasible, e.g., speech to text, textto speech, fax to speech, language translation and the like. This issupported by a network of translation utilities and diverse services,which are brought together in harmony to facilitate a path from anyinput to any output where possible.

[0072] The invention is self-optimizing for a particular user in thatthe user's operation of the apparatus, in other words, the sequence ofapplication buttons and predefined input fields and work items that areselected to accomplish a task, are recorded and stored in an operationlog containing usage information of the corresponding operation model.

[0073] A task list, comprising the basic needs of the user, is formedand continually updated and optimized dynamically by extractingfrequently used tasks from the operation log. Further, a correspondingserver, which maintains a comprehensive and evolving list of allpossible tasks and options, published by all users of the apparatus,facilitates the transference of expertise, experience and best practicein a harmonized fashion.

[0074] Further, additional options for the input fields can be obtainedfrom the server or other corresponding servers. The user is provided theoption of executing sequential or parallel tasks from the task listeither immediately or according to a predetermined time schedule orsystem events occurring within the apparatus itself or the correspondingoperation model. The execution of the tasks can occur with or withoutinteraction from the user where all input values are known for the task.Thus, the invention functions as a virtual representative of the user,functioning according to the principles and styles learned from theuser.

[0075] Additionally, the user can project and review different taskmodels to ultimately determine a personal set of preferences, which arerecorded and stored in a preference list. The preference, of course,will be unique to a particular user. Notifications in accordance withthe selections are provided when a task is executed with an altered setof input fields and a deviation has occurred from the task model thatwas based upon a task stored in the user's personal preference list.

[0076] The apparatus supports personalization of all options and inputmethods, facilitating the reduction of burdensome option listscontaining a multitude of values.

[0077] Other aspects, features and advantages of the present inventionwill become obvious from the following detailed description that isgiven for one embodiment of the present invention while referring to theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0078]FIG. 1 is an illustration of the peripheral control moduledepicting the interconnections between the module, a notebook computerand plurality of peripherals.

[0079]FIG. 2 is an illustration of a subroutine being called withinsoftware corresponding with the invention, in order to effect a changein power state of any connected peripheral.

[0080]FIG. 3 is an illustration describing the execution of a powerstate change command.

[0081]FIG. 4 is an illustration describing the logic present in thehardware of the peripheral control module as it monitors for incomingpower state change commands.

[0082]FIG. 5 is an illustration depicting interaction the peripheralcontrol module and corresponding application software with regard tomonitoring the presence of a PSTN connection.

[0083]FIG. 6 is a block diagram summarizing relevant inputs and outputsof the microcontroller, which governs the state of power supply to theconnected peripherals.

[0084]FIG. 7 is a block diagram depicting a function of the peripheralcontrol module, which selects power supply source from battery oruniversal power adapter.

[0085]FIG. 8 is a block diagram of audio integration provided by theperipheral control module in order that audio requirements of modems anda notebook computer are matched.

[0086]FIG. 9 is a schematic diagram of the microcontroller, audiointegration, RS-232 integration and power management circuits of theperipheral control module.

[0087]FIG. 10 is an illustration of the general self-administrationmodule.

[0088]FIG. 11 is a diagram depicting the flow of information through andwithin the universal converter module.

[0089]FIG. 12 is a diagram depicting an overview of the virtual moduleinterconnected with related software and systems.

[0090]FIG. 13 is an illustration of the functionality within the virtualmodule.

[0091]FIG. 14 is an illustration of the user interface dialogs forviewing e-mail, playing a sound file and forwarding the sound file viae-mail.

[0092]FIG. 15 is a detailed view of the e-mail step of FIG. 14.

[0093]FIG. 16 is a detailed view of the play sound file step of FIG. 14.

[0094]FIG. 17 is a detailed view of the forward voice recording step ofFIG. 14.

[0095]FIG. 18 is an illustration depicting the steps occurring as tasksare recorded.

[0096]FIG. 19 is an illustration describing the two-step process asviewed by the user.

[0097]FIG. 20 is a table depicting optimization of a single task toultimately form a single-click operation.

[0098]FIG. 21 is an illustration of a typical task list.

[0099]FIG. 22 is an illustration summarizing the operation log.

[0100]FIG. 23 is an illustration summarizing the task list.

[0101]FIG. 24 is an illustration showing the information extracted andprocessed by task modeling.

[0102]FIG. 25 is an illustration summarizing task modeling.

DETAILED DESCRIPTION OF THE INVENTION Overview

[0103] Philosophically, the invention can be best appreciated bystudying the works of Charles Darwin. See, Darwin's Dangerous Idea,Daniel C. Dennett, Simon & Schuster, New York, 1996, page 43. Applyingthe theory that Darwin formulated for his explanation of the Origin ofSpecies, it is apparent that this concept can also be used to describeso many different people having so many different needs and strategiesthat must be met by their respective computers and software. Theprinciple of natural selection is the unifying insight into theinventor's approach to his information processing apparatus and method.

[0104] By having a large variety of inheritable skills (through storagein computer systems), which constitute recorded procedures in theinvention; these different procedures will tend to have differentpayoffs for different individuals and subgroups of the user population.Under Darwinian Theory, these different individuals and subpopulationswould tend to diverge, each pursuing their favored sort of excellenceuntil, eventually, there is a distinct division. With biologicalsystems, transference of inheritable characteristics implemented by DNAmutations and modifications is possible only from parent to child andeven then, is frequently “hit or miss”. Mutation in this field is oftenviewed as random, unstructured and survival appears to be by pure chanceand by no means permanent, as far as a species is concerned.

[0105] However, by using the inventor's methods, this random andunstructured divergence is eliminated since the entire optimized skillset is “inheritable” by one computer communicating with another computeror with the user.

[0106] In essence, this method provides a new modality for increasingman's knowledge exponentially in volume and in speed of transferencefrom one individual or subpopulation to another.

[0107] When newborn, a human could not survive without instinct, reflexand care. Therefore, the inventor has envisaged provision for basictasks (instinct) corresponding to the initial needs of the user.Fundamentally as those instinctive tasks, and other tasks, are used theinvention self-optimizes (reflex) according to the manner in which theuser completes work. Further, by seeking expertise captured by otherusers, the invention is able to gain additional knowledge, whichdirectly relates to caring for the user's virtual, helping it to growand accumulate more tasks and related choices, applicable to the user'swork.

[0108] The present invention features a method of computerizedself-expansion and self-optimization. Any compatible software package,such as MICROSOFT OFFICE, is defined herein as an operation model.However, to be defined as compatible, the software must adoptinterconnection standards dictated by the invention.

[0109] In other words, an operation model represents compatibility,where a software package, or suite of software packages, is customizedby their vendor to comply with the invention. This enables a mutual flowof information from an operation model to the invention and vice versa.

[0110] The invention restricts the amount of delivered functionality tothat which is relevant to the operation model as used by the user on adaily basis. This is all that is necessary for the vast majority ofindividuals. However, operation models interact to augment each other;this is evident in office type applications where spreadsheets can beembedded in word-processor documents.

[0111] The invention is complemented by the peripheral control module,which increases the functionality offered to the user in terms ofhardware, whether static, in an office based context, or mobile, even inan international context. The peripheral control module provides theutmost convenience, increasing portability by reducing weight burden andeliminating energy waste encountered by peripherals in standby mode andother energy saving modes.

[0112] An aspect of the invention is to deliver a system that allows anoperation model to work in its own context and with respect to theuser's own language. Therefore, the invention views all activity of theoperation model as being abstract, without meaning. But, by implementinga foundation based on the analysis of frequency of use, related to allelements of the operation model, immense amounts of information flowinginto the invention can be fed back to an originating operation model asconcise coded instructions referred to as procedures, tasks andoperations. The operation model, and of course, the user are the onlybodies able to assign meaning to any work, the invention simplyfacilitates the recording, expansion, classification and automaticre-enactment of any work.

[0113] The coded instructions consists of a great deal of flexibility inrelation to any user-selectable option, which changes during eachiteration of a work item being created or worked upon by the user. Theinvention is constantly and automatically seeking patterns, habits andconsistency in order to provide automation, and where automation is notcompletely feasible, optimization reduces the number of manual inputsfrom the user in order to complete any work in the shortest possibletime.

[0114] The universal conversion module is included in the softwaresystem, which is capable of incorporating existing conversion programsto leverage a plurality of conversion methods, in order to find a pathof conversion from a known input to a known output. Information storedas a raster image, such as a received fax or scanned document, canreadily be converted to a text document, which in turn can pass througha text to speech conversion and so on. Wherever it is sensible andfeasible to provide such a feature, the functionality has been put inplace to support this philosophy.

[0115] To achieve the same functionality that is provided by theinvention, the user would have to spend enormous amounts of time andmoney selecting and installing dozens of individual software andhardware devices, though many of them will simply fail to interact onany appreciable level if unassisted by the invention.

[0116] The invention is designed so that it continuously monitors theuser's interactions with the invention and seeks ways to support anoperation model in the goal of providing an ergonomic user environment.Tasks, which were not envisaged at the time of software development, canbe described by the user or can be gained from other users. Theinvention provides an open interface, which welcomes structured forms ofdisclosure from operation models, which require activity to be recorded.

[0117] If a task is frequently used, the system can automate suchprocedures and execute them without further need for interaction withthe user. Thus, the user appears to exist “virtually” in many places,simultaneously, as tasks are executed in parallel, perhaps, in diverselocations. Further, the user can predetermine the time of execution, thefrequency of execution and even the triggers that will cause theexecution of any task. A “virtual existence” is gradually established asthe system takes over tedious or burdensome tasks that would normallyrequire the close attention of the user. For example, complex sequencesof dialogs, requiring a plethora of input fields to be populated andselected can be reduced to a single click, in most cases, enabling theuser to get to the point of constructive work in the shortest possibletime.

[0118] The invention, in addition to providing all of the abovebenefits, also allows the user to seek a mentor via corresponding WebCommunication Providers (WCP).

[0119] Mentor is defined as a person or digital representative withspecialized knowledge, which can be shared in digital form.

[0120] The mentor can be located anywhere in the world, again, as longas there is at least one corresponding method of communication availableto reach them. A mentor is not restricted to the form of a physicalbeing. A software system containing the procedures of an expert,behaving as a digital representation of the expert, becomes possible.Such mentors are provided or facilitated by a correspondinginfrastructure, that is, another apparatus having the same capabilitiesand design configurations of the invention. Consequently, the user isable to draw from the source of expert procedures that have been basedon the knowledge of those who are recognized as the best in their field.Such procedures can emanate from other users of the invention, or fromany other source of information, i.e. operation model, as long as theoperation model conforms to certain protocols in accordance with theinvention.

DESCRIPTION OF THE PREFERRED EMBODIMENT

[0121] Referring now to FIG. 1, peripheral control module 100 isrequired for the integration between notebook 102 and a plurality ofcommonplace peripherals all operating from a single power source. Module100 includes microcontroller 1600, described in FIG. 9.

[0122] Notebook 102 is a standard portable laptop computer such as aDELL INSPIRON 7000, having a sound card, internal microphone, memory,central processing unit, floppy drive, hard disk drive and a plethora ofexternal inputs and outputs further including external microphone,external line-in, speaker output and USB PORT and the like.

[0123] Module 100 acts as a power supply for a plurality of peripherals,while drawing power from a source automatically selected from eitherbattery 108 or universal power supply 110, found in notebook 102.

[0124] The plurality of peripherals includes camera 170 (e.g. ConexantUSB Camera), scanner 172 (e.g. Avigramm MiniDoc USB), printer 174 (e.g.Citizen PN60), USB hub 176 (e.g. ADS Docking Station USBH-803), landlinemodem 140 (e.g. Conexant Socket Modem) and cellular modem 146 (e.g.Siemens M20T). Within schematic drawings the term “GSM” occurs due tothe fact that cellular modem 146 in the preferred embodiment is theSiemens M20T, which adopts the European GSM standard, therefore, theterms GSM and cellular modem are interchangeable.

[0125] The plurality of peripherals can optionally consists ofprofessional tools 177 representing any specialist equipment that can beconnected to HUB 176 or any other port on notebook 102, broadcastreceivers 109 with corresponding decoders 111 (equivalent to GPS, TV andRADIO etc.), wireless communication 113 (equivalent to BLUETOOTH, X10,INFRARED etc.) or other methods of information exchange which willincrease the ability of user 600 to stay in touch with the inventionsubstantially continuously.

[0126] Connectors 114 and 112 depict the physical USB connection betweenhub 176 and notebook 102.

[0127] Module 100 takes a DC input voltage from battery 108 throughconnection 118 and if connection 116 is present then module 100additionally takes a DC input voltage from supply 110. These are nowanalyzed in DC input controller 117, where power is drawn from supply110 if connector 116 is present otherwise supply is drawn from battery108. Therefore, module 100 is able to meet the power requirements of theplurality of peripherals with or without a mains connection, providingbattery 108 holds sufficient charge. FIG. 6 further describes theselection process contained in module 100 in order to choose betweensupply 110 and battery 108 as its source of power.

[0128] It is essential that when notebook 102 is powered-off, or entersa state commonly referred to as HIBERNATION, where the state ofexecuting software is preserved on hard disk before notebook 102switches off, that the plurality of peripherals is also powered-off. Forthis purpose connector 119 is hardwired between notebook 102 and laptoppower state 120 and enables module 100 to sense when notebook 102 ispowered-off. Therefore, when notebook 102 is powered-off, eithermanually or through means of operating system software, the plurality ofperipherals is also powered-off and finally module 100 is powered off.Connector 119, when joining to notebook 102 can do so at any point wherea voltage is present so long as the voltage is only present whennotebook 102 is in a power-on condition.

[0129] Module 100 includes a set of power outputs further comprising 5V(five volts) supply 502, 5V supply 504, 9V supply 506, 5V supply 508, 5Vsupply 510, 9V supply 512, each being a unique power supply line whichoperates under the control of microcontroller 1600, and can therefore,be switched on and off by module 100 under the control of OM.

[0130] The power supplies of camera 170 and hub 114 are not illustratedin this preferred embodiment as being under the control of module 100 asthe embodiment serves to illustrate the management of power supply tothe plurality of peripherals which could consists of camera 170, hub 114or any other peripheral, if so desired. This can be enabled by using amicrocontroller with additional capacity for power supply select linessimilar to those having power outputs. Even though the power supplycondition of hub 176 and camera 170 are not related to microcontroller1600, module 100 still ensures both are powered-off when notebook 102 ispowered-off.

[0131] Aforementioned power outputs are only enabled when OM instructsmodule 100 to either apply or remove power from a specific peripheral.At initial power-on, i.e. when notebook 102 is powered-on, the pluralityof peripherals can be all off, all on or in a mixed state where someperipherals are on and others are off. This is possible throughinstructions contained in the firmware of microcontroller 1600. In otherwords, when notebook 102 is powered-on microcontroller 1600 can placeeach peripheral in a default power condition, being either on or off.

[0132] When OM, running on notebook 102, requires any peripheral fromthe plurality of peripherals to be powered on or off an appropriatepower state change command must be emitted from notebook 102 via RS-232Port 104 along connection 121 to power command decoder 122, an operationwhich is further described in FIGS. 2 through 4.

[0133] It is known that power state change commands could also be issuedvia other types of communication port, including but not restricted toRS-232, RS-422, PARALLEL PORT or USB and USB connected communicationports and the like.

[0134] It known that hub 176 can be a USB HUB which directly draws powerfrom the corresponding USB PORT on notebook 102, therefore, whennotebook 102 is powered off the USB HUB, and those peripherals connectedto the USB HUB if powered by the USB HUB, would also be powered-offautomatically. However an inherent restriction on the amount of powerthat can be supplied by the USB PORT on notebook 102 is imposed to avoidoverloading notebook 102. For example, when connecting a USB CAMERA to aUSB HUB, the USB HUB typically requires either a main power supply orthat the USB CAMERA includes a separate supply (e.g. batteries).

[0135] Referring now to the integration of notebook 102, landline modem140 and cellular modem 146, this occurs in two distinct senses:

[0136] First, the RS-232 channels of both Modem 140 and Modem 146 comedirectly to RS-232 integration 144 through their respective connections,being connector 142 and connector 148, such that a single RS-232 channelis presented to notebook 102 either by connecting connector 145 directlyto a serial port on notebook 102 or through a USB TO SERIAL CONVERTER,known in the art, which can be having hub 176 or can be connected to hub176. Either will result in a single RS-232 data-path between notebook102 and modem 140 or modem 146, which ever is powered-on at the time. Byonly allowing one of modem 142 and modem 146 to be powered on at anymoment, OM can effectively multiplex one RS-232 port related to notebook102 to two modems. The preferred embodiment illustrates this featurewhen considering a mobile user that at times will have a connection frommodule 100 to Public Switched Telephone Network (PSTN) 135 and at othertimes will not, for instance while driving in a car.

[0137] Therefore, module 100 includes PSTN CNCT 125, further consists ofmicro switch 520 (see FIG. 9), which is depressed when a PSTN connectingcable is inserted into PSTN CNCT 125. When PSTN CNCT 125 is connected tothe PSTN 135 then PSTN STATE 124 will have a condition of ONE indicatingto OM that a physical connection to PSTN 135 is present. When thephysical connection is removed then PSTN STATE 124 will have a conditionof ZERO and OM is informed of the connection state via connector 126,which modifies the condition of the DSR signal contained in serial port104.

[0138] Landline modem 140 is connected to PSTN CNCT 125 throughconnector 141 in order to be able to transmit and receive data over PSTN135.

[0139] Secondly, the audio inputs and outputs of modem 140 and modem 146are brought through their related audio connectors (connector 134 andconnector 133) to a related set of simple audio amplifiers, namelylandline audio integration 131 and cellular modem audio integration 132,which are configured to match the audio input/output levels for notebook102 when connected to the modems (further disclosed in FIG. 7).

[0140] Cellular modem 146 includes an audio input/output interface,which can be connected to any external interface. For example, in avehicle application, cellular modem 146 can be connected to an in-caraudio system to facilitate hands-free communication while driving. Thecellular modem and the in-car audio system, as described, will share acommon power supply, namely the car battery. Similarly, in the preferredembodiment a common power supply exists for notebook 102, module 100 andcellular modem 146 as they are all interconnected.

[0141] When cellular modem 146 is connected to, and shares a commonpower supply with any audio device, interference leaks from cellularmodem 146 into the connected external audio system.

[0142] In order to suppress this interference, module 100 includes theinterference elimination circuit PWR DCPL 1700 (further disclosed inFIG. 8), where the ground connections of cellular modem 146 are isolatedfrom the rest of module 100, and interference from cellular modem 146,which travels along ground connections of power supply lines to audioinput/output 106, is substantially eliminated. Therefore, the quality ofaudio signal through connector 130 is substantially improved.

[0143] The preferred embodiment uses COM1 for the purposes ofcommunicating with the modems, and COM2, manifested by a serial port onhub 176, is utilized by the power state change command system. The COM2includes two signals of interest to the invention, one input signalcalled Data Set Ready (DSR), used to indicate the state of PSTN STATE124 and one output signal called Data Terminal Ready (DTR) used by OM totransmit power state change commands to power command decoder 122.

[0144] It is known that an additional USB TO SERIAL CONVERTER wouldallow notebook 102 to concurrently support modem 140 and modem 146,though the aim of the preferred embodiment is to teach a method ofconstructing module 100 with a minimum of hardware and therefore,maximum power efficiency, but it is also logical to assume that when theuser has furnished module 100 with a connection to PSTN 135 thatcellular modem 146 will no longer be in use, and can, therefore, bepowered-off reducing power consumption.

[0145] The preferred configuration of notebook 102 includes 128 MB RAM,20 GB HARDDISK, FLOPPY. DRIVE, DVD DRIVE, PENTIUM III or equivalent, TFTCOLOUR DISPLAY 14.1″ or similar, PC-CARD capability, ETHERNETcapability, at least one RS-232 PORT, at least one USB PORT, at leastone PARALLEL PRINTER PORT, at least one INFRARED PORT. Input deviceswhich can be contained in notebook 102 are CD/DVD drives, joystick, joypad, document scanner, unified sheet feeder, touch pad, PDA, fingerprint scanner, keyboard, graphics tablet, chronograph, touch screen,electronic ID card reader, microphone, removable media, camera, mouse,sensors for smell, taste, touch, light, temperature and air composition.Output devices which can be contained in notebook 102 are display,removable media, printer and or Braille printer, speakers, PDA, emittersfor smell, taste, touch, light, temperature and air composition.

[0146] Notebook 102 can support communication via telephony via alandline systems such as modems V90, K56FLEX, ISDN, DSL and others,cellular modems, PC-cards supporting connection to mobile telephones andthe like. Notebook 102 has the capacity of simultaneous reception and ortransmission of both landline and cellular data all over the worldwithout the user needing to change any of the related settings, eitherin software or in hardware. Notebook 102 includes physical connectionsthrough standard ports and connectors such as USB, serial, parallel,mouse and keyboard, interface cards, audio in/out, video in/out and thelike.

[0147] A corresponding “Black Box” recorder, being a substantiallyindestructible, detachable, robust, reliable and extendible lifetimememory with multiple connectivity options for notebook 102. The blackbox stores all dynamic data for the invention including but notrestricted to the user's personal, work and environment data andprovides extensive storage space for operations models further disclosedin the figures.

[0148] It is recommended that Notebook 102 be connected to at least asuitable backup device 103, for example a ZIP DRIVE, TAPE STREAMER orother form of backup device. Backup device 103 can be a memory device,which can be wirelessly connected to notebook 102. Backup device 103contains a differential backup such of outstanding Items changed sincethe last full system backup.

[0149] User 600 and notebook 102 can exchange information via localinterfaces comprising keyboard, touch screen membrane, display, mouse,microphone, speakers, camera, electronic ID card, graphics tablet,joystick, joy pad, document scanner, or by compatible interfacescomprising telephone (tone and pulse dialing), mobile telephone, fax,thin clients such as remote personal computer, smart mobile telephone(WAP, GPRS, 3G etc.), PDA, television with web T.V. and the like.

[0150] Local interfaces and compatible interfaces provide substantiallycontinuous access to notebook 102 and the invention in whole or in part,also facilitating communication with Web facilities and the Worldthrough the ability to receive and transmit audio, visual and datainformation in analogue or digital forms.

[0151] The invention benefits user 600 by being highly mobile andportable, offering detachability of any component when feasible, whilemaintaining the highest available level of functionality.

[0152] The screen brightness and screen image magnification can beadjusted automatically according to light level, user's sight anddistance from the display by comprising distance measuring equipmentbased on INFRARED emissions which enable the invention to judge thedistance between notebook 102 and user 600.

[0153] Notebook 102 by comprising such a diverse range of peripherals,local interfaces and compatible interfaces has provision for connectionsto all sensors and emitters, in order to duplicate human senses and tosimulate any environment. Such sensors can perceive a broader spectrumthan human senses alone and therefore, increase the user's sensorycapabilities.

[0154] As a multipurpose device interconnected with many peripheralsnotebook 102 serves as a mobile or fixed workstation, for anyprofession, whether user 600 is stationary or is moving around theworld, as it includes all commonly needed hardware, software andsubscriptions, providing the user with instantaneous and multiple accessoptions to his workstation through the local interfaces or thecompatible interfaces.

[0155] As a multifunction device notebook 102 has all functions of themost popular devices and appliances, used in day-to-day domestic andprofessional activities, as well as access to the powerful featuresafforded by information technology systems and applications, i.e.personal computer with a Global Internet Access, PDA, graphics tablet,document and finger print scanner, printer and Braille printer, CDplayer, DVD player, camera, video camera, audio recorder, audio player,juke box, video recorder, audio/visual and data media streams,telephone, mobile telephone, answering machine both for land line andmobile telephones, e-mail, facsimile, group video conferencing,photocopier, television, radio, Work and Domestic Security Applicationsand Devices, remote control for domestic devices and appliances, alarmclock, calculator, global positioning system (GPS), magnetic media andCD recorder, sensors, emitters and others.

[0156] Referring now to FIG. 2, a decision tree that must exist withinOM is shown. The decision tree is defined as power decision comprisingblocks 204, 206, 208, 210, 212, 214, 216, 218, 220 and 222.

[0157] Flow begins at block 200 when a calling subroutine in OM, forexample, a subroutine designed to print a document, calls upon powerdecision to effect a change in power state for a peripheral having theplurality of peripherals, in this example printer 174 (see FIG. 1).

[0158] Power decision seeks to discover the exact power command that wasprovided by the calling subroutine, in this example block 220 indicatesthat printer 174 is to be powered-on. Therefore, flow moves to block 226where the power command is constructed and transmitted to power commanddecoder 122 (see FIG. 1)

[0159] At least one block in power decision must yield a “YES”condition. If power decision fails to yield a “YES” response then block228 is reached and flow returns to block 200, due to the fact that thecalling subroutine specified an out of range value as a power command.

[0160] The simple example of changing printer 174 to power-on conditionillustrates a basic example of using power decision to effect a powerstate change. However, exemplifying printer 174 also highlights afurther possible difficulty when turning any printer off, that ofpotentially loosing data contained in the printer's data buffer, aproblem known in the art. In the present example this would result in anincomplete document being rendered by printer 174. Therefore, to addressthis problem power decision includes a loop, depicted by block 224 whereOM can query the operating system to see if all print jobs for printer174 have been completed. If this yields a “YES” response, indicating alljobs are complete then a preset time delay is entered within block 224,where a loop iterates through connector 225 until the preset time delayhas elapsed. The preset time delay should be set at a sufficient periodto allow printer 174 to fully empty its data buffer, typically a valueof ten seconds should suffice, though in extreme cases (when printinggraphics) in excess of a minute may be necessary.

[0161] Referring now to FIG. 3 the steps contained in send command 226is illustrated. Send command 226 is a sub routine, which transmits apower state change command to power command decoder 122 (See FIG. 1).

[0162] The preferred embodiment features a method of sending power statechange commands via RS-232 data signals, i.e. DTR and DSR. Therefore,FIG. 3 depicts the order of changes in the signal referred to as DTR,which is directly connected to power command decoder 122.

[0163] Block 240 shows that DTR is turned off (ZERO condition) to ensurethat power command decoder can see a clear transition from ZERO to ONE.Subsequent blocks now show that DTR should be modulated in a reasonablyprecise manner so that power command decoder 122 will recognize thepower state change command.

[0164] At block 242, block 244, block 246 and block 248, DTR is set to aONE condition for 100 milliseconds and then set to a ZERO condition for100 ms. Power command decoder 122 recognizes this change and length oftime as being the start of a power state change command. Through theblocks DTR has moved from a ONE condition to a ZERO condition within apreset period of time.

[0165] At block 250, block 252, block 254 and block 256 the DTR signalis again modulated from ZERO to ONE and BACK to ZERO with a frequency of50 milliseconds. At block 258, an internal counter keeps tally of thenumber of 50 millisecond ONE/ZERO transitions that have occurred thusfar and if the counter matches the identity of the power state changecommand itself then block 260 is reached, otherwise flow returns toblock 250 and so on until the correct number of 50 millisecond pulsesare transmitted to power command decoder 122.

[0166] Finally at block 260, block 262 and block 264 the DTR signalagain moves from ZERO to ONE for 100 milliseconds then returns to a ZEROcondition, thus the end of the power state change command is transmittedand flow ends at block 266.

[0167] To summarize, the power state change command has a numericalidentity, where identity value of one means Camera On, two means Cameraoff, three means Scanner on etc. The sequence of 50 millisecond pulsesis sandwiched between two pulses of 100 milliseconds, being start andend of command indicators. The pulses are detected by the Power CommandDecoder and acted upon accordingly.

[0168] Referencing now to FIG. 4, the corresponding power state changecommand decoder logic is illustrated, and is contained inMicrocontroller 1600, (see FIG. 9 MOTOROLA 68HC908JK1). Microcontroller1600 is used to store and execute a program, typically referred to asFIRMWARE. FIRMWARE in microcontroller 1600 is depicted in FIGS. 4 and 5.

[0169] Several other compatible forms of microcontroller are availablefrom MOTOROLA and can be used to extend the capacity of module 100 byproviding the ability to control additional peripherals.

[0170] The DTR signal of an RS-232 port (COM2 in the preferredembodiment) is brought directly to microcontroller 1600 which monitorsthe DTR input signal for transitions in state i.e. ZERO to ONE or viceversa. FIG. 4 shows how power command decoder 122 includes the analysisof these transitions and recognizes the start of command (100 ms pulse),command pulses (50 ms pulses) and end of command (100 ms pulse)conditions indicated by the state of the DTR signal.

[0171] Flow begins at block 300, which is the start point of asubstantially infinite loop, which runs inside microcontroller 1600 aslong as the invention is powered-on. Block 302 will not yield a “YES”response unless the DTR line changes from ZERO to ONE and holds for aperiod of 100 milliseconds (ms), finally changing back to ZERO for 100ms. This signals the start of the power command being input from theRS-232 serial port under the control of OM. Loop connector 304 causesflow to stay within block 302 until such time as this 100 ms ONEcondition is detected.

[0172] After the first ONE condition of 100 ms comes a sequence of 50 mspulses, which are counted at block 306 until such time as a pulse with alength of 100 ms occurs, detected by decision block 308.

[0173] When decision block 308 detects the 100 ms pulse flow is divertedto block 310 where the incoming command is complete. Flow then moves toblock 312 and block 316 in turn, where a decision is made as to whethera peripheral is to be powered-on or powered-off. Flow continue to block314 where a peripheral is powered-on or block 318, where a peripheral ispowered-off, and accordingly the power state change command, identifiedby the number of 50 millisecond pulses, is effected. Block 320 isreached if an invalid command is received and flow returns to block 300.

[0174] A further power condition is monitored by microcontroller 1600and this is depicted as connector 119 and laptop power state 120 (seeFIG. 1). The presence of a voltage on connector 119 informsmicrocontroller 1600 that Notebook 102 is powered-on. When this voltagedisappears, Microcontroller 1600 begins a shutdown sequence turning offthe plurality of peripherals and finally powering off module 100.

[0175] This monitor process is depicted at the flow beginning with block322 where flow moves to block 324 where a substantially infinite loopbegins and is maintained through connector 326 so long as the voltage ispresent on connector 119. The instant that the voltage drops to zero onconnector 119 flow moves to block 328 and the plurality of peripheralsand module 100 are powered-off and flow ends at Block 330.

[0176] As shown in FIG. 5, two corresponding flows are depicted. Thefirst of these begins at block 330 and the second at block 340.

[0177]FIG. 5 illustrates the fact that PSTN STATE 124 includes a flow,which constantly monitors the presence of a physical connection to PSTN135. This is done by monitoring the state of the aforementionedmicro-switch, which is embedded in PSTN Connector 125. The micro-switchis depressed as a physical connector enters and is locked in PSTNconnector 125. When the micro-switch is depressed block 332 diverts flowto block 334 where DSR, a signal utilized from RS-232 port 104, is setto a ONE CONDITION. When the connection is removed from PSTN CNT 125then block 336 diverts flow to block 338 where DSR is set to a ZEROcondition.

[0178] The monitoring loop then continues as flow returns once again toblock 330.

[0179] OM must monitor this change in the state of DSR and will knowimmediately if the physical connection to PSTN 125 is in place or not.OM means operation models 610 or GSAM 612 (see FIG. 10) or any othersoftware, which is compatible with the invention for the purpose ofrecording and re-enacting tasks carried out by the user.

[0180] This monitoring loop, which must be contained in OM, begins atBlock 340 and flow moves to block 342, which tests the DSR state for aONE CONDITION and if this yields a “YES” response then flow moves toBlock 344, where example behavior is depicted by OM powering-offCellular Modem 146 and powering-on Landline Modem 140 (see FIG. 1).

[0181] Decision block 346 detects when DSR changes to a ZERO conditionand a contrary example is depicted in block 348, where cellular modem146 is powered-on and landline modem 140 is power-off.

[0182] The modulation of DTR and the monitoring of DSR conditions caneasily be achieved using VISUAL BASIC version 4.0 or similar andutilizing the comprised MICROSOFT COMM CONTROL (used for serialcommunication). Other development environments such as JAVA and C++could also be used.

[0183] Referring to FIG. 6, a summary of the relevant inputs and outputsof microcontroller 1600 is shown. These inputs and outputs provide theinterface between the OM and power supply control.

[0184] Microcontroller 1600 corresponding to U3 in FIG. 9, monitors DTR,depicted as connector 121 (see FIG. 1) which is modulated by OM. OMissues a combination of pulses 1622 (as described in FIG. 3),representing a unique command which is decoded and acted upon bymicrocontroller 1600.

[0185] The second input monitored by microcontroller 1600 is PSTN CNCT125 (see FIG. 1). This input has a corresponding output in the form ofPSTN STATE 124 (see FIG. 1).

[0186] Supply control lines are made available by microcontroller 1600,the state of which is governed by power command instructions issued byOM through modulation of DTR. Power control Lines include scanner supplycontrol line 504, printer supply control line 506, landline modem supplycontrol line 510 and cellular modem supply control line 512 each drive acorresponding transistor pair which act as an on/off switch between DCinput controller 117 and the related peripheral. As shown in FIG. 9,block 540, refer to Q7, Q8 and associated resistors as a representativeexample of a transistor pair.

[0187] Supply hold on 1614 enables the supply pass transistor Q6 sosupply is maintained while power is available, corresponding with holdon 1430 (see FIG. 7).

[0188] An acknowledgement of power state change commands can be providedby microcontroller 1600 to signal back to OM that instructions have beenaccepted and acted upon. This could be done by connection through aserial communication port utilizing another handshake line, such as DSRor RTS. Alternatively the DSR line, which is already under the controlof microcontroller 1600, could be modulated to indicate PSTN STATE 124and power command acknowledgement, which would affect the logic depictedin FIG. 5.

[0189] Referencing FIG. 7, universal power supply 110 typically is shownaccepting an input voltage between 90VAC and 240VAC. This voltage isrectified and converted from AC input 1400 to a 19V DC output. The 19VDCoutput is taken through connector 1460 to charge battery 108 and furtheris taken through connector 1452 as an input to supply select 1490.

[0190] The 16VDC output of battery 108 is connected through connector1480 and presented to supply select 1490, which must have at least oneof 19VDC through connector 1452 or 16VDC through connector 1480.

[0191] If universal supply 110 is not connected, then connector 1452represents zero volts. Therefore, the 16V supply from connector 1480 isutilized to power module 100. If universal supply 110 is connected, thenthe greater voltage being 19VDC (as oppose to the 16VDC from battery108) is selected as the power source for module 100.

[0192] If universal supply 110 is not connected and connector 1480represents 0VDC, then battery 108 has insufficient charge or has failed,therefore, module 100 will not function nor will notebook 102.

[0193] DC/DC converter 1500 now takes the supply voltage from supplyselect 1490 and further provides outputs of 9VDC 1510 and 5VDC 1520.Connector 1530 represents the ground connection of converter 1500.Modification of DC/DC converter 1500 would enable module 100 to providea plethora of voltages compatible with the plurality of peripherals.

[0194] Charge control 1410 is derived from notebook 102 and controlsbattery charging related to battery 108.

[0195] Enable and hold supply 1434, with corresponding inputs wakeup1420 and hold on 1430, determines if the system has returned from apower down or sleep mode and restores the supplies that are activeaccording to previous requests by OM when enable supply 1436 is set to aONE condition. This function is supported by Q5, Q6 and associateddiscrete components (see block 572 FIG. 9)

[0196] As shown in FIG. 8, the term modems includes landline modem 140and cellular modem 146.

[0197]FIG. 8 illustrates the integration of audio functionality betweenmicrophones, notebook 102 and modems. This is necessary to supportfull-duplex audio where any sound coming from either external microphone1650, internal microphone 1652 (having notebook 102), or notebook 102are mixed and presented to the audio input of modems.

[0198] Internal microphone 1652 facilitates hands free telephony butdoes not provide sufficient audio quality necessary for voicerecognition systems to function correctly. In order to support voicerecognition, external microphone 1650 is connected through a jack socketcontaining switch 1654, such that when external microphone 1650 isconnected internal microphone 1652 is disconnected from mixer amplifier1656. The purpose of mixer amplifier 1656 is to mix audio from themicrophones with computer audio output 1655 and present these mixedaudio signals to the landline modem AF in 1662 and cellular modem AF in1664. The input level of landline modem AF in 1662 is controlled throughlandline gain 1658 to ensure a matching signal is provided for landlinemodem 140. The input level of cellular modem AF in 1664 is controlledthrough cellular modem gain 1660 to ensure a matching signal is providedfor cellular modem.

[0199] Therefore, mixer amplifier 1656 in conjunction with landline gain1658 and cellular modem gain 1660 collectively govern audio levelsinbound to modems.

[0200] Modems also have corresponding audio outputs. Landline modem AFout 1670 is presented through landline gain 1674 and Cellular Modem AFout 1672 is presented through cellular modem gain 1676, to mixeramplifier 1678 which mixes the input audio signals and provides anoutput which goes to the computer audio input 1680.

[0201] Therefore, mixer amplifier 1678 in conjunction with landline gain1674 and cellular modem gain 1676 govern inbound audio levels from themodems to computer audio input 1680.

[0202] The integration described in FIG. 8 is necessary when multiplemodems are integrated with a single computer audio input and output,each modem having unique audio characteristics. Furthermore, whenmultiple microphones are used it is necessary to provide a switchingmechanism to support microphone selection, as provided by switch 1654.

[0203] Multiple modem support can be provided by the MICROSOFT TELEPHONYAPPLICATION PROGRAMMING INTERFACE (TAPI), but many modems exist which donot fully support TAPI. The only solution to this problem is an audiointegration as described above.

[0204] Referring now to block 1700, an apparatus is illustrated foreliminating interference that is manifested when cellular modem 146 andnotebook 102 share a common power supply, either battery or universalpower supply.

[0205] GI 1720 (cellular modem audio in) and audio frequency ground AFG1740 are connected to AO 1780 (Mixer/Amplifier 1656 in FIG. 8) andground 1790 using transformer 1702, wound with a 1:2 ratio.

[0206] GO 1760 (cellular audio out) and AFG 1740 are connected to AI1800 (Mixer/amplifier 1678 in FIG. 8) and ground 1790 using transformer1710, wound with a 1:1 ratio.

[0207] The circuit described in FIG. 8 substantially reduces audiointerference, which breaks into notebook 102 from cellular modem 146.

[0208] The configuration of transformers depicted will eliminateinterference in any application where a cellular communication deviceinduces interference into any connected audio device due to the sharingof a common supply.

[0209] Referring to FIG. 9, a schematic diagram showing an electricalcircuit associated with module 100. To more clearly show the electricalfunctionality contained within module 100, areas of FIG. 9 have beenhighlighted using blocks such as block 540. Furthermore, as the bulk ofFIGS. 2 to 8 are concerned with a detailed description of theseelectronics, related FIRMWARE and OM, it remains only to be shown howfunctionality depicted on the overview chart (FIG. 1) corresponds to theschematic configuration detailed on FIG. 9.

[0210] Cellular modem 146 is not depicted on the schematic, as this is asealed component well known in the art, which only requires connectionsfor audio, power and reset, all included in block 548.

[0211] Microcontroller 1600 monitors two inputs, the first being block121 having the DTR input signal and corresponding to connector 121 onFIG. 1, and the second being block 520 having a micro-switch indicatingthe presence of a landline connection as detailed in FIG. 1.

[0212] When modulation of DTR occurs, the signal in RS-232 connectorblock 564 passes through CMOS drivers block 560 and arrives atmicrocontroller 1600 at block 121. Correspondingly, microcontroller 1600decodes the modulated signal using FIRMWARE subroutines and alters thestate of power control lines included in block 500 (block 500 representsa plurality of supply control lines). One of the power control lines inblock 500 will be altered (i.e. changed from ON to OFF or from OFF toON) according to the format of the modulated signal carried by DTR.

[0213] When micro-switch 520 is closed, a voltage is placed at pin 7 ofmicrocontroller 1600 and, correspondingly, the DSR signal, in connector564, is set at CONDITION ONE through the application of a voltageemanating from block 125 (pin 6 of microcontroller 1600).

[0214] Landline modem supply control 540 contains a pair of transistors(Q14 and Q13) and other discrete components, being an electronic switch,which is operated by pin 9 of microcontroller 1600. Thus microcontroller1600 can place a 5V supply to modem 140 at the request of OM using DTRmodulation as previously described.

[0215] The plurality of power control lines included in block 500 eachhas a corresponding transistor pair, illustrated as printer supplycontrol block 542, scanner supply control block 544 and cellular modemsupply block 546. Accordingly, this plurality of electronic switches canindividually apply a supply voltage to its corresponding peripheral.

[0216] Block 566 depicts a connection from CMOS drivers 560 tomicrocontroller 1600.

[0217] As shown in FIG. 10, the connections between operation models610, checkpoint 603, universal converter 400 and professional operationmodels 611 is depicted.

[0218] At least one device in operation models 610 is required tocommunicate with virtual module 640 in order that virtual module 640 hasinbound messages to record as described below.

[0219] Consequently, operation model is an abstract base class fromwhich can be derived many specialized implementations, depending uponthe design goals of the application being built or modified.

[0220] All data to and from operation models 610 is shown as passingthrough checkpoint module 603, comprising security checks,confidentiality checks, virus checks, data compression and encryption.The security checks are designed to validate the identity of user 600 orto authenticate persons or systems wishing to communicate with theinvention or user 600, and consists of techniques including, but notrestricted to, voice recognition, facial recognition, retinarecognition, fingerprint recognition, security card recognition beingmagnetic-swipe or proximity cards, and the like. The confidentialitychecks prevent user 600 from publishing or forwarding any confidentialinformation to any person other than a contact in address book 558marked as an authorized recipient.

[0221] Each device included in operation models 610 have bimodalcommunication with each other and with professional operations models611 and virtual module 640. Operation models 610 may request universalconverter 400 to manipulate incoming or outgoing information in order torender it compatible with some device, as described in FIG. 11.

[0222] All devices in operation models 610 are seen as extending eachother. Functionality available in one can be made available to all,enabled in the preferred embodiment as a collection of ACTIVEXINTERFACES which allow other devices to discover the capabilities ofeach.

[0223] Professional operation models 611 are held in the collective ofoperation models 610 and therefore, extended by other co-residentdevices. Professional operation models 611 corresponds with professionaltools 177 (see FIG. 1) being peripheral devices required by user 600 tofunction in a specific professional role.

[0224] Operation models 610 are delivered with basic tasks (instinct),which are the minimum required by the user. Instinct is defined to meanpreconfigured tasks stored in task list 648 which are generally requiredby all users of a particular device in operation models 610.

[0225] The required contract, to be adopted by any device correspondingto the invention, is defined as: a) the device will know the start andend point of any work carried out by user 600, b) the work will betranslated into CFI, c) the CFI will represent constant parts of a taskusing the symbol B, variable parts of a task including assignments tothe variable using the symbol O and item references will be representedwith the symbol I, d) the CFI are emitted such that the invention canrecord them, e) the CFI will be accepted, such that the invention cancause the device to re-enact any previously recorded task represented asCFI, e) the device will make known to the invention which B and O aresignificant.

[0226] The term “significant” is defined as those B and O which dictatea method of work, in the case of B, commonly represented as verbs andspecifically excluding all user actions which are considered navigationor otherwise not important to the completion of work. Correspondingly,insignificant means any B or O, which if not recorded, re-enacted orotherwise taken into consideration, with respect to a completed task,will not affect the merit or complete nature of the task. These meaningsshould be taken in the following context: if significant B or O areomitted, a task will be incomplete or will have a different merit, whereomitting insignificant B or O will not affect the merit of a task andthe task will still be complete.

[0227] When a device has fully implemented the contract, the device isfully compatible with the invention. Failure to implement any part ofthe contract may render the device incompatible with the invention. Byfully implementing the contract, any device can be held in thecollective of operation models 610, being a group of partiallycompatible devices, potentially capable of interoperability, extendingeach other, and being diverse in nature, not necessarily in the samephysical location, not necessarily being purely software systems and notnecessarily comprising a user interface and being a mixture ofsingle-user and multi-user devices.

[0228] The invention honors its part of the contract by recording allemitted CFI and causing the device to re-enact any previously recordedsequence of CFI. The preferred embodiment views the contract as beingwith a software application used in the context of computerizedadministration though this is not the only use of the invention.

[0229] In CFI, significant B, significant O and I are referred to astask components. Where multiple tasks consist of the same taskcomponents, in any sequence, they are said to have the same merit; onlythe values assigned to task components, or their sequence differs, thetask components and their number has to be the same.

[0230] For example, if a task sends a message by e-mail to a contact,then it can be changed to deliver a message by FAX to the same contact,therefore, the merit of the task is said to be “sending a message to acontact”, and is not concerned with how the item is delivered, or towhom.

[0231] Non-mandatory standards, which can be adopted by any device inoperation models 610 are: a) as user 600 completes work through thedevice, the work is disintegrated into tasks with a known start and endpoint, b) application screens shall set aside an area for consistentlydisplaying toolbars, c) standard buttons will always be in viewregardless of work context enabling the user to execute parallel tasksand invoke the invention's ability to re-enact tasks, d) that predefinedinput fields are used consistently to represent choices available touser 600 and f) that an operation model should have a corresponding WCP670.

[0232] The core of interactivity between operation models 610 and theinvention is formed around CFI and that these must conform to an agreedstructure to ensure the highest degree of compatibility betweeninteracting parties.

[0233] In most software applications, a procedure for completing aspecific task is a specific combination of clicking application displaybuttons, selecting and entering values for input fields, combined withan existing or newly created document, being the content of a data fileor data stream (item).

[0234] Compatible items is defined as data files or data streams of thesame type. Task description means a verbose explanation of what a taskis meant to achieve. Knowing the task description means one understandswhat is achieved by the execution of a task.

[0235] If a task is assumed to maintain the same merit for compatibleitems, then significant B and significant O will not change, wheresignificant B are mostly verbs in the task description, all other partsof the task description are represented by insignificant B,insignificant O or I.

[0236] The first button, option or item used by user 600 to begin a taskis referred to as the task initiator (TI). Many buttons in a task canoften be reduced to a single command, which when initiated will completea unit of work according to the task's procedure, without the necessityfor the user to click more than once. Buttons that are frequently usedduring the creation or editing of an item are unlikely to accumulate.

[0237] The flexibility that the invention provides in interpreting CFIcan succinctly be described by several short equations. In order toformulate equations that one ordinarily skilled in the field of computerprogramming can relate to, the following relationships are disclosedbetween equations and software terminology.

[0238] In the following equations, B and O represent only significantbuttons and options and TI relates to any manner of beginning a sequenceof work. B, therefore, represents any immutable information in a task, Orepresents any variable data in a task and I represents zero or moreitems of work such as documents and other information.

[0239] Option groups consists of all methods of input in predefinedinput fields 571, including but not restricted to COMBO BOXES and LISTBOXES.

[0240] The term Δ_(O1) relates to a specific list of values in a COMBOBOX contained in OM where only one value may be selected.

[0241] The term C₁ ^(ΔO1) relates to a specific field in predefinedinput fields 571, such as a LIST BOX contained in OM, which facilitatesthe selection of at least one value.

[0242] The term Δ_(I) directly relates to an item with a typeclassification specified by OM, for example, a video item, sound item ortext document and the like.

[0243] Therefore, a simple procedure, being a coded form of instruction,binds together task components and can be expressed as one TI plusselections from option groups plus zero or more items:

Procedure=TI+Δ _(O1)Option+Δ_(I)Item

[0244] A task can consist of several option groups and several items,expressed as:

Task=TI+Δ _(O1)Option+Δ_(O2)Option+ . . . +Δ_(I1)item+Δ_(I2)Item+ . . .

[0245] A more complex task will consist of multiple values extractedfrom a single field, i.e. a LIST BOX comprising multiple selections,e.g.

Task=TI+Δ _(O1)Option+C₁ ^(ΔO2)Options+Δ_(I1)Item

[0246] For example, the above algorithm could be mapped to the act ofsending e-mail to a recipient and copying the same e-mail to severalother recipients, where:

[0247] TI corresponds to a button click, which initiates creation of anew e-mail message.

[0248] Δ_(O1)Option Corresponds to selecting one person, e.g. as themain recipient.

[0249] C₁ ^(ΔO2)Options Corresponds to selecting many people to becopied, i.e. CC list in e-mail terms.

[0250] Δ_(I1)Item Corresponds to the text of the e-mail including anyrelated attachments.

[0251] The coded form of instruction emitted by OM when the act ofsending e-mail is executed by user 600 would therefore, be:

B ₁ +O1.1+(O2.1,O2.2,O2.3)+I=100

[0252] Where:

[0253] Option groups are abstracted as O_(N) and their values areabstracted as ON.X, for example O₂ has corresponding values O2.1, O2.2etc.

[0254] O1.1 Means option group O₁ (recipients) has been assigned valueO1.1 (specific recipient).

[0255] (O2.1, O2.2, O2.3) Means O₂ has multiple values O2.1, O2.2 andO2.3 (all equivalent to contact names, thus forming a CC list).

[0256] Ultimately the notation for tasks comprising many option groupsand items can be expressed thus:

Task=TI+ΣC ₁ ^(ΔO) O+ΣC ₁ ^(ΔI) I

[0257] Algorithmic expressions are then possible which describe manytasks being combined to form a single operation, where an operationincludes at least one task and the product of one task can be presentedas input to the next:

Operation=ΣTASK

[0258] Finally the work of user 600 being work, i.e. the sum total ofall tasks, can be expressed thus:

Work=ΣOperation

[0259] The term “procedure” is defined as the common denominator oftasks, operations and work, and frequency, as described later, isdefined as the common denominator of procedures.

[0260] An abstract Procedure, P_(N), is simply a means of describing theway in which a task consists of task components. For example:

P _(N)(B ₁ +B ₂ +B _(N) +O ₁ +O ₂ +O _(N) +I ₁ +I ₂ +I _(N))

[0261] O₁ through O_(N) relate to option groups in OM, so for example:

[0262] O₁ is an option group called resolution 870

[0263] O₂ is an option group called color depth 874

[0264] O_(N) is an option group called file format 878

[0265] CFI are formed by OM as the invention does not need to assign anymeaning to the instructions emitted by OM, i.e. it does not need to knowthat the term O₂ means “CC recipients”, nor that the values O1.1=“Jim”and O2.2=“Jack” etc.

[0266] CFI are emitted by OM when user 600 has completed a task, and arereceived by virtual module 640, which records them. Virtual module 640also sends recorded CFI back to OM.

[0267] Task deviation control 632 monitors user 600 and user's virtual642, while either is executing a task, and by referring to desirableoption list 650, detects deviations occurring during the completion of atask and notifies OM (Digital Conscience).

[0268] The term “digital conscience” is defined to mean that wheredeviation from a predefined preference is detected, either as user 600or user's virtual 642 execute tasks, then notification is given, andstored in deviation log 652, to bring to the attention of user 600 thata predefined constraint has been violated.

[0269] Deviation log 652, which contains a record of all deviations andapplied corrections, can be used to monitor growth of user 600. Analysisof the user's frequent “deviations” can lead to tailor made trainingpackages, which will described in detail below.

[0270] To clarify, using task modeling 630 (see FIGS. 24 and 25) allowsuser 600 to state preferences for selections, but though a preference isstated it is not necessarily enforced by operation models 610.Therefore, it is possible for user 600 to use values other than statedpreferences and virtual module 640, by comprising task deviation control632, has the ability to bring such “deviations” to the user's attention.

[0271] CFI must be encoded and decoded by operation model 610 and mustat least be decoded by virtual module 640. Encoded means OM formulatesCFI by assigning abstract symbols such as B₁ and B₂ etc. to all buttons,O₁ and O₂ etc. to option groups, O1.1 and 1.2 etc. to all values ofoption groups and finally assigns I_(N) to all related items, where Nuniquely represents a specific item. Decoded means that virtual module640 must examine each task component in any received CFI using a methodknown as string parsing, and OM must similarly decode CFI which isreceived from virtual module 640 in order to re-enact any previouslyrecorded task.

[0272] As can be seen from the above equations, many combinations ofbuttons, options and items can occur, but of the infinite possibilitiesthat exist within an application, pragmatically only a small number arevalid or will happen. Furthermore, abstracting button clicks, inputfield selections and references to data files is an efficient way ofcommunicating information in a language independent manner. By addingabstract references together, the CFI is formulated.

[0273] String parsing can be utilized by taking sections out of strings,in this case CFI, assigning meaning to each section and actingaccordingly. Acting accordingly in terms of CFI either means for virtualmodule 640 to count the frequency of use, or for OM means re-enacting aspecific button click or assignment of a value to an option group.

[0274] WCP 670 is reached via connection 654 such that information, putthere by a plurality of users 600, can be downloaded and stored by theinvention or user 600.

[0275] WCP 670 includes universal tasks 674 and universal options 676(see FIG. 12) and dynamically explores for updates to tasks 674, options676 and corresponding OM, in order that user 600 can select the mostideal and contemporary of all possible updates in order to furtherpersonalize the invention.

[0276] WCP 670 includes common hardware related to web communicationsuch as a RAS Server, voice cards, e-mail server, web server, databaseserver, router, hub etc. WCP 670 can also support software modules fromthe invention such as universal converter 400, and virtual module 640.

[0277] WCP 670 includes at least a dial-up access server, e-mail server,Web server, database server and a fixed connection to the Web.

[0278] On Line and Automatic Technical support, through secure access tothe invention's data registries, can perceive a good view of anyproblems encountered by user 600, which results in fast maintenanceservices.

[0279] All WCP 670 subscriptions, and others, such as, mobile phoneconnection, global Web access, IP faxing and telephony account, localtelephone and fax numbers, and others are available at all times and arebilled according to utilization and presented as a single invoice. Theuser will be notified periodically of their on-going costs.

[0280] The construction of a web communication system is within thebasic abilities of one skilled in the art to provide basic databaseaccess over a Wide Area Network, which is all that WCP 670 represents,in addition to some basic services.

[0281] The invention ultimately aims to optimize all operations for alloperation models 610, such that any operation can be completed by asingle click or other form of initiation, therefore, the user's lifetimetasks, operations and work can be repeated by a single command. Theinvention does not restrict tasks and operations from spanning betweendifferent operation models 610.

[0282] Dialogs 700 keep all functions related to an operation togetherin one dynamic screen, making it easy to deliver the most ergonomicpresentation; one screen, one click away for all basic needs of user600.

[0283] Dialogs 700 are produced by applying non-mandatory standardscomprising use of general toolbar 615 relating to all real world objects550, specific toolbar 616 which provides functions that are specific tothe use of particular real world objects 550 and identity toolbar 618which includes specific properties related to a document or other itembeing worked on by user 600. Identity toolbar 618 is largely omittedfrom the drawings to abbreviate the discussion.

[0284] Dialogs 700 further consists of screen title 1256 and work area617 both being dynamically configured dependent on work context. Dialogs700 further consists of predefined input fields 571, including but notrestricted to RADIO BUTTONS 572, CHECKBOXES 573 and COMBO BOXES 574.

[0285] Some dialogs 700 work with a single item, e.g. when user 600 iscreating a new e-mail message, other screens like unified in tray 551display many items using an input field known as a grid.

[0286] General Self Administration module (GSAM) 612 fully implementsthe contract and all non-mandatory standards which satisfies theinventions requirement for a short learning curve, and enables devicesto be utilized and manipulated ergonomically by user 600.

[0287] So that user 600 can utilize technology ergonomically, GSAM 612has friendly, voice-activated, tailor-made front ends in the user's ownlanguage. In GSAM 612, dialogs 700 are configured according to realworld objects 550 and have a consistent look and feel, all utilizing theuser's personal glossary. Text is preferred as oppose to pictorial oriconographical symbols.

[0288] In GSAM 612, Dialogs 700 are adapted based on a user introductionprocess comprising an interview, allowing it to auto-adapt and dialogs700 to match the level of user 600, in terms of expertise andfamiliarity. Predefined input fields 571, when represented by LIST BOXand the like are automatically sorted, optimized and categorized. Thus,front ends will simulate the user's private and work related recenthabits and environments.

[0289] GSAM 612 is a robust, reliable, comprehensive, optimized andharmonized integration of third party SDK'S and provides comprehensiveeditability and annotation for all manner of documents and facilitatingthe logical organization of the user's day-to-day communications, tasks,growth etc, while considering location and environment.

[0290] GSAM 612, conforming to operation model standards, usesconsistent screen design throughout all dialogs 700 and utilizes aminimum number of overlaid windows, while consistently using the samearea of screen space for toolbars.

[0291] After user 600 has logged into GSAM 612, passing layered securityin checkpoint 603, a portal screen (main menu) is displayed, whichreflects the current season and time of day, being a further move awayfrom cold technology and closer to the real world environment of user600.

[0292] GSAM 612 is designed to meet the general computerizedadministration needs of a wide audience, including user 600. GSAM 612includes real world objects 550 which further includes: unified in tray551 where all in-bound communication and notifications are stored,pending 553 where all items which require further attention from user600 are held, work new/in process 555 permits user 600 to create a newitem of work or continue working with an item which is as yet incomplete(e.g. creating a word processor document and refining it during thecourse of many days), diary and tasks 557 which tracks the meetings andoutstanding tasks of user 600, setup message 559 allows user 600 tocreate a new outgoing message, communication suite 561 is a harmoniousintegration of all methods of communication such as e-mail, fax andtelephone usage and video conferencing, web browser 563 which providesweb browsing, sensor information 565 is a monitor and recorder ofsensory communication such as taste and smell, environment information567 which utilizes sensors to track the environmental conditionssurrounding user 600, toolbox 569 which contains miscellaneous screensfor system configuration including the personal details of user 600,unified out tray 552 which holds items scheduled for transmission,quarantine 554 which holds any problematic items identified bycheckpoint 603, smart archive 556 used to organize large quantities ofdocuments in a structured archive system, address book 558 containingall contact details of individuals and businesses in communication withuser 600, notepad 560 where user 600 can store notes similar to adesktop blotter, photocopier 562 allows user 600 to scan and printdocuments thus making a physical copy, media center 564 harmoniouslyintegrates all forms of computer based entertainment, emitterinformation 566 allows user 600 to control settings of devices in theinvention and the environment which have an output that relates to aphysical sense such as touch and smell or air conditioning etc, domesticappliances 568 holds details and permits control of devices owned byuser 600 such as television and video recorders which are either X10 orBLUETOOTH compatible, locator 570 which discloses the actualgeographical location of user 600 through the use of GPS and finallyother dialogs being minor screens which GSAM 612 contains that arespecialized to the type of work being executed by user 600.

[0293] Within the specific context of GSAM 612, real world objects 550relate to the normal day-to-day objects found in the work place and homeof user 600. GSAM 612 is optimized for the purposes of efficientcomputerized administration. Therefore, real world objects are similarlyfound to be related to administration, as can be seen from the use ofterms such as “in tray” and “out tray”, terms which would be recognizedby all office workers.

[0294] GSAM 612 includes communication module, which interacts closelywith peripheral control module 100. Through utilization of communicationmodule and universal converter 400, user 600 can receive anycommunication item, from any of the plurality of peripherals whichcorresponds with unified In-Tray 551, with the ability to convert it toany other format of communication item and send it to multiple physicaldevices in any other location along with any new work items, as well astransparent rerouting of incoming communications to alternative devicessuch as answering machines and auto fax-reception contained in GSAM 612.

[0295] Communication Suite, comprising Standard, IP, PC-to-PC telephonyand point-to-point video conferencing, places all related data andinformation within one click encouraging the user to utilize cheapcontemporary communication. Communication costs are reduced byautomatically using IP telephony and faxing as well as reduced telephonerates.

[0296] Media Center includes a single media browsing interface, whichallows easy perusal of Web data, audio and visual streams, such as TV,Radio and newspapers as well as entertainment devices such as CD player,DVD, etc.

[0297] Set-Up Message includes scanned letterheads (digital letterheads)and signature to enable color faxing by using e-mail transmission, Webbrowser connected to multi-search engine that resides on thecorresponding WCP 670, a proprietary smart archive backed up by a remotearchive, address book that automatically extracts all new addresses fromin-tray documents, diary and notepad.

[0298] Other features include environment information icons, toolbox,which further includes a calculator, which automatically is updated forcurrency rates.

[0299] Location controller synchronizes with one click, all applicationsettings corresponding to any new location, including settings forglobal web access, routing of international outbound faxes and nationaland international telephone prefixes.

[0300] GSAM 612 is one device in the collective operation models 610,being an example of a single operation model. GSAM 612 includes basictasks as its instinct, to satisfy the needs of the average user.

[0301] All information created or received by GSAM 612 is stored insmart archive 556.

[0302] GSAM 612 exposes activities of user 600 to the invention as CFI,where the activities consists of many tasks carried out involving thecreation and manipulation of items, communication and leisure. Theaforementioned will typically include tasks such as writing letters,creating video recordings and watching streaming television broadcastsfrom the Web. These diverse tasks when carried out in accordance with anoperations model will result in the build-up of information recorded bythe invention in operation log 646 (See FIG. 12).

[0303] GSAM 612 is a multi-function software application and can beformed by integrating components, often referred to ACTIVEX components,such as TXTEXT control, FARPOINT SPREAD control and the like, all ofwhich form core modules in any data processing application.

[0304] The information included in virtual module 640, being tasks,options and the like, is built up over a period of time (possibly alifetime) and must therefore, be protected as it is potentially beyondreconstruction if damaged. Therefore, a multi-backup approach isutilized by the invention and managed by backup system 578, operatingunder the control of user 600 and virtual module 640, and which routesdata to indestructible backup 575, temporary backup 576 or remotearchive 577.

[0305] Indestructible backup 575 is a device for making backups of theblack box, producing an exact copy of all dynamic information stored bythe invention, and corresponding to CD-ROM, CDRW, tape backup and thelike.

[0306] Temporary backup 576 contains only the data, which has beenchanged since the last backup to device 575. Data for temporary backup576 is typically placed on a high-speed, possibly portable device, e.g.MP3 players and developing credit card sized wireless connected memorydevices, which are all suitable candidates for temporary backup datastorage. Remote archive 577 can be facilitated by WCP 670 as a locationwhere data can be stored at a distant location away from the invention.This is often referred to as remote storage and can utilizecommunication methods such as FTP in order to move information betweengeographically divers locations utilizing the Web.

[0307] The invention includes a harmonized, robust and reliableintegration of the following main elements being OM, a corresponding WCP670 and any hardware capable of supporting at least OM coupled withvirtual module 640, such as a PDA, desktop computer, notebook 102 andthe like. OM and virtual module 640 may also be deployed as a multi-usersystem existing on a network, Web server, mainframe or other forms ofsingle/multi-user computerized system.

[0308] As user 600 utilizes any OM such as GSAM 612, CFI are emitted tovirtual module 640 which includes backup module 578, procedure engine580 and user's virtual 642.

[0309] Tasks executed by user 600 and user's virtual 642 are constantlyand seamlessly monitored and recorded to save an authentic,chronological digital copy of the lifetime work of user 600 contained inoperation log 646.

[0310] Virtual module facilitates the utmost dynamic, auto-adapting,auto-optimizing and auto-personalization features for any OM.

[0311] Monitoring 581 registers all tasks executed by user 600 orvirtual 642, together with related task components, in operation log646. Documents and other forms of information are archived by therelevant OM and are backed-up under the control of virtual module 640.

[0312] Deviation log 652 contains notifications from deviation control632.

[0313] Any other information and data such as what user 600 has done andhas learned as well as the style and schedule used in carrying out eachtask are extracted by procedure engine 580 from operation log anddynamically sorted according to frequency of use, optimized and storedin task list 648.

[0314] Processed data 582 analyses operation log 646 and copiesfrequently used tasks into task list 648 (see FIG. 21).

[0315] Desirable option list 650 is populated by task modeling 630 (seeFIG. 13).

[0316] User's virtual 642 is the digital representative of user 600 (seeFIG. 12) and utilizes scheduler 673 in order to re-enact tasksautomatically at set times or according to set events occurring in OM.Trainer 673 assists user 600 with teaching materials corresponding toinformation arising in deviation report 583 which is based onnotifications listed in deviation log 652.

[0317] The basic purpose of OM is to be able to monitor and copy theactions of user 600, such that the actions can be replayed,substantially automatically repeating any work performed by user 600.The subsequent diagrams distinguish between the rigidity of macros andother existing art and the present invention.

[0318] Referring now to FIG. 11, the flow of information is shown viauniversal converter 400.

[0319] One goal of universal converter 400 is to empower OM with thewidest available spectrum of communication where sensible and feasible.When user 600, defined as the sender, wishes to communicate with otherparties, defined as receiver, incompatibilities may occur. Sender andreceiver both have a preference for the form of communication theyutilize, however form is sometimes governed by the content of the tocommunication. For example, it is not sensible or feasible to try andsend a sound by facsimile machine. However, it is sensible and feasibleto translate received facsimiles into text and have them read by aspeech synthesizer, as is common for blind users. The novelty ofuniversal converter 400 is that it makes many more conversions possibleby linking conversion processes together, where the output of oneconversion process becomes the input of another conversion process.These conversion processes can be chained in many ways so long as anyoutput has at least one compatible input.

[0320]FIG. 11 now illustrates that input 402 having an input type 404can by some means be converted to output 406 through the utilization ofuniversal converter 400.

[0321] Universal converter 400 is a module, which permits computer datato pass through a plurality of processing stages. The processing stagescan involve typical information processing activities such as languagetranslation, data format translation (e.g.: WORD to WORDPERFECT documenttranslation), virus scanning and a diverse collection of web basedservices.

[0322] The utilities are described in abstract terms to illustrate thepossible use of a wide variety of prior art. Universal converter 400 hasthe principal aim of acting as a conduit for a disparate andsubstantially incompatible group of devices.

[0323] As embodied, converter 400 utilizes MICROSOFT ACTIVEX technologyto bring together conversion utilities, which expose COM INTERFACES andother methods of controlling software. Converter 400 could operatethrough non-ACTIVEX technologies using techniques such as WINDOWSMESSAGES, SUBCLASSING or JAVA ROBOTS, all of which provide the potentialto control another application, which is a separate entity to that whichincludes converter 400.

[0324] Universal converter 400 includes a group of conversion utilitiesA 410, B 412, C 414 and D 418. Each of the conversion utilities has atleast one input and at least one output, therefore, having the potentialto convert from one known information type to another. The utilities,while being illustrated as a means of converting information, alsoinclude utilities such as spelling checkers, content filters and thelike, as universal converter 400 acts a conduit allowing the user toleverage a disparate collection of utilities in order to achieve thegoal of gaining information in a desired format, with a desired content.

[0325] Information is defined as any form of computer data or real worldartifact such as sound, print media or visual media and the like whichcan be reduced to binary format. Format as used here is defined as aspecific structure imposed on Information such that modules wishing tointeract with the Information will have knowledge of the content and itslayout. Content is defined as meaning Information contained within afile or group of files, which can be subjected to conversion, andfiltering. The term “Conversion” is defined to mean when Information ischanged from one type to another, such as spoken word being changed totext. The term “Filtering” is defined as the selective elimination ofcertain Information, obvious forms of this include VIRUS SCANNING andthe removal of profanity from messages, which may originate from theWeb.

[0326] Conversion utility A 410 has two inputs, namely T1 420 and T2 421and has a corresponding output of T3 424. Ergo, T1 420 and T2 421 cannow be converted to T3 424. The abstract terms (being T1, T2 and T3etc.) will be related to real world information types and the conversionutilities A 410 and B 412 etc. will be related to existing art whichconverts the known forms of information.

[0327] A sparse network 419 is formed by connecting compatible outputswith compatible inputs. The term sparse network is used as “orphan”connections can occur such as that which exists between T4 440 and T8442, where no other connected inputs and outputs are found other thanthat provided by conversion utility C 414. If another party develops aconversion from T2 421 to T4 440 then the previously “orphaned”converter C 414 will become part of the larger network, rather thanoperating in a stand-alone fashion.

[0328] Universal converter 400 is extensible, meaning that it candiscover new conversion utilities as they become available, due to thefact that each corresponding conversion utility is described in anassociated database, such as the MICROSOFT WINDOWS registry. When theuniversal converter begins execution, it reads the details of allavailable conversion utilities, taking note of the input and outputtypes that are processed by each conversion utility. The sparse network419 is gradually formed, e.g. conversion utility A 410 has an output T3424 which is connected to conversion utility B 412 having a compatibleinput of T3 424, and so on until all conversion utilities have been readfrom the database and interconnected where possible.

[0329] Connector 422, connector 426 and connector 430 all representconversion processes where an input is converted to a different form andpresented as an output which can move forward still further through theconversion process.

[0330] Now, to relate this to real world examples, conversion utility A410 is now assumed to be a speech recognition tool such as DRAGONNATURALLY SPEAKING, which converts spoken word to text. It is assumedthat this speech recognition process occurs using the English language.Type T1 420 is now named as “voice” and output T3 424 is now named as“text in English”; conversion utility A 410 therefore, converts speechto English text. The sparse network 419 illustrates T1 420 beingconnected to T3 424 through conversion process 422, the aforementionedvoice to text in English conversion. Type T7 428 is now named as “textin German” and can be reached through conversion utility B 412 wherechannel 426 represents the conversion from text in English to text inGerman. Type T9 432 is now named as “synthesized voice”, which is aknown utility that converts text to speech using a device known as aspeech synthesizer, e.g. as provided by MICROSOFT AGENT. Channel 430 nowrepresents the translation process from German text to synthesized voiceusing conversion utility D 418. Therefore, as described, English speechreceived by sparse network 419 is now output as German speech using anetwork of conversion utilities.

[0331] Language translation features are supported by software utilitiessuch as MULTILIZER and VISUAL RESOURCE TRANSLATOR. Similar functions arealso provided by web sites such as WWW.BABELFISH.COM. All this prior artis recognized and can become a conversion utility, similar to thoselabeled as D 418 etc. The method illustrated through FIG. 11 should notbe taken to be those specific translations etc, but rather the methodprovides the potential for all known methods of translation, conversionand data manipulation to be brought together in one dynamic frameworkwhere all data incompatibilities can be substantially eliminated.

[0332] For example, one device known in the art, being a specificresource provided by ALTAVISTA, isWORLD.ALTAVISTA.COMTR?DOIT=DONE&TT=URLTEXT. This device as it existed onJun. 8, 2001 was able to convert English text to Spanish and vice versa,English text to French and vice versa, however no conversion fromSpanish text to French text appeared to be available. Therefore, thepreferred embodiment of universal converter 400 was extended to make twoexecutions of the aforementioned URL in order to convert French toSpanish and vice versa. The steps used were to first convert French toEnglish then English to Spanish, thus facilitating a translation fromFrench ultimately to Spanish, a feature which was not provided by theresource as supplied by ALTAVISTA. It is recognized that some loss ofsensibility occurs when such translations are executed repeatedly;however the purpose of universal converter 400 is to simply facilitatesuch conversions, not to judge the quality of output. In tests executedutilizing the aforementioned steps, universal converter facilitated anon-line chat using the Web where one speaker only spoke Spanish and theother spoke French, and as described no translation was available usingthe specified Web based resource.

[0333] This illustration is simply used to point out that diversetranslation and conversion methods using the invention can involveconvoluted routes from source to destination and the users do not haveto be aware of this fact. The user simple provides an input andspecifies a desired output. In other words, during conversion, sparsenetwork 419 may often use several intermediate conversion steps in orderto achieve the goal specified by the user.

[0334] It is known that a diverse range of conversion utilities existsfor use by computer software developers, including COMCACHE FILECONVERTER SET, which facilitates translation of data files, e.g.MICROSOFT WORD to WORDPERFECT and MICROSOFT EXCEL to LOTUS 123. Otherutilities such as DOC2HTML convert MICROSOFT WORD to HTML format,commonly used in web pages.

[0335] Simple conversion utilities can be embodied by using MICROSOFTVISUAL BASIC to develop ACTIVEX DYNAMIC LINK LIBRARIES (referred to asDLL's or ACTIVEX OBJECTS) in conjunction with aforementioned prior artto form numerous conversion utilities shown in the group comprisingconverter A ACTIVEX 453, converter B ACTIVEX 454 and converter C ACTIVEX455.

[0336] These conversion utilities are then registered for use in sparsenetwork 419, which can be built using known methods called MAPS or TREESwhich are populated by reading entries from the MICROSOFT WINDOWSREGISTRY created by each conversion utility when it is first installedon a computer system.

[0337] Universal converter 400 can then be embodied as a further ACTIVEXOBJECT, universal converter object 452, which collects the conversionutilities and forms the sparse network 419.

[0338] Universal converter 419, when embodied as an ACTIVEX OBJECT, isthen known to function with numerous third party platforms such as webservers, which can support ACTIVEX controls using web server pages 450,or any package supporting VISUAL BASIC FOR APPLICATIONS or the ACTIVEXstandard.

[0339] It can now be seen that many types of information can act asinput forms and be delivered in new output forms, and that by utilizingdiverse output utilities such as speech synthesizers, fax, telephonydevices and the like, numerous incompatible devices now becomecompatible. Further known conversions are emerging such as gesturerecognition, where a user utilizes a camera connected to a computersystem to translate hand gestures to text. The universal converter, asdemonstrated, can then the hand gestures to written text, for example.As long as the gesture recognition system is feasible, it can be used an“input” to obtain a desired “output”.

[0340] The MICROSOFT ACTIVEX framework promotes the definedextensibility of universal converter 400 and the reusability of suchACTIVEX OBJECTS in many supporting applications, developmentenvironments and hardware platforms.

[0341] Other platforms differing from MICROSOFT WINDOWS provide similarfeatures through techniques known as dynamic loading or libraries.

[0342] Conversion utilities may exist on geographically widespreadcomputer servers creating a “client/server” architecture, which supportsconversion requests from diverse locations, such as, that embodied as aweb browser and web server.

[0343] The conversion process can occur as a single coherenttransformation in real time, or can be executed in steps with each stepoccurring potentially on different computers with time delays betweeneach step.

[0344] The entire conversion process can be speeded up by parallelexecution, where multiple conversion processes are used in a linkedmanner, where it is only necessary for partial completion of a step inorder for the next step to begin, using a buffered approach.

[0345] Batch conversions, where a single input is simultaneouslyconverted to many outputs, are an optimal use of the conversion process,as any repetitions of initial conversion steps, common to each targetoutput format, can be eliminated. For example, T1 is to be converted tooutputs T10, T11 and T12 and to get to output some intermediateconversions are required through T2, T3 and T4, ergo to get from T1 toT11 requires conversions of T1 to T2, T2 to T3, T3 to T4 and finally T4to T11, similarly to get from T1 to T12 requires T1 to T2, T2 to T3, T3to T4 and finally T4 to T12, so this batch of conversions can be viewedas T1 to T4, a process that occurs only once, then a series ofconversions of T4 to each of T10, T11 and T12. Furthermore, asdisclosed, the conversion of T4 to each of T10, T11 and T12 can beexecuted substantially simultaneously.

[0346] Referring now to FIG. 12, an overview of interconnections betweenthe modules of the invention is shown.

[0347] Workstation 602 is extendible to perceive and amplify the samesenses as user 600, to empower user 600 as well as to increase theawareness of user 600. The invention maintains seamless connectivitywith the user to facilitate a secure recording of a true digital copy ofcompleted tasks (T) in operation log 646. The invention together withplurality of corresponding WCP 670 forms a harmonized digitalenvironment (HDE) that acts as a digital incubator for the user'svirtual 642.

[0348] HDE is defined as a plurality of interconnected devices capableof communicating via use of CFI, basically forming a simple protocol bywhich intercommunication is possible by a diverse collection ofsoftware, hardware and individuals.

[0349] The term “digital incubator” as used means a HDE that supportsthe growth of user's virtual 642.

[0350] All information and data to repeat a task, through the use of itsrelated procedure, being the sequence of clicking application displaybuttons 620, selecting from predefined input field values (options 622)and using a created or extracted document and its properties (items624), and can be extracted from operation log 646, also revealing theuser's schedules and related environmental data.

[0351] The term “item” means any item 624, i.e. any piece of work thathas been created or acquired by user 600.

[0352] T can be re-enacted at any time by repeating the same procedureutilizing the task components, which represent the ability and style ofuser 600. Tasks and similar tasks, which consists of compatible taskcomponents, can be re-enacted based on a schedule by user 600 or theuser's virtual 642.

[0353] The invention also searches universal tasks 674, contained in WCP670, to facilitate the needs of user 600. Furthermore basic tasks,contained in OM are upgraded in task list 648 by automatically bringingnew versions from universal tasks 674.

[0354] Through pragmatic analysis of operation log 646, based on thenumber of times that tasks have been repeated (revealing a frequency),the invention automatically sorts and indexes them in task list 648,where an indicative name is assigned to each, which is related to thetask components.

[0355] The black box contains all dynamic data stored by the invention.User 600 can connect to and communicate with a community of other usersof the invention, a virtual world where all talents are expressed in CFIand can gain direct access to any one's Black Box or any plurality ofother users via access to a plurality of WCP 670, when permission hasbeen granted.

[0356] The term “virtual world” means a plurality of users 600represented in digital form on WCP 670 or the black box.

[0357] Each task can be reduced to a unique determinant number (DN),containing all of the information and data about the task. DigitalDeterminant Numbers of all of the user's tasks can be further reduced toone unique number referred to as DDNA, which is stored in the black box.

[0358] Tasks can be disintegrated to smaller segments by identifying anext lower level of initiator. Initiators can be narrowed to aninfinitesimal low level to simulate the formulation of “digital genes”,which are the units of DDNA (see FIG. 23).

[0359] Digital genes are the smallest unit where a useful initiationcauses a work-step to be completed. As such larger structures can thenbe built from digital genes.

[0360] User 600, having vast access to all the history of the World,through exploration of the WEB, universal tasks 674, universal options676 and being inspired by selected mentors, constitutions, or byconsulting with their elected digital parliament can set priorities andconstitute sets of educated options, in relation to tasks in order tomove towards perfection and experience ultimate excellence. The term“digital parliament” is defined as a collection of at least one mentorrepresented digitally by content in universal tasks 674 or universaloptions 676. The term “constitutions is defined as a predefinedconfiguration, which can reduce the number of options visible when user600 is working.

[0361] Thus, user's virtual 642 can, when supported by WCP 670, compareand decide the known best next step along the line of evolution for anytask. At this stage, user's virtual 642 could be asked to complete tasksthat have not been previously completed by the user, i.e. have nocurrent point of reference within the black box of user 600.

[0362] User's virtual 642, by exploring the World through WCP 670 hasthe capability to interact with other virtual intelligences (artificialintelligences and the like) or human intelligence, in order to evolve,duplicate itself, age data or regress data.

[0363] The term “evolve” as used herein means that user's virtual 642acquires additional information from universal tasks 674 and universaloptions 676.

[0364] Age data and regress data is defined as a form of modeling whereconditions captured in operation log 646; task list 648 and desirableoption list 650 are modified according to known or predicted conditions.

[0365] Ultimately, the invention includes all disclosed modules andmodels to automatically formulate user's virtual 642, which resides in adigital incubator and is therefore, able to evolve. Thus the abilities,styles and schedules of user 600 are enabled to exist and evolveindefinitely and user's virtual 642 will become substantially enduring,being able to observe and comment, while carrying forward the “essence”of user 600. The term “essence” of user 600 as used here means the datawhich has been captured in operation log 646, task list 648, desirableoption list 650, deviation log 652 and other data related to documentsand information created or acquired by user 600 during use of theinvention.

[0366] Thus, the sum total of information that can be captured from auser is their total output correspondingly becoming input to the presentinvention. The output when captured and recorded forms a “digitalautobiography”, which forms the basis for a digital representative to beable to substitute user 600.

[0367] Referring to FIG. 12, user 600 may use the invention throughmeans of a suitable user interface. The user interface can be containedin any device such as a Personal Digital Assistant (PDA), PersonalComputer (PC) such as a desktop or laptop computer, or smart mobiletelephone and the like, web server, network server and other distributedsystems, all being devices which can support virtual module 640.

[0368] User 600 may also use Workstation 602, a device comprisingperipheral module 100 (see FIG. 1), universal converter 400 and asoftware application referred to as operations model 610, exemplified byGSAM 612. Workstation 602 therefore, depicts, as described on FIG. 1, alaptop computer and a plurality of input/output peripherals, all ofwhich benefit from integration with the invention.

[0369] Workstation 602 also has the ability, like any modern computingdevice, to connect to the World Wide Web (WWW) and interact with WCP670.

[0370] Services 677 consists of all subscriptions corresponding to theinvention, such as an e-mail account, mobile telephone connectioncharges and the like, technical support contracts, data storagefacilities and other on-line services offered to user 600. Illustrativeexamples of services 677 are NET2PHONE, for voice over IP communication,global web dial-up access, provision of a SIM CARD and mobile telephonenumber, subscriptions to information services such as stocks, news andsoftware updates and the like.

[0371] Work area 617 includes user interface components referred to asbuttons 620 and options 622. Dialogs 700 assist the user in productionof documents and other forms of work referred to as items 624. Items 624represent any output from a software application, which can berepresented by a data file or data stream.

[0372] Options 622 consists of a plurality of predefined input fields.Messages 641 consists of the CFI related to the use of task components.

[0373] Messages 641 flow to module 640 from OM enabling the work of user600 to be recorded, such that some sequences of work can beautomatically re-enacted. Messages 641 enter virtual module 640 throughprocedure engine 580, an analytical system that categorizes informationcontained in messages that relate directly to task components.

[0374] Messages 641 are collected to form user's virtual 642, aplurality of data stores comprising operations log 646, task list 648,desirable option list 650 and deviation log 652.

[0375] Virtual module 640 exists to achieve as much automation aspossible for any given task. “Automation” is defined as the automaticexecution of any task by user's virtual 642, a module which includesschedule 649 (see FIG. 13) such that any task, in task list 648 oroperation log 646, can be automatically executed, preferably with nofurther interaction from user 600.

[0376] Automation increases as default values are found for inputscontained in a task, as the number of inputs from user 600 decreases thelevel of automation correspondingly increases. The level of automationis inversely related to the amount of manual interaction with user 600.If all manual interaction has been eliminated, a task has reached 100%automation.

[0377] Partial automation means a task, which requires some kind ofinteraction with 600 in order to complete. Full automation, or 100%automation, means no interaction is required with user 600 in order fora task to complete.

[0378] Operation log 646 is sequentially populated with messages 641contained in a complete unit of work, i.e. completed task 626. Anymessages 641 contained in a task which is incomplete, i.e. abandoned byuser 600, are discarded.

[0379] Activity related to task components collectively form completedtask 626. Completed task 626 is, any task which user 600 can completethrough the use of OM.

[0380] An example of completed task 626 (T) is illustrated by describinga task, which includes the steps for creating a video clip referred toas T₁. A further example is then illustrated by introducing T₂, a taskthat includes the steps of forward video clip by e-mail to a recipient.T1 and T2 are described in detail in FIG. 21.

[0381] The CFI of T₁ is also represented by messages 641 recorded inoperations log 646. If user 600 consistently repeats the steps containedin creating a video clip then T₁ is the to have occurred many times, asa substantially identical copy of T₁ is emitted by OM each time it isexecuted.

[0382] Each reuse of a task is referred to as completed task pre-model628, a term which describes the re-enactment of a task as originallyrecorded by user 600, without any optimizations having been applied.

[0383] As illustrated in FIG. 12, uses of completed task pre-model 628,like all task executions, are continuously recorded in operations log646.

[0384] It should also be noted that it is possible to have a task, whichhas no related items 624. For example, when user 600 telephones acolleague, a dialog facilitates telephone calls by selecting a contactfrom an address book and choosing a location (e.g. home or mobile),there is no related item (e.g. document, photograph, etc.) involved inthe telephone conversation. Similarly, it is possible to have a taskthat has no related option groups, for example a button, which simplyswitches off the system would have no option groups or items.

[0385] Repetition of any variable data related to a specific tasktriggers a review process where user 600 is encouraged to utilizetask-modeling 630. The invention is designed to encourage user 600 toimprove as oppose to simply existing habitually. This is achieved bybringing user 600 to discover better values for options 622. Bettervalues means optimal choices for options 622 related to a specific task.For example, if user 600 is e-mailing video clips to friends, then usinglow resolution video would be better than high resolution video as thee-mail would be transmitted and received more rapidly.

[0386] Task modeling 630 is therefore, included as a means of providingstatistical information, i.e. the frequency of tasks and their valuesfor options 622 and items 624.

[0387] The statistical information will make obvious to user 600 anypattern of consistently using certain values for options 622 whenexecuting a specified task. Task modeling is described in further detailin FIG. 22 onwards.

[0388] When task modeling 630 is complete user 600 is able to specifypreferred values for tasks, known as desirable options and these arestored in desirable options list 650.

[0389] Deviation report 583 (see FIG. 10) is produced in order to informuser 600 of the context of all deviations. Notifications can also bebrought to the attention of user 600 by OM as they occur.

[0390] Trainer 673 interacts with remote trainer 675 in order to acquiretailor-made training for user 600. If OM, by means of analyzingoperation log 646, detects lengthy tasks which meander around OM, oruser 600 is detected to be frequently canceling work or otherwise isexperiencing some detectable form of difficulty then OM can instructtrainer 673 to locate training material which most likely is availableon WCP 670 which corresponds to the OM in use. As the OM in use changes,so the WCP 670 is likely to change, therefore, trainer 673 will locatecorresponding remote trainer 675 to find the best support for user 600.

[0391] Communication link 654, facilitated by OM, permits user 600 tobring additional recorded tasks to task list 648, where they are madeavailable for immediate utilization. Additional options may also bebrought to desirable option list 650. This enables a plurality of user600 to share information and expertise in a manner, which utilizes adefined protocol, something that is only just beginning to emerge intoday's WWW.

[0392] Universal tasks 674 resides on WCP 670 as does universal options676, both of which are a catalogue of all information published by aplurality of user 600. Universal tasks 674 and universal options 676benefits from being monitored by content filter team 672. Team 672 isknown to be required in order to prevent some forms of duplication andto facilitate accurate translation of options amongst a plurality oflanguages and locales, and to further optimize universal options 676 sothat universal tasks 674 represent “best practice” for completing anytask in a specified manner, again sensitive to locale.

[0393]FIG. 13 illustrates the flow of information from user 600 throughto task list 648, and then highlights the loop of constant improvementin the search for best practice for any given task.

[0394] User 600 completes work 601. In the modern office environment,this typically involves use of workstation 602, a computing platformused to provide access to operations models 610. Operation models 610 isany software compliant with the invention.

[0395] General toolbar 615, specific toolbar 616 and identity toolbar618 are dynamically configured according to the context of work, i.e. ifworking with a video clip, the application toolbars will be configureddifferently than if working with a scanned document.

[0396] Work area 617 includes predefined input fields 571. Work 601 iscompleted through specific instances of dialogs 700 that facilitatespecific user operations 613. FIG. 13 uses block 702 to show theabstract types of operation that user 600 will normally perform on adaily basis, such as processing e-mail, faxes and telephone calls. Thesum of user operations 702 can therefore, be referred to as work 601.

[0397] Block 704 indicates that the current work context of user 600 isbeing exemplified as processing e-mail, which typically involves openingand reading e-mail, responding to e-mail, forwarding e-mail tocolleagues and archiving e-mails which are important to user 600. Block704 being a specific operation is therefore, a specialization of block702.

[0398] Block 706 closes in on the detail of the operation described inblock 704 by highlighting a smaller unit of work referred to as a task.Processing e-mail 704 includes smaller units of work that are executedby user 600. Here, FIG. 13 shows one such task to be forwarding ane-mail attachment in block 706.

[0399] Block 708 reduces this act still further by illustrating whatuser 600 must do within OM in order to forward or send any e-mail, andthis includes setting options for delivery method, in this case e-mail,delivery time (e.g. e-mail can be sent after 6PM), requesting a receipt(e.g. when the recipient has opened and read the e-mail), and all thisis in addition to selecting the recipient of the mail.

[0400] Messages 641 flow to virtual module 640 as block 702, block 704,block 706 and block 708 are enacted. Correspondingly, virtual moduleclassifies the messages as being having operations 710, tasks 712 andprocedures 714.

[0401] If task 800 is executed many times with the same values asdepicted in task 810, then all values in task 810 can be assumed asdefault values, such that user 600 no longer has to select them.

[0402] In the case of task 810 100% automation is possible, meaning itcan be re-enacted without further intervention from user 600, as allinput values are known.

[0403]FIG. 13, therefore, shows that schedule 649, contained in user'svirtual 642, can be utilized to automatically trigger the execution ofany operation or task contained in task list 648. In fact, schedule 649can be utilized to automatically trigger the execution of any contentcontained in operation log 646, which is compatible with task list 648.Schedule 649 is known in the art as an automated diary or watchdog,which fires events according to a specified time or system event.Connector 716, therefore, represents the flow of messages 641 fromuser's virtual 642 back to OM.

[0404] For example, schedule 649 can execute task 810 at 7:00am everymorning, or when an event occurs, such as the arrival of e-mailmessages. User 600 could, therefore, formulate a rule such that whenevere-mail arrives, it is forwarded to Jack Jackson 816 as described in task810. Events are utilized by OM in order to provide increased automationfor user 600.

[0405] Moving now to block 718, this indicates the user's constantsearch for perfection, meaning that the efficiency of any task can beimproved through periodic use of task modeling 630.

[0406] The user interface of task modeling is completely under thecontrol of the related operations model 610, therefore, is not shown inthe figures, but the features are simple to understand.

[0407] Task modeling involves selecting any task and exploring for themost optimal values according to the wish of user 600. User 600 may be anovice user and, therefore, will often lack the knowledge as to whichcombination of values for options 622 is best in the context of a givengoal, such as saving money or saving time.

[0408] Once optimal values for options 622 have been acquired from taskmodeling 670, they are stored in desirable options list 650, from wherethey can be extracted as a default value for corresponding options 622.As block 718 indicates, the cycle can continue indefinitely as trendsalter and new values become available through WCP 670.

[0409] Task deviation control 632 monitors use of task list 648 andoperation log 646 and if deviation from desirable options is detectednotifications are fed to OM, as indicated by connector 717.

[0410] The use of dialogs assists in the capturing of user actions whichare the basis of task recording. The recording results in databasesbeing populated over a prolonged period of time, without the userneeding to being or end the recording process, which actually never endsas long as the present invention has sufficient storage capacity.

[0411] As shown in FIG. 14, a sequence of dialogs is depicted toillustrate how the invention acts independently of the display orinteraction methods preferred by OM.

[0412] A flow comprising dialog 1250, dialog 1252 and dialog 1254 isillustrated, all being unique instances of dialog 700 (see FIG. 13)tailored to suit a particular task.

[0413] The flow is designed to illustrate the required actions of OM inmonitoring the actions of user 600 in order to form CFI followingthrough to and concluding at FIG. 18.

[0414] The flow enables user 600 to open a received e-mail, to examineattachments on the e-mail, one of which is a sound file in this example,and to forward it to a selected recipient. The flow is typical for anyuser 600 working with e-mail when one wishes to forward a received itemto another party and, therefore, is something which user 600 is likelyto repeat many times.

[0415] Dialogs 1250, 1252 and 1254 consists of a unique title area suchas title area 1256, where each of the dialogs displays a captiondescribing its functionality. Title area 1256 further includes a groupof quick access buttons, my virtual 1258, finished 1260 and menu 1262,all of which are in view regardless of the dialog in use, as these areseen to be common to all dialogs.

[0416] The function of menu button 1262 is simply to allow user 600 toaccess the main menu from which each task begins. It is therefore,possible to begin a new task even though one is already in progress, andtherefore, it is disclosed that the invention can record multiple tasksoccurring substantially in parallel.

[0417] The function of my virtual 1258 is to allow user 600 to access avisual representation of task list 648 from whence additionalpre-recorded tasks can be executed.

[0418] The function of finished button 1260 is to allow user 600 tosignal the completion of a dialog and ultimately completion of the task.For example, on dialog 1250 clicking finished 1260 takes user 600 to thenext dialog, i.e. dialog 1252, and in the same way user 600 moves fromdialog 1252 to dialog 1254, where clocking finished button 1254completes the task.

[0419] Toolbar 615 includes command buttons, which are relevant to allitems, for example, regardless of whether an item represents a videofile or a sound file, it can be forwarded by e-mail. If a task T2, isrecorded to forward an item by e-mail, it would be appropriate for OM toplace a command button representing T₂ (see discussion of FIG. 12 andFIG. 21) on general toolbar 615, within easy reach of user 600. Whenviewing any item, user 600 could instantly forward it to an e-mailrecipient with a single click. Such behavior now means that user 600 cangain one-click access to any recorded task so included on a toolbar,without the need to invoke a method of displaying and selecting tasksfrom task list 648.

[0420] Specific toolbar 616 includes those command buttons, which arespecific to the type of work being done through the current dialog. Forexample, if an e-mail attachment is opened and found to be an audio filethen specific toolbar 616 would consists of buttons such as “play” and“rewind”, whereas if the attachment was a scanned letter toolbar 616would consists of buttons such as “O.C.R”, for converting the scannedpage back into a text document.

[0421] Identity toolbar 618 includes buttons specifically related to theitem being worked on. In the case of an e-mail item, toolbar 618 couldconsists of buttons for selecting and viewing attachments. Identitytoolbar 618 is not illustrated on the dialogs in order to narrow thescope of the discussion as the behavior described below applies to alltoolbars 615, 616 and 618.

[0422] Dialog 1250 further includes work area 1268, suitable for readinge-mails and invoking a method of opening attachments. Dialog 1252further includes work area 1280, suitable for playing sound files.Dialog 1254 further includes work area 1292, suitable for allowing user600 to pick a recipient, which will receive a forwarded item by e-mail.

[0423] The flow would be impossible to totally automate as user 600utilizes dialog 1252 to listen to a sound file being played, behavior,which the invention is not designed to replace.

[0424] The flow is, therefore, offered to illustrate problematic tasks,which the invention will find difficult to automate. However, as will bediscussed in later figures, the actions of user 600 are still requiredto be monitored and emitted as CFI as the invention will count thefrequency of use of options such as selected recipients, selected itemsand the like contained in OM.

[0425]FIGS. 14, 15, 16 and 17 depict common place actions, which havebeen facilitated through dialogs and consist of standards set out by thepresent method.

[0426] A larger view of dialog 1250 is provided which now makes itpossible to see that general toolbar 615 includes buttons print 1300 andarchive 1302, Forward 1304 and view 1306, some of which will be enabledand disabled as appropriate for the dialog 700 which is in view.

[0427] Print 1300 allows user 600 to print the text of the messagecontained in work area 1268. Archive 1302 allows user 600 to move thee-mail item to an archive, an act often referred to as “filing” an item.Forward 1304 allows user 600 to forward an item or an attachment tosomebody and view enables user 600 to view an attachment.

[0428] Specific toolbar 616 COMBO BOX 1308 containing the names ofattached items.

[0429] Forward 1304 allows user 600 to forward the selected attachment,currently WELCOME.WAV as indicated in COMBO BOX 1308.

[0430] When user 600 no longer needs to utilize dialog 1250, finishedbutton 1260 is clicked and the dialog is dismissed.

[0431] Referring to FIG. 16, the concept of opening an attachment usingdialog 1252, first shown in FIG. 15, is expanded.

[0432] Specific toolbar 616 is now configured for playing sound filesand, therefore, includes play 1312 and stop 1314, to enable user 600 tocontrol the attached sound file. Progress bar 1316 enables user 600 tosee how much of the attached sound file has been played so far.

[0433] When user 600 has heard the attached sound file being played,finished button 1260 is clicked and the dialog is dismissed, returninguser 600 to dialog 1250 (see FIG. 16).

[0434]FIG. 17 expands the concept of forwarding an item through the useof dialog 1254, which is reached when user 600 clicks forward 1304 (seeFIG. 16).

[0435] Work area 1292 now contains a description of the attachment beingviewed.

[0436] Specific toolbar 616 includes add 1320, a button which allowsuser 600 to add a new contact, and COMBO 1322 which provides a means ofselecting any contact from the address book. The contact receiving thee-mail is Jack, as indicated by COMBO BOX 1322.

[0437] When user 600 clicks finished 1260 the sound file is placed inthe out-tray and will be transmitted when user 600 next sends andreceives e-mail in OM. When finished button 260 is clicked the task iscomplete and user 600 is returned to the main menu of OM.

[0438] Throughout FIGS. 15, 16 and 17, the flow first depicted in FIG.14 has been followed and user actions have been recorded according tothe method depicted in FIG. 18. Usage of options selected on dialog1254, being a recipient, is accumulated to form a frequency of use foreach value as discussed in subsequent figures.

[0439] If user 600 had not listened to the sound file as described inFIG. 16, then substantially more automation could be provided by theinvention. However, the example is used to illustrate inherentrestrictions apparent in all forms of automation where user interactionis required.

[0440]FIG. 18 depicts optional logic required in OM, which monitors theactions of user 600 and formulates CFI.

[0441]FIG. 19 corresponds to the overall flow in and around dialog 1250,dialog 1252 and dialog 1254 as regardless of the dialog in view therecording process, where OM formulates and emits CFI to virtual module640, is the same.

[0442] Flow, therefore, begins at block 1330 where any button, whichcauses a new dialog to show, is deemed to begin a next step. Clicking anoption on the main menu of OM is such an act, therefore, it is impliedthat flow initially came to block 1330 from the main menu of OM at whichpoint a new task began.

[0443] Flow moves to block 1332 where the appropriate dialog isdisplayed according to the steps depicted in FIG. 15. At block 1334 user600 enters any relevant data and selects options in predefined inputfields 571, comprising the option groups and any other user interfacecomponent that collects data from user 600. Flow then moves to block1336 where user 600 can manipulate a document or other item if relevantto the current dialog.

[0444] Decision block 1338 detects if user 600 has clicked a cancelbutton, which immediately abandons the creation of work and therefore,cancels recording of any new task. If OM detects that cancel has beenclicked then all CFI are discarded and flow moves to 1352 where the flowends.

[0445] If user 600 clicks finished button 1260, then, at block 1340, theuse of a specific dialog has ended, and potentially, if the dialog isthe last in a sequence a task has been completed.

[0446] In any case, flow moves to block 1342 where predefined inputfields 571 now contain values, which are collected and flow moves toblock 1344 where the item reference is collected. At block 1346, thestep is complete and at block 1348 CFI are formed.

[0447] Decision block 1350 yields a YES response if there are furtherdialogs 700 to be processed, which would cause flow to move back toblock 1330. Otherwise CFI are emitted to virtual module 640 and flowends at block 1352.

[0448] As shown in FIG. 19, a collection of user actions is depicted tocreate a video recording and forward it to a recipient. This is anotherillustrative flow to show that OM can consist of complex flows throughdialogs 700 in order to get a simple job done.

[0449] Two work flows are depicted in FIG. 20, namely create video clip820 and forward item 840. Create video item 828 is expanded in block 852to show it includes steps where values must be selected, in this exampleuser 600 accepts default values for color depth 854, image resolution856 and data file format 858, as any novice user is likely to do.

[0450] These separate work flows, being examples of user operations 613(see FIG. 13) will ultimately be having an operation referred to as sendvideo mail (see FIG. 20).

[0451] The initiator for these processes is that user 600 wishes to sendvideo mail, a function, which OM does not provide. However, OM providesa means of recording a video clip in an area known as work tray and alsoprovides a means of forwarding any selected item in work tray, to arecipient. Forwarding in this example will require the use of e-mail asan appropriate carrier for the video item type.

[0452] Beginning then with create video clip 820 which begins with user600 selecting an item from main menu 822 in OM causing work tray 824 tobe displayed, utilizing an instance of dialog 700 which includes generaltoolbar 615 to offer command buttons to create a new item. User 600clicks a command button indicating a new item is to be created so flowmoves to create new item 826, a further toolbar is displayed askingwhich type of item user 600 requires and the response of create videoitem 828 is given. Upon receiving the instruction to create a new videoitem OM displays another instance of dialog 700 tailored for creatingvideo recordings from a web camera connected to workstation 602, andcomprising at least a record button and stop button in order that user600 can begin and end the video recording process.

[0453] User 600 therefore, clicks record 830 and a video recording isaccumulated until user 600 clicks stop 832. The video clip has beencaptured and at block 834 user 600 clicks finished 1260 (see FIG. 15),contained in all instances of dialog 700, and the recording process iscompleted therefore, all dialogs are closed and user 600 is returned towork tray 824 where the newly created video item is listed.

[0454] Flow now moves to forward item 840 where user 600 selects thevideo item in block 842 and then clicks a command button indicating thedesire to forward the item in block 844. Whenever an item is forwarded,a recipient is selected therefore, user 600 selects a recipient in block846, and, then, choose delivery method 848 selects e-mail and finally,in block 850, clicks finished button 1260, ending the flow and placing anew e-mail item in the out-tray of OM.

[0455] Two distinct user operations 613 have been executed as describedin block 820 and block 840 but combined they form a pattern of work 601(see FIG. 13). User 600 would not tend to view the pattern of work astwo distinct acts, this paradigm is forced upon user 600 by the designemployed in the construction of OM. What user 600 needs is a way ofoffering the two user operations 613 in useful forms, which can bere-enacted rapidly.

[0456]FIG. 20 defines the task toolbar and the aforementioned useroperations 613 are discussed and generic tasks and an operation areformed.

[0457] Task list 648 is a simplified view of operations log 646.Simplification is achieved by reducing repeated tasks of the same meritin operation log 646 to a single generic task having task list 648. Inother words, tasks of the same merit are compounded to form generictasks.

[0458] The preferred notation for tasks in operation log 646 is T_(N);these are specific tasks with set values for their task components. Thepreferred notation for generic tasks in task list 648 is G_(N).

[0459] Block 646 includes two tasks, T₁ in block 862 and T₂ in block864. The purpose of T₁ is to create video clips, but in order to do soGSAM 612 requires that user 600 selects values for three option groups,illustrated in block 866. Once the options have been selected, a clipcan be recorded and is represented by video clip 866, a data filecontaining a video clip recording. The purpose of T₂ is to forward anitem, in this case video clip 866, but in order to do so, GSAM 612requires user 600 to select a delivery method and recipient asillustrated in block 882.

[0460] When user 600 has created many video clips the selections inblock 866 will have had to be selected over and over again. If forconvenience the notation T_(1.1), T_(1.2) through T_(1.N) is used toillustrate that T₁ is being executed and recorded many times inoperation log 646, then it can be seen that T₁ is a frequently executedtask.

[0461] The purpose of procedure engine 580 (see FIG. 10) is to spot therepetitious use of tasks in operation log 646. If a different row wasadded to task list 648 for every combination of a task with everycombination of values related to its task components, the inventionwould not be useful.

[0462] As T_(1.1) through T_(1.N) are tasks of the same merit, i.e.consists of the same task components, they can be compounded into asingle row and displayed in task toolbar (see block 866, block 882 andblock 895), where all the various values for resolution 870, color depth874 and file format 878 are correspondingly compounded to form selectionlists. At first glance, this does not appear to be more useful than theoriginal method for creating video clips provided by GSAM 612, butcloser analysis is required.

[0463] Video settings consists of resolution 870, color depth 874 andfile format 878. Video options consists of list 872, list 876 and list880 and correspond to values available for video settings.

[0464] The compounding process occurs when T_(1.N) reaches F_(TASK).Recall that T_(1.N) represents the number of times T₁ has been executedby user 600. F_(TASK) is a value in the invention, which can beconfigured by OM, and states the number of repetitions of tasks of thesame merit, which are required to occur before a generic task iscompounded and placed in task list 648.

[0465] As each task recording, T_(1.1) through T_(1.N), is placed inoperation log 646, now embodied as a database table, a SQL statement isformed to find all tasks of the same merit, and can be facilitatedthrough use of MICROSOFT ACCESS, MICROSOFT SQL SERVER or other SQLcompatible databases:

[0466] SELECT OperationLog.TaskID, OperationLog.CFI FROM

[0467] OperationLog WHERE OperationLog.CFI LIKE “*B1*” AND

[0468] OperationLog.CFI LIKE “*O1*”

[0469] OperationLog.CFI LIKE “*O2*”

[0470] OperationLog.CFI LIKE “*O3*”

[0471] Assuming the CFI for T_(1.N) is as follows:

T _(1.N)(B ₁ +O _(1.1) +O _(2.1) +O _(3.1))

[0472] Where:

[0473] B₁ represents clicking a button which enters a dialog forrecording video clips, O₁ corresponds to resolution 870, O₂ correspondsto color depth 874 and O₃ corresponds to file format 878, therefore,O_(1.1) corresponds to 320×200 a value from list 872, O_(2.1)corresponds with 16-bit from list 876 and O_(3.1) corresponds with AVIfrom list 880.

[0474] The above query must find all tasks that specifically consists ofB₁, O₁, O₂ and O₃ in any order. Further analysis must be made throughstring parsing is firstly used to ensure that the only task componentshaving returned tasks are B₁, O₁, O₂ and O₃, and, secondly, it enablesdiscovery of the specific values assigned to task components (i.e.O_(1.1) etc.)

[0475] The specific values from all tasks are compounded into theirindividual groups, e.g. O_(1.1), O_(1.2) and O_(1.3) are compounded intogroup O₁, the same processing is required for O₂ and O₃, and then thegeneric task G₁, having block 866 can be written to task list 648 whichis embodied as a separate database table.

[0476] The compounding discussion of T_(1.1) through T_(1.N) is exactlyapplicable to T₂ in order to form G₂ in block 882. G2 contains thecompounded values for all executions of T₂ where recipient 884 andmethod 888 had to be set from values having list 886 and 890respectively.

[0477] OM makes a request for procedure engine 580 to return thecontents of task list 648 and receives a collection of lines of CFI inresponse, each one representing a single generic task or operation.

[0478] Each line of CFI is then represented as a task toolbar all havinga single dialog 700 within OM. When OM receives CFI it must use stringparsing to cut out each task component in order to decide how torepresent each task component on the task toolbar.

[0479] The manner in which task list 648 is represented by the tasktoolbar is under the control of OM. The preferred embodiment representseach task component with a suitable VISUAL BASIC CONTROL as illustratedon FIG. 20, using a method known as dynamically loading CONTROLS onFORMS.

[0480] The CFI below represents a generic task comprising one button andone option group, where the values for the option group are also havingthe line of CFI:

T ₁(B ₁+(O _(1.1), O_(1.2), O_(1.3)))I _(N)(“Telephone Contact”)

[0481] The above CFI should be acted upon thus; B₁ should be drawn as aCOMMAND BUTTON with the indicative name represented by I_(N), followedby a COMBO BOX containing the string representations of O_(1.1), O_(1.2)and O_(1.3), all of which are known to OM, as it originally encoded theCFI. When user 600 clicks B₁, the action of calling a contact selectedfrom amongst contacts O_(1.1), O_(1.2) and O_(1.3), where O₁ representscontacts, is executed by OM.

[0482] Similarly if multiple option groups are received

T ₁(B ₁+(O _(1.1), O_(1.2), O_(1.3)))I _(N)(“Telephone Contact”)

[0483] Whenever a COMMAND button such as B₁ is clicked, OM can eitherimmediately execute the functionality represented by B₁, for exampletake photograph (using a web camera etc.), or can take user 600 to theoriginal dialog that B₁ came from, for example the dialog for takingphotographs. The preferred method of the invention is to immediatelyexecute the functionality and reduce the use of dialogs 700 to aminimum.

[0484] To clarify, in GSAM 612, if B₁ takes a photograph and user 600 iscurrently looking at the task toolbar and can, therefore, see B₁,clicking B₁ would immediately take a photograph and would not requireuser 600 to use work in-process 555, or any other intermediate dialogs700.

[0485] OM is not required to provide a task toolbar if it does not wishto display task list 648 in part or in whole. However, the purpose oftask toolbar is fundamentally to allow user 600 to do the same work aswas done via a collection of dialogs in the minimum number of clicks. IfOM does consists of task toolbar then it will be more distinguishablefrom other devices that don't.

[0486] When the frequency of use for a task reaches a pre-definedfrequency, the existing TI is automatically hidden from view in tasktoolbar and merged with its comprising task. Thus, the same task will beexecuted by one command (click) less. At this stage any one of remainingtask components can become TI and the cycle continues. The inventionaims to complete tasks through a single command. User 600 can byutilizing task modeling 630 optimize a task to a single command at anytime, where feasible.

[0487] When the frequency of use of an option in relation to a specifictask, reaches a pre-defined frequency, user 600 is automaticallyrequested to revise it through task modeling 630. The revised option isgiven an indicative name describing the nature of the item(s) it relatesto, and is automatically indexed in desirable option list 650 with a newpre-defined frequency.

[0488] As such, the user's abilities are digitally captured and optionsand schedules for doing tasks are dynamically and automaticallyup-graded and optimized. User 600 is persuaded to adopt an evolving lifeas opposed to the habitual. Thus, the cycle of perfection andstandardization for the user and their virtual begins.

[0489] T₃ in block 894 now represents G₂ from block 882, where all inputvalues have a default due to the fact that user 600 utilized G₂ withJack 898 and e-mail 900 so frequently, therefore, it is desirable for OMto offer user 600 the functionality of G₂ with preset values, allprovided by a single click.

[0490] Indicative name 896 can be used on a button for a toolbar in OM,where a single click of the button would cause T₃ to be executed, thus aselected item, for example in the in-tray would be forward to Jack 898by e-mail 900.

[0491] If T₃ is displayed by OM in the task toolbar there would be noneed to display recipient 884 or method 888, as would be the case forG₂, as no inputs are required for T₃.

[0492] As user 600 executes G₁ and G₂, by setting appropriate valuesprior to executing the tasks by clicking either create video clip 820 orforward item 840, the usage of each value, e.g. having video options, iscounted in relation to the comprising task, e.g. G₁.

[0493] Therefore, if user 600 creates three video clips using 160×160from list 872, then the value 160×160 will have a frequency of use equalto three, in relation to G₁.

[0494] All values for task components have an independent frequency ofuse (F); stating how frequently a value has been repeated with aspecific task.

[0495] When a generic task such as G₂ has an option group represented byTI the frequency of use of each value used from the option group iscounted in combination with G₂.

[0496] For example, a default value can be found in list 872 forresolution 870 if it is used frequently enough, similarly a defaultvalue from list 876 can be found for color depth 874 and finally adefault value from list 880 can be found for file format 878. This canbe done according to a discussion expanded in FIG. 21.

[0497] Furthermore the frequency of use of values in options groups canbe used as a sorting order, therefore, most frequently used values canbe at the top of the option group with least frequently used values atthe bottom.

[0498] Thus options in an option group Δ_(O1) are sorted by frequency ofuse being FNΔ_(O1), for example, ifFN_(O1.1)>FN_(O1.3)>FN_(O1.2)>FN_(O1.4) then the order of values inoption group O₁ according to frequency of use is O1.1, O1.3, O1.2 andfinally O1.4.

[0499] When OM displays option groups they can be sorted in theirnatural order, as dictated by OM, such as alphabetical order, or byfrequency of use. Values that have remained unused can be hidden by OMin order to restrict the number of options offered to user 600.

[0500] An interesting use of operations log 646 is to analyze usage ofcommand buttons contained in general toolbar 615, specific toolbar 616and identity toolbar 618, in that buttons can be hidden if they are notutilized by user 600. This behavior is evident in existing art, butoperations log 646 extends this in a more intuitive manner by allowingthe buttons to be hidden based on current work context.

[0501] For example, if a user creates a new word processor document itemI₁, and during creation of I₁ makes frequent use of buttons that controlbold and underline typeface, but does not utilize buttons for changingfont, then when I₁ is displayed in future, buttons for bold andunderline will be visible and those related to font and font size willnot. Continuing, if I₂ is then created and the reverse situation istrue, with regard to button usage, then the combination of visiblebuttons will alter according to whether I₁ or I₂ is being worked on byuser 600. Therefore, rather than buttons just disappearing from view,those tools which are relevant to the item being worked on are broughtinto view and others are not, but with existing art buttons which arehidden are hidden for all items, until the user utilizes them and thenthey are visible for all items. The invention again extends contextawareness for OM allowing it to always present a streamlined ergonomicuser interface.

[0502] This is enabled if OM emits CFI comprising every single buttonclick occurring within a task, which is the preferred method of theinvention. Therefore, a coded form instruction can consists of the samebutton many times:

T ₆(B₁ , O1.1, B ₁ , O1.2, B ₁ , B ₁ , B ₂ , B ₃ , B ₁ , I ₄)

[0503] This might correspond with user 600 selecting text and using abutton (B₁) to increase the font size of selected text while creating anitem (I₄). When I₄ is recalled for further work B₁, B₂ and B₃ would bevisible, but other buttons that were not used could be hidden by OM.

[0504] Block 895 now shows how G₁ and G₂ can be compounded to make anoperation, where an operation includes at least one task.

[0505] Connector 892 can be used by user 600 to state that the output ofG₁ is to be the input of G₂. Therefore, the operation OP₁ is formed inblock 895 and includes all inputs and button clicks from G₁ and G₂. Overtime, default values will be found for inputs in OP1 and again user 600will have access to extensive functionality with the minimum number ofclicks.

[0506]FIG. 21 depicts a table which will explain the successivereduction of input to task T₁.

[0507] Beginning with block 2500, a graphical description of the termsprocedure and task is provided. Procedure 2502 can be seen to dictatethe sequence of TI followed by task components 2506, while task 2504requires the assignment of specific values to the task components 2506.The line of task 2504 clearly indicates each value that is assigned tothe corresponding option group.

[0508] Block 2508 includes T₁ where block 2510 illustrates that thevalues from option groups contained in block 2506 have been brought downto form T₁. At block 2512 the following pseudo code is depicted:

[0509] Declare variablefn as integer

[0510] Declare variableFN_(TI), as integer

[0511] FN_(T1)=value assigned by OM (i.e. FN_(TI1), FN_(TI2) . . . )

[0512] fn=0

[0513] Repeat

[0514] Execute T₁ with a value for TI

[0515] fn=fn+1 (relates to frequency of use for the value just assignedto TI)

[0516] Until fn=FN_(TI)

[0517] Create list of unique values assigned to TI

[0518] Count number of times each unique value has been assigned to TI

[0519] Take value with highest count and assign as default value for TI

[0520] In the above, code fn represents the frequency of the mostcommonly used value for TI. When TI represents an option group, therewill be many possible values for the option group, therefore, manypossible values for TI. The invention is seeking the most frequentlyused value in order to use it as a default for TI. The pseudo codecounts the use of each value assigned to TI. When FN_(TI)−fn=0 thenrepetitions of T₁ have occurred where a value has been assigned to TIsufficient times to assume it as a default value. Block 2514 indicates adefault value has been found from an option group contained in procedure2502, which is represented as TI₁, being the current initiator at thisstage of the discussion. In block 2516 TI₁ is assigned B1.3 as thedefault value found in block 2514.

[0521] At this stage, the value of fn, related to the use of TI with T₁,is reset to zero and the cycle continues. Before the cycle begins againthe option group used by user 600 to begin T₁, typically, but notrestricted to being, the option group immediately to the right of theprevious TI is now assigned as TI.

[0522] In block 2520, TI₂ is found a default value when FN_(TI)−fn=0 isonce again found to be true. Therefore, block 2518 includes two defaultvalues, one from the previous TI (TI₁) and one from the current TI(TI₂). The cycle progresses through block 2524, taking default valuefrom block 2522, block 2528 taking default value from block 2526, block2532 taking default value from block 2530 and finally block 2536 takingdefault value from 2534, which ultimately means all option groups havebeen found default values.

[0523] Frequently used tasks and operations, having task list 648 areoffered to OM such that they can be accessed by a single click.

[0524] The frequency of use and schedule of execution for all tasks is abasis for analysis the user's habits.

[0525]FIG. 22 summarizes activity for operation log 646 as new tasksenter the invention or are executed from task list 648.

[0526] As described, messages 641 enter the invention from OM, arrivingat block 2600, which represents the CFI, transmitted from OM.

[0527] Task deviation control 632 is invoked at block 2602 to facilitatevalidation of values having the procedure arriving in block 2600. If adeviation is detected, then block 2604 yields a YES response and flow isdiverted to block 2606 where a notification is added to deviation log652 at which point OM is informed and can act accordingly.

[0528] Flow then continues to block 2608 where the procedure from block2600 is stored. Stored is defined to mean the coded form of instructionis substantially permanently saved, in order to protect the lifetimecontent of the dynamic data stores comprising recorded information andstatistics. It is this information which is of value and represents thevirtual personality of the user, i.e. user's virtual 642. Any suitablemethod of storage format can be used for this purpose such as a textfile, relational database such as MICROSOFT ACCESS or other forms ofISAM DATABASE. The text file storage method is preferred as it is theeasiest to implement for operation log 646, as sequential scanning fromtop to bottom is done more frequently than random access searching. Theoverhead of database indexes, which require constant updates, wouldpotentially slow the system down. However, the relational database canpotentially reduce development overhead and assist in further forms ofrapid analysis often referred to as data mining, which facilitatefurther discovery of patterns and habits exhibited by user 600.

[0529] At block 2612 operation log 646 is scanned and all procedures,which consists of the same task components, are found and counted. Atblock 2614 if the count=F_(TASK) then the procedure represented at block2600 has been executed sufficient times to warrant a new generic taskbeing created in task list 648, which occurs in block 2616. Flow thenends at block 2618.

[0530]FIG. 23 summarizes the activity related to task list 648. Any taskbeing executed on task list 648 brings execution to block 2620 whereflow continues to block 2622, which represents the task executed on tasklist 648. Like all task executions, task deviation control 632 isinvoked at block 2624 and if block 2626 yields a YES response thendeviation has occurred causing flow to move to block 2628, wherenotification is stored in deviation log 652 and again OM is informed.

[0531] Every execution of a task is recorded in operation log 646,therefore, at block 2630 the task having block 2622 is similarly storedand all task components are scanned and their corresponding frequencycounters are incremented, where simultaneous cascading frequency updatesare performed on any parent tasks. Block 2632 yields a YES response ifany task component contained in the task in block 2622 reaches FN_(TI).A YES response causes flow to move to block 2634 where flags are set toprovide OM with the option of hiding any relevant items.

[0532] Flow then continues to decision block 2636 which brings to lighta constant referred to as F_(REVISION), which causes task modeling to beinvoked for any task comprising at least one task component whosefrequency of use for any value meets or exceeds F_(REVISION). If so thenflow moves to block 2638 where task modeling is invoked in cooperationwith OM. Flow then ends at block 2640.

[0533]FIG. 24 illustrates how task modeling 630 assists in theoptimization of tasks. WCP 670 potentially plays a major role in thelife of user 600, as organized expertise can now be gained rapidly andutilized to achieve a diverse collection of completed tasks, notpreviously achievable by a novice user 600. Such a facilitysubstantially shortens the learning curve involved in getting theinvention or its related OM to function at full potential.

[0534] In this context, FIG. 22 shows that WCP 670 is central to aplurality of user 600, which share expertise by publishing tasks touniversal tasks 674 and related options to universal options 676.

[0535] Two users have made available their preferred options forcapturing a video clip. The first set of options is published by Jack930 and is optimized to provide a good quality video clip using lowresolution, so the resultant data file is as small as possible. Thesecond is Jim 940 whose options are optimized for better quality, butstill paying attention to file size.

[0536] Note that neither Jack 930 nor Jim 940 have recommended using160×160 for option group resolution 870, nor have they selected 32-bitcolor or 24-bit color for option group color depth 874, so they aredeemed to agree that 16-bit color is a good option for color depth 874,and they agree that AVI as oppose to WMP is a good file format to usefor video clips. However they have not agreed on which resolution isbest.

[0537] Jack 930 says that 320×200 resolution is best for him, as hefrequently e-mails video clips to friends so desires a smaller data filefrom the video recording process. Jim 940, however, uses video clips onhis web site so requires better quality, but still not the best quality,as visitors to his web site want quality video images but do not want tospend hours downloading them.

[0538] User 600 now considers the variety of options presented in block910, but is uncertain as to which combination would be best. Therefore,task modeling provides compound options 920 by eliminating all options,which are not used by chosen mentors, comprising Jack 930 and Jim 940.User 600 is able to search WCP 670 and find mentors whose personalprofiles contain expertise, which is of use to user 600. Profiles formentors can automatically be formed by a WCP by summarizing the tasks,which are uploaded by each mentor. In this case user 600 nominated thementors for their expertise on video clip recording.

[0539] Task modeling recovered the video clip recommendations of thementors from WCP 670 and formulated compound options 920. Each optiongroup is analyzed and where mentors agree on an option value all otheroptions in the group are eliminated. Where they disagree, the chosenoptions of each mentor are compounded and all other remaining options inthat option group are eliminated. Note how 160×160 has been eliminatedfrom compound options resolution 870, as neither Jack options 930 norJim options 940 recommend this value for video clip recording.

[0540] User 600 can now easily choose 16-bit color and AVI file formatas recommended in compound options 920. The only choice remains withrespect to resolution. User 600 is assisted though because the number ofchoices is now fewer.

[0541] Task modeling 630 allows user 600 to opt for one of resolution320×200 or 640×480 and use this as a default, but alternatively just thetwo recommended options can be offered in future uses of create videoclip 866 and 160×160 resolution will not then be offered.

[0542] Thus, task modeling 630 is able to assist OM in reducing theburden on user 600, who has to filter through many options lists inorder to make educated decisions.

[0543]FIG. 25 illustrates an extension to the embodiment of taskmodeling 630. On the left of FIG. 25, DDNA 6 is shown which is the sumtotal of all work ever carried out by user 600. On the right of FIG. 25,digital genes 8 is shown which is the smallest unit of activity in theinvention and can be related to things like assigning a value to a taskcomponent. As FIG. 25 is scanned left to right the number of possiblevalues for any task component reduces and the reduction of DDNA todigital genes is observed.

[0544] OM can be viewed as a complex software package where many optionsare presented to user 600. Task modeling 630 assists OM withsimplification, or in other words assists in narrowing the scope ofpossibilities 10. Narrowing the scope of possibilities 10 means thatuser 600 is faced with an overwhelming range of options for taskcomponents and therefore, wishes to reduce the number of possiblecombinations, which will ultimately lead to a more consistent style forany given item of work.

[0545] At least two distinct triggers will cause task modeling 630 to beinitiated. First, if user 600 wishes to find default values manually orwants to reduce the number of available options, then exploration mode 2occurs where user 600 is free to examine options available in all partsof OM. Second, Revision mode 4, which is triggered either by OM or theinvention, occurs when any value used in relation to a task has beenused F_(REVISION) times.

[0546] F_(REVISION) is a value set by OM, which informs the invention ofwhen task modeling 630 is to be automatically invoked. All unique valuesassigned to task components are counted and their frequency of use ismonitored. When the frequency of use of a value is equal to F_(REVISION)task modeling 630 requires user 600 to revise their habitual use of thevalue to ensure best practice is being employed.

[0547] Send 12 represents one type of work which user 600 can do throughGSAM 512, which is sending items to contacts. When user 600 has donethis many times task modeling 630 is able to display a map of allactivities of a particular type, assisted by OM.

[0548] Dotted arrows in FIG. 23 relate to exploration mode 2 where user600 is viewing all manner of work related to send 12. Continuous arrowsillustrate the path of a specific task or tasks of the same meritcomprising a task component, which has reached F_(REVISION).

[0549] Item type 14 tells user 600 that, so far, three types of workitems have generally been created or used in relation to send 12, beingvideo, audio and word-processing. Video has been used in connection withsending video clips to contacts 26 comprising Jim and Jack. The videoclips have been delivered using delivery method 28 comprising e-mail.Settings 30, comprising 320×200 resolution, etc. were used in connectionwith Jim in contacts 26. Settings 32 were used in connection with Jackin contacts 26.

[0550] Contacts 26 consists of only those contacts used in connectionwith video and send 12. Therefore, user 600 is clearly able to see therelated sets of options in for send 12.

[0551] Task modeling 630 now allows user 600 to switch the selectionbetween Jim and Jack, which will correspondingly cause either settings30 or settings 32 to be highlighted. User 600 could then say for allfuture use of video in connection with send 12 that either settings 30or settings 32 should be used, to increase consistency.

[0552] Returning to send 12 where flow moves to word-processing havingitem type 14. Word processing has thus far only been used in connectionwith Jim from contacts, which narrows the overall number of peoplehaving contacts 40. Flow then moves to delivery method 42 where user 600sees that Jim has received word-processing documents by fax and bye-mail. Those documents sent by fax were structured from FAX documenttemplate 44, where those sent by e-mail consists of letterhead 1 46.When letterhead 1 46 has been utilized word-processing enabled user 600to insert embedded items 56 comprising photo and scanned image. Whenphoto was inserted into the document settings 58 were used and whenscanned image was inserted into the document settings 60 were used.

[0553] User 600 has a clear map to discover how any particular piece ofwork was constructed, showing which options were used and how theyrelated to the overall operation of sending various documents todifferent people.

[0554] The example in FIG. 23 is basically showing how consistentcommunication can occur with various contacts, where the same method ofcontact and the same style of documents constantly flow to a recipient,which is desirable for example in order for user 600 to maintain aprofessional image with clients.

[0555] Returning to word-processing, many fonts 16 are available for usein a document. MICROSOFT WORD particularly makes dozens of fontsavailable. Many users make the mistake of over using fonts, thinking thereader of their documents will understand the meaning of why many fontchanges occur throughout a document. Often it is best to use a singlefont, other times a handful at most should be used. Therefore, user 600can take two views of font list 16. First, all fonts 18 can be viewed,which presents a list of all available fonts 20. Second, user 600 canchoose to see those fonts used during work, which are contained in fonts22 and those fonts 24 which were actually used in stored documents. User600 can then, as shown in previous discussion, choose just the fonts,which are relevant to work, rather than having to scroll through dozensof fonts to get to the “vital few”.

[0556] Similarly, when creating documents in connection with documenttemplates user 600 can see the document template 46 used for a specificitem or can choose to see all templates 50 and can choose a defaulttemplate 48 from such a list, or alternatively user 600 can seetemplates 54, actually used in stored documents, and can assign adefault template 52 from this narrower list.

[0557] Therefore, user 600 can over a period of time, through use ofrevision mode 4 or exploration mode 2, narrow the scope of optionsavailable, increasing consistency and optimizing working patterns.

[0558] User 600 may view exploration mode 2 and revision mode 4 as timeconsuming and can therefore, acquire a constitution from WCP 670. Asnoted above, a constitution is a predefined configuration, which canreduce the number of options visible when user 600 is working.Alternatively, a constitution is used simply as a cross check to notifyuser 600, via task deviation control 632, if any values are used whichare not specified in a selected constitution.

[0559] Referring to block 62, OM again has a wide range of optionsavailable which user 600 can use. User 600 can narrow these availableoptions using rules, which consists of the behavior described above.

[0560] A mentor can design a constitution to hide many options, whichthey feel are unnecessary in a certain arena of work. User 600 will thenstate principles, which means the decision process of choosing betweensomething user 600 prefers or something, which the constitution statesis good practice.

[0561] Rule 64 contains two abstract options A 70 and C 76. Constitution66 contains two abstract options B 72 and D 78, which are alternativesto those contained in rule 64. User 600 will choose one value from rule64 or constitution 66. Correspondingly, principle 68 illustrates that A74 is to be used, taken from rule 64 and D 80 is to be used fromconstitution 66.

[0562] Constitutional values could all be accepted as defaults, but theability to use rules to override constitutions, forming overall personalprinciples provides much more flexibility.

[0563] The preferred method of the invention is that only significant Band significant O are displayed during task modeling activities.

[0564] Customizations performed by user 600 can be transported amongstall compatible operation models 610. This can be achieved by expansionof universal converter 400, which can be customized to accept CFIbetween incompatible OM's, or by developers of OM's reaching agreementon the methods of abstracting information having CFI.

[0565] For example, many applications consists of “Ok”, “Cancel”,“Abort”, “Next”, “Save”, “Load”, “Left Justify”, “Cut”, “Paste”, and amultitude of similar commands. If each of these common commands whereassigned the same abstract name by every OM then disparate OM's wouldbecome increasingly compatible, where CFI recorded by one would beuseful to all. The simple step of agreeing B₁=“Load”, B₂=“Save” andO₁=“Contact Name”, and so on, is all that is required to enable OM toexchange CFI with a plurality of other OM and the overall benefits touser 600 are substantial.

[0566] With this in mind it is known that simple expansion of operationlog 646 and task list 648 would enable each CFI to be stamped with theunique identity of the OM, which recorded it. When task list 648 is thenshared, all user 600 having a compatible OM will then be able toleverage the expertise offered by all user 600 operating compatibleOM's.

What is claimed is:
 1. A method of information processing using acentral processing unit associated with at least one operation model,said method comprising the input steps: recording at least one codedform instruction provided by the at least one operation model; storingthe at least one coded form instruction representing a completed taskhaving at least one task component; counting the frequency of use of theat least one task component; comparing the frequency of use of the atleast one task component to a first predefined frequency; inserting theat least one coded form instruction in a task list if the frequency ofuse of the at least one task component is greater than or equal to thefirst predefined frequency; and wherein said method comprising theoutput steps: selecting at least one coded form instruction for the tasklist; transmitting the at least one coded form instruction to the atleast one operation model; wherein the at least one operation modelrepeats the at least one task component.
 2. The method of claim 1further comprising the step of reducing the number of manual inputs byproviding at least one default value in place of the at least one taskcomponent.
 3. The method of claim 2 wherein if frequency of use of theat least one default value exceeds a second predefined frequency, amandatory review process is initiated, said mandatory review processcomprising the steps of: displaying the at least one task component andother task components encompassed within the at least one coded forminstruction; offering previously used values for the at least one taskcomponent; and selecting one of the previously used values asreplacement default value for the at least one task component.
 3. Themethod of claim 3 wherein said offering step further comprises allpossible values for the at least one task component known to the atleast one operational model.
 4. The method of claim 3 wherein saidpreviously used values for the at least one task component of saidoffering step is replaced by the use of recommended values which havebeen stored on a network.
 5. The method of claim 3 wherein saidmandatory review process is manually initiated.
 6. The method of claim 4wherein said mandatory review process is manually initiated.
 7. Themethod of claim 5 wherein said mandatory review process is manuallyinitiated.
 8. The method of claim 1 wherein said recording, storing,counting, comparing, and inserting steps to obtain said task list areinstead provided by a default task list included in said operationmodel.
 9. The method of claim 3 such that if said default value for theat least one task component is not used, then the method furthercomprises the step of notifying operation model that a deviation hasoccurred.
 10. The method of claim 9 further comprising the steps of:storing the notification which was issued to the operation model;counting the frequency at which the deviation occurs; and presenting ahelp package when the counted deviation frequency exceeds a thirdpredefined frequency.
 11. A method of universal conversion of one formatof communication to at least one other format of communication requiringat least two intermediary steps of conversion, said method comprisingthe steps of: selecting a plurality of communication conversion tools,wherein each of said communication conversion tools has at least oneinput format and at least one output format; networking saidcommunication conversion tools together such that a conversion matrix isprovided, wherein said conversion matrix connects like output formats tolike input formats of said communication conversion tools; generating atleast one dynamic inter-lingua from said networking step; inputting acommunication format; informing said network the communication format ofsaid inputted communication format; choosing an output communicationformat; matching said input communication format to said outputcommunication format via said at least one dynamically generatedinter-lingua; and outputting the chosen communication format.
 12. Themethod of claim 11 wherein said input format is converted into at leasttwo output formats utilizing at least two dynamically generatedinter-lingua such that dynamically generated inter-lingua common to theat least two output formats are utilized only once in the conversionprocess to the at least two output formats.