Abstract: Methods, systems and programs for instant voice messaging over a packet-switched network are provided. A method for instant voice messaging may comprise receiving an instant voice message having one or more recipients, delivering the instant voice message to the one or more recipients over a packet-switched network, temporarily storing the instant voice message if a recipient is unavailable; and delivering the stored instant voice message to the recipient once the recipient becomes available.
Abstract: Described is a system and method for processing a voice mail. The method comprises receiving a voice mail, converting the voice mail into a text message using a predefined speech-to-text conversion algorithm and transmitting the text message to a wireless computing device.
Abstract: Described is a system and method for processing a voice mail. The method comprises receiving a voice mail, converting the voice mail into a text message using a predefined speech-to-text conversion algorithm and transmitting the text message to a wireless computing device.
Abstract: Methods, systems and programs for instant voice messaging over a packet-switched network are provided. A method for instant voice messaging may comprise receiving an instant voice message having one or more recipients, delivering the instant voice message to the one or more recipients over a packet-switched network, temporarily storing the instant voice message if a recipient is unavailable; and delivering the stored instant voice message to the recipient once the recipient becomes available.
Abstract: Methods, systems and programs for instant voice messaging over a packet-switched network are provided. A method for instant voice messaging may comprise receiving an instant voice message having one or more recipients, delivering the instant voice message to the one or more recipients over a packet-switched network, temporarily storing the instant voice message if a recipient is unavailable; and delivering the stored instant voice message to the recipient once the recipient becomes available.
Abstract: A real estate disclosure reporting method identifies a subject property, accesses an insurance claim database, determines from the database whether an insurance claim has been filed for the subject property and generates a report regarding the subject property and the insurance claim.
Abstract: A real estate disclosure reporting method identifies a subject property, accesses an insurance claim database, determines from the database whether an insurance claim has been filed for the subject property and generates a report regarding the subject property and the insurance claim.
Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.