摘要:
A plurality of data packets encoded according to a first protocol are received which encapsulate data encoded according to a second protocol. A first source address is extracted from the packets according to the first protocol, it is determined whether or not the first source address is a substantial duplicate of a known assigned address. If it is a duplicate, a second source address is extracted from the encapsulated data according to the second protocol, and the first source address and said second source address are provided in an enhanced error log so that a system administrator may correct the duplicate assigned address. Enhanced embodiments of the invention included analysis of data encapsulated by a third, fourth and subsequent protocols, and automatic determination of each protocol encoding format.
摘要:
A method, apparatus, and computer instructions for handling updates. A database is queried to determine an effect of the update on the data processing system in response to detecting an update for the data processing system. A configuration of the data processing system is used in querying the database. A health status of the data processing system is selectively modified using the response to form a modified health status in response to receiving a response from the database.
摘要:
A mechanism for multiple instant messaging (IM) sessions associated with a single user name is provided. A frontend server receives user login requests and routes the instant messaging system to a back-end server. Each login associated with a particular user name is routed to the same backend server (or IM host). Messages targeted to a recipient having a plurality of active IM sessions are broadcast to all the active sessions. Messages targeted to recipients having a single IM session are unicast.
摘要:
The present invention provides an anti-theft security method and system for portable electronic devices. This invention shifts the locking step from the external security device that engages the electronic device to the actual electronic device. This system comprises a portable electronic device having a opening therein for the purpose of engaging a securing device that will security the electronic device to some stationary object such as a desk. The securing device is typically a cable. This cable has one end that engages the electronic device through the opening the electronic device. Once engaged, a shutter activated by the electronic device reconfigures the opening in the electronic device to prevent the disengagement of the cable from the electronic device.
摘要:
A method, apparatus, and computer instructions for handling updates. A database is queried to determine an effect of the update on the data processing system in response to detecting an update for the data processing system. A configuration of the data processing system is used in querying the database. A health status of the data processing system is selectively modified using the response to form a modified health status in response to receiving a response from the database.
摘要:
A plurality of data packets encoded according to a first protocol are received which encapsulate data encoded according to a second protocol. A first source address is extracted from the packets according to the first protocol, it is determined whether or not the first source address is a substantial duplicate of a known assigned address. If it is a duplicate, a second source address is extracted from the encapsulated data according to the second protocol, and the first source address and said second source address are provided in an enhanced error log so that a system administrator may correct the duplicate assigned address. Enhanced embodiments of the invention included analysis of data encapsulated by a third, fourth and subsequent protocols, and automatic determination of each protocol encoding format.
摘要:
A system for controlling access to global computer network comprises a gateway computing device and one or more remote computer devices that are connected to the gateway computing device. The remote computer devices will gain access to the global computer network system via the gateway computing device. In one application, the remote computer devices can communicate directly with the gateway computing device to control access to the global computer network system. The gateway computing device has the capability to store information about each remote computer device in the system. The gateway computer device can communicate with the remote computer device through local area or wide area networks.
摘要:
A method, system and apparatus provide for automatic blogging of media viewing using an enhanced remote controller having networking capabilities that support social networking and blogging. The enhanced remote controller, suitable for use while viewing media programming and content, allows a viewer to autoblog about currently experienced media programming in real-time without having to resort to direct interaction with a computer to perform the autoblogging. The enhanced remote controller allows the viewer to both communicate with a blogging server, and thus to a blogging service, as well as to display responses to and from other bloggers with whom the viewer is communicating. These blog communications may be accomplished without the viewer having to leave the broadcast receiver of the television.
摘要:
A system and method comprises a primary remote control device and one or more secondary remote control devices. The primary remote device communicates directly with a set top tuner device to control programming between the tuner and the remote in the multiple remote system. The primary remote can communicate with the tuner and secondary remotes through local area or wide area networks. This system decentralizes control of actual broadcast or recorded program away from a set-top tuner box, to a portable decentralized electronic device such as a specialized remote control. With this system, a user can retrieve programming information without the need to be in close proximity to the tuner box. Each person has his/her own remote controller that may be used to access content permitted for that user. To prevent any user from accessing another user's remote controller along with private data or personal profile, strict access control would be implemented.
摘要:
A computer implemented method, apparatus, and computer program product for displaying information within a browser. Server browser information is stored on a web server. The server browser information includes a set of first category categories and a set of second category categories. An indication of whether a user is on a public system or a private system is received by the web server. Responsive to receiving the indication that the user is on a public system, only the set of public categories of the browser information is displayed to the user.