摘要:
A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
摘要:
Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
摘要:
An approach for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
摘要:
Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
摘要:
Controlling electronic withdrawals by a transaction processor including receiving in the transaction processor from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the transaction processor to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the transaction processor from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the transaction processor, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
摘要:
A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.
摘要:
A method, system, and program for automated selection of a backup recipient and distribution of an instant messaging request to the backup recipient are provided. A communication support system detects a messaging request initiated by a requester for an intended recipient. The communication support system determines whether the intended recipient is available to respond to the messaging request from the requester. If the intended recipient is unavailable to respond to the messaging request from the requester, the communication support system searches at least one of a directory entry, a backup directory entry, and a schedule entry for the intended recipient to identify a designated backup for the messaging request. In particular, the designated backup recipient is selected from among multiple available backups where at least one characteristic of the messaging request matches at least one from among a current time period, a requester identity, and an intended subject matter specified in association with the designated backup recipient. Once the communication system selects a backup recipient, then the messaging request is distributed to the selected backup recipient, wherein the selected backup recipient is enabled then to respond to the messaging request.
摘要:
A system, apparatus and method of notifying a user that there may be a possibility of communicating with a computer system other than an intended one are provided. When a host in use by the user is to request a DNS name service, the request is sent to two or more DNS servers. If all the servers return the same IP address, then there is a likelihood that the user may communicate with the intended computer system. If, however, two or more different IP addresses are returned, there is a high likelihood that the user may communicate with a computer system other than the intended one. When this occurs a warning is generated notifying the user of such a likelihood.
摘要:
A system and method for performing a point in time backup is presented. A backup application initiates a point in time backup whereupon a backup tracker monitors write requests during the point in time backup. The backup tracker logs data block locations that have already been backed up whose content changes in response to a write request. After a first pass of backing up data blocks, the backup application backs up the changed data blocks. During the changed data block backup procedure, the backup application invokes a copy on write command for particular changed data blocks that receive write requests prior to their content being backed up. The copy on write command stores the particular changed data block's content in a temporary storage area in which the backup application retrieves when the backup application is ready to backup the particular changed data blocks.
摘要:
A computer implemented method, an apparatus, and a computer usable program product are provided for reestablishing the hotness, or the retention priority, of a page. When a page is paged out of memory, the page's then-current retention priority is saved. When the page is paged in again later, the retention priority of the page is updated to the retention priority that was saved at or before the time the page was last paged out.