摘要:
A method for reallocating processors in a logically partitioned environment using a Performance Enhancement Program (PEP) and a Reallocation Program (RP). The PEP allows an administrator to designate several parameters and identify donor and recipient candidates. The RP compiles the performance data for the processors and calculates a composite parameter. For each processor in the donor candidate pool, the RP compares the composite parameter to the donor load threshold to determine if the processor is a donor. For each processor in the recipient candidate pool, the RP compares the composite parameter to the recipient load threshold to determine if the processor is a recipient. The RP then allocates the processors from the donors to the recipients. The RP continues to monitor and update the workload statistics based on either a moving window or a discrete window sampling system.
摘要:
A method and system for testing newly installed or recently upgraded software is presented. All software installation activities are tracked and logged. New and upgrade software is isolated, either physically or logically, and tested using diagnostic software. If the new/upgrade isolated software passes the testing by the diagnostic software, then it is allowed to operate in the presence of other previously installed software. If an error occurs during an execution of the new/upgrade software, either while isolated or in the presence of previously loaded software, a log of other concurrently running software is reviewed to determine a likely software incompatibility with the new/upgrade software.
摘要:
Changes in user behavior of usage of wireless services from a mobile device are encouraged in order to effect shaping of traffic and utilization patterns among a plurality of cells within a rate plan region, wherein a discount indicator disposed in said mobile device is provided to notify a user of a discount available for consuming wireless service from a given cell. A geo-cost policy is established for that user or mobile device in which rules and conditions according to the available discounts and class of service are defined. A service completer queues services and automatically completes queued services upon present conditions meeting said geo-cost policy rules, such as delaying and later delivering messages when the mobile device is relocated to a cell where discounts are being offered.
摘要:
The present invention is method for scheduling jobs in a grid computing environment without having to monitor the state of the resource on the gird comprising a Global Scheduling Program (GSP) and a Local Scheduling Program (LSP). The GSP receives jobs submitted to the grid and distributes the job to the closest resource. The resource then runs the LSP to determine if the resource can execute the job under the conditions specified in the job. The LSP either rejects or accepts the job based on the current state of the resource properties and informs the GSP of the acceptance or rejection. If the job is rejected, the GSP randomly selects another resource to send the job to using a resource table. The resource table contains the state-independent properties of every resource on the grid.
摘要:
The present invention provides a method and system to enable a caller to send additional information along with the Caller Identification to a telephone receiver at the same time the caller makes the call. This additional information better informs the recipient of the identity of the caller and the nature of the call. This information allows the receiver to decide whether or not to answer the telephone call.
摘要:
A mechanism is provided for achieving autonomic computing self-healing utilizing meta level reflection. In a base level, a monitor detects an error in a production environment. The base level provides a reification message comprising data about the error to a meta level. A reasoning system in the meta level receives the reification message and analyzes the data using knowledge of computational components in the base level. The reasoning system identifies a self-healing action for the error and returns a reversion message comprising a signal to implement the self-healing action. Responsive to receiving the signal, the base level implements the self-healing action.
摘要:
A method for filtering incoming data from an external computer network is provided. This method includes scanning the contents of incoming data for pre-selected keyword(s) and allowing it to pass per standard service rules if its content does not contain the pre-selected keyword(s). If the incoming data does contain pre-selected keywords, it is blocked and added to a “known-block” filtering table. Once added to the filtering table, the site will automatically be blocked in the future without having its contents scanned again for pre-selected keywords.
摘要:
According to an apparatus form of the invention, an apparatus of a size and weight that is suitable to be carried easily in a pocket or purse includes telecommunications circuitry operable to wirelessly send and receive voice communications directly to and from a cell phone network. The apparatus also has a processor communicatively coupled to the telecommunications circuitry for receiving the voice communications. A memory of the apparatus has program instructions for speech recognition stored therein and the processor is operable under control of the speech recognition program instructions to generate a transcript of the voice communications. The apparatus also includes a display and the memory has program instructions for a display function stored therein. The processor is operable under control of the display program instructions to project the transcript on the display.
摘要:
A system and method for automatically backing up logical entity data. Filesystems within the computer system are identified and data pertaining to the filesystem is recorded to backup storage. Recorded data includes the filesystem name, size, mount points, logical volumes, and logical volume groups. The logical entity backup process records the logical volume group names, the disk identification data associated with the logical volumes, the Internet Protocol (IP) addresses that have been set for the computer system, gateway address information for accessing a gateway computer, and netmask information. The backup process backs the logical entity data to nonvolatile storage either in a removable media or to a computer network storage device that is connected to the computer system through a computer network. The recovery process reads the recorded logical entity data and first restores the data to the computer system in order to establish the logical entities that existed on the computer system prior to the failure. After the logical entities are established, file and directory data are recovered using the same commercial software used to backup such data.
摘要:
In a method form of the invention, a method for authorizing recording of a telephone communication includes determining if permission has been granted to record a telephone communication in a telephone call. A communication in the telephone call is recorded by a message-recording apparatus for a first caller's telephone responsive to receiving permission for the recording from a second caller's telephone. A key is associated with the recording. The key authorizes transferring the recording to another message-recording apparatus.