Abstract:
Methods, systems, and media to capture a redialing sequence and to redial a phone or similar device are disclosed. Embodiments may capture a dialing sequence of a caller and provide access to the dialing sequence, or redialing sequence, when the caller desires to re-establish a telephone connection. More specifically, embodiments recognize a significant pause in a dialing sequence by a caller and associate the pause with a line event such as a circuit event or an audible event, or a length of time. Some embodiments comprise resource managers and agents of the resource manager may monitor a line, and identify, interpret, and/or route the line events to an application server to capture a redialing sequence or replay the redialing sequence to re-establish a telephone connection. Other embodiments incorporate security measures to protect private data and error detection to determine when a redialing sequence is invalid.
Abstract:
Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.
Abstract:
A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Abstract:
A method for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, information contained in the second serialized byte stream is used to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.
Abstract:
A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may he situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.
Abstract:
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
Abstract:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.
Abstract:
A method, system, and program for time controlled network use are provided. A time controller counts an amount of time utilized by a particular user in accessing at least one web page via a network. Then, in response to the counted amount of time reaching at least one time limit for the particular user, the time controller initiates an action to control further accesses via the network by the particular user, such that an amount of time the particular user spends making network accesses is limited.
Abstract:
An apparatus, system and method of identifying a vehicle that may present safety threats to security areas are provided. When a vehicle is approaching a security zone, a request for identification (ID) is issued to the vehicle's on-board computer system (OBCS). Upon receiving the ID, a comparison is made between the ID of the vehicle and a list of suspect vehicle IDs. It there is a match, the vehicle is considered to be suspect and the OBCS is instructed to take control over the vehicle.
Abstract:
A method of extending telecommunications service, wherein the method is implemented in an extension application server. The extension application server is coupled for data communications to a customer data source and to a telecommunications server. The telecommunications server includes, installed and operating upon the telecommunications server, a multiplicity of telecommunications extension services. The method of extending telecommunications service includes receiving, in the extension application server, from a requesting telecommunications extension service in the telecommunications server, a telecommunications service request; preparing, in dependence upon information from the customer data source, a response to the telecommunications service request; and transmitting the response to the requesting telecommunications extension service.