Abstract:
Systems, methods and computer program products for identifying symbolic links in network file systems are provided herein. An absolute path may be determined at a network file server. This may include determining a complete client path from an initial client path and combining the complete client path with a server export path. Once the absolute path is determined, it may be traversed using a file descriptor of each file in the absolute path to identify a symbolic link.
Abstract:
In some embodiments, a processor-based system may include at least one processor, at least one memory coupled to the at least one processor, a boot block stored at a first memory location, a capsule update stored at a second memory location, a startup authenticated code module to ensure the integrity of the boot block upon a restart of the processor-based system, code which is executable by the processor-based system to cause the processor-based system to validate the boot block with the startup authenticated code module upon the restart of the processor-based system, and, if the boot block is successfully validated, to validate the capsule update for the processor-based system with the startup authenticated code module. Other embodiments are disclosed and claimed.
Abstract:
A system and a method are disclosed for establishing a baseline and the corresponding bands of data for alarming, etc. Historical raw data are aggregated and grouped. For example, the data may be and hourly grouped as 168 groups of data in a weekly frame. Clusters of the groups of data are then formed based on dynamic data window by analyzing statistical similarity among the 168 groups of data. Data in each cluster of groups, originated from the raw data at specific hour(s) of day on specific day(s) of week, are used as historical data to predict a baseline and the envelopes at these associated hour(s) and day(s). Generating a baseline includes determining a mapping function, which transforms data in a cluster to become normal or nearly normal. A mean and standard deviation of the transformed data are calculated. Envelopes are determined using the mean and the standard deviation. An inverse transformation function is uniquely derived. The mean and the envelopes are inversely transformed using the inverse function. This operationally decides a baseline and the corresponding bands for every weekly time frame hour.
Abstract:
A method for processing e-mails includes receiving a plurality of e-mails. For each e-mail in the plurality of e-mails, a feature representation is generated for an e-mail based on a set of noun phrases associated with the e-mail. A set of topics associated with the plurality of e-mails is generated based on the feature representation for each e-mail. Sentence structure associated with the e-mail and parts of speech associated with the e-mail may be determined. The parts of speech, including a set of noun phrases associated with the e-mail, may be used to generate the feature representation for the e-mail.
Abstract:
The invention provides a system and method for automatically displaying a user's logged-in status across an Internet based network of affiliated Web sites via a visual indicator such as a toolbar to help the user to be certain about his logged-in status when he stays with one or switches from one to another affiliated Web site.
Abstract:
A graphical editor displays graphical representations of underlying data items in a distribution of information-bearing states across a bounded region of a display. One or more of the data items are selected as belonging to a context of a user task or operation. The information-bearing states are redistributed in the bounded region of the display so that an amount of information sufficient to the task is provided through the graphical representations of the data items in the context and any space in the bounded region of the display needed to display such information is acquired by a decrease in the amount of information provided by the data items outside the context.
Abstract:
The invention provides for techniques to process and produce email documents. The techniques provide for organizing a first plurality of email documents into a plurality of document groups, reviewing a document group from the plurality of document groups, and associating a review content with the document group. The techniques provide for ways to propagate the review content to one or more email documents associated with the document group and producing a second plurality of email documents. The techniques provide for annotating one or more email documents in accordance with the review content. Depending on the embodiment, review content may include text, graphics, audio, tag, and multimedia information. Produced documents can be searched and browsed in accordance with information in the review content. Email documents can be grouped by information in meta information and/or header information associated with the email documents into various groups, including threads or conversations, for example.
Abstract:
In some embodiments, a processor-based system may include at least one processor, at least one memory coupled to the at least one processor, a boot block stored at a first memory location, a capsule update stored at a second memory location, a startup authenticated code module to ensure the integrity of the boot block upon a restart of the processor-based system, code which is executable by the processor-based system to cause the processor-based system to validate the boot block with the startup authenticated code module upon the restart of the processor-based system, and, if the boot block is successfully validated, to validate the capsule update for the processor-based system with the startup authenticated code module. Other embodiments are disclosed and claimed.
Abstract:
A firmware assisted error handling scheme in a computer system has been disclosed. In one embodiment, firmware is used to access one or more hardware-specific error registers within the computer system in response to a system management interrupt (SMI) trap. Using the firmware, an error record in a common error record format is constructed. The error record is made available to an operating system (OS) within the computer system.
Abstract:
A virtual operator and method for rating a charge for connecting to a network from a virtual operator and facilitating analysis of profitability of using a network. The virtual operator receives a Charge Detail Record in real time from a network the virtual operator is using for a service. The virtual operator calculates the current utilization of the network's resources using the received CDR. The virtual operator calculates a rate for connecting to the network, the rate corresponding to the virtual operator's current utilization of the network's resources. The virtual operator further calculates a cost for providing the service, the revenue for providing the service, and the profit based on the difference between the revenue for providing the service and the cost for providing the service.