摘要:
A mechanism for reducing electronic mail (email) sizes by using a local archive of email components is provided. The mechanism receives the email file, the email file specifying a sender identifier of a sender of the email file, a recipient identifier of a recipient of the email file, and common component information for a common component included in the email file, the common component being a component of the email file that is common amongst a plurality of email files sent from the sender. The mechanism identifies the common component of the email file and determines whether to remove the common component from the email file before forwarding the email file to the recipient based on at least the sender identifier. Based on the determination, the common component is either removed or kept in the email file that is subsequently transmitted to the recipient computer.
摘要:
A method and system for dynamically sharing performance information among multiple computing nodes. One implementation involves dynamically obtaining performance information from deployments of an information technology (IT) product/solution at said computing nodes, and transmitting the obtained performance information to a server over a communication network for storing the obtained performance information in a knowledge database. The server operates to dynamically determine new configuration information based on the information in the database, store the new configuration in the database, and provide the new configuration information to said deployments by transmitting the new configuration information over the network.
摘要:
A method and a corresponding apparatus for managing software licenses on a plurality of computer are proposed. The present method and system aim at populating a software catalog without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalog) which contains definitions of software products and the related use signature. Information about software products and their related signature is obtained through a process which gathers information with an automated process which takes an initial snapshot of all processes running on a monitored data processing system and makes a comparison with a final snapshot after execution of a software product has been started. A “use signature” of the software product is then generated according to the difference.
摘要:
A method and system of authenticating submissions from a client to a server within a secure session as established for example by entry of username and password data, wherein the session is composed of a number of transactions each of which is itself additionally authenticated, for example by submission of biometric data. Thus each transaction is authenticated both individually and at a session level. In an embodiment the session level authentication may comprise submission of a pin code at am ATM, whilst every subsequent request or instruction from the user could be accompanied by for example fingerprint data from a scanner integrated in the ATM keypad. A session comprises a number of transactions, each of which is individually authenticated. Preferably a session level authentication is carried out at the beginning of a session, from which authority for the following transaction authentications is derived. This may be achieved by comparing transaction authentication information with the authorised session initiating authentication data. Each transaction can be provided with authentication data by recourse to biometric measurements of a user.
摘要:
A solution is proposed for monitoring usage of bundles in the OSGi environment. For this purpose, an event notification interface of the OSGi environment is exploited. Particularly, each event relating to a change of state of a bundle (such as its addition, removal, starting and stopping) is detected by an auxiliary bundle—which previously subscribed to the event notification interface. The auxiliary bundle can then forward the detected events to a licensing agent, which identifies the bundle by means of a software catalog. In this way, the desired result is achieved without requiring any instrumentation of the bundles to be monitored.
摘要:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.
摘要:
A solution is proposed for managing collaborative working sessions (for example, meetings). A corresponding method (600) includes the following steps under the control of a data processing system (420). At first, a set of working sessions is scheduled (606-612); each working session is to be attended by a plurality of participants; moreover, the working sessions require a set of common resources (for example, a meeting room). A communication address or more (for example, a mobile telephone number) is associated (615) with each participant. The method continues by signaling (618-630) an availability of the resources (for example, by dialing a service number and entering an identifier of a current meeting that is starting or an identifier of a preceding meeting that has just ended). In response thereto, the communication address associated with each participant to a current working session (being the first scheduled one still to be held) is retrieved (633). It is then possible to send (636) a message (indicative of a holding of the current working session) to the communication address associated with each participant to the current working session.
摘要:
A solution for managing a software image being stored in a plurality of physical blocks of a storage system comprises monitoring each access to the physical blocks, calculating a predicted sequence of access to the physical blocks according to the monitored accesses, and reorganizing the physical blocks according to the predicted sequence. The monitoring may be performed as the physical blocks are accessed during the booting of virtual images on the software image.
摘要:
In an embodiment for deploying a new virtual appliance (225) on a data processing center (100) structure information of the new virtual appliance is determined (509-521). The structure information of the new virtual appliance includes an indication of the new virtual machines and an indication of the new software programs of each new virtual machine. Configuration information indicative of a current configuration of the data processing center is retrieved (527). License condition information indicative of license conditions applicable to the data processing center is also retrieved (530-533). A deployment scheme of the virtual appliance on the data processing center is then determined (539,548). The determination of the deployment scheme is performed by optimizing a cost function based on the license condition information, the configuration information and the structure information, and the new virtual appliance may be deployed (551) according to the deployment scheme.
摘要:
In an embodiment for deploying a new virtual appliance (225) on a data processing center (100) structure information of the new virtual appliance is determined (509-521). The structure information of the new virtual appliance includes an indication of the new virtual machines and an indication of the new software programs of each new virtual machine. Configuration information indicative of a current configuration of the data processing center is retrieved (527). License condition information indicative of license conditions applicable to the data processing center is also retrieved (530-533). A deployment scheme of the virtual appliance on the data processing center is then determined (539,548). The determination of the deployment scheme is performed by optimizing a cost function based on the license condition information, the configuration information and the structure information, and the new virtual appliance may be deployed (551) according to the deployment scheme.