Abstract:
A method for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, information contained in the second serialized byte stream is used to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.
Abstract:
A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may he situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.
Abstract:
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
Abstract:
A method of extending telecommunications service, wherein the method is implemented in an extension application server. The extension application server is coupled for data communications to a customer data source and to a telecommunications server. The telecommunications server includes, installed and operating upon the telecommunications server, a multiplicity of telecommunications extension services. The method of extending telecommunications service includes receiving, in the extension application server, from a requesting telecommunications extension service in the telecommunications server, a telecommunications service request; preparing, in dependence upon information from the customer data source, a response to the telecommunications service request; and transmitting the response to the requesting telecommunications extension service.
Abstract:
A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Abstract:
A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep).
Abstract:
Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.
Abstract:
A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep).
Abstract:
A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Abstract:
A system and method for dumping all or some exceptions in an object-oriented environment. The invention includes a Java virtual machine comprising: a system for enabling a verbose exceptions mode; and a system for dumping exceptions that occur during the running of the executable code when the verbose exceptions mode is enabled.