摘要:
A method, apparatus, and system are disclosed for reassigning a network address. A detection module detects a routing table change for a host. The host is in communication with a least one network. A client is also in communication with the host over a network interface using a first address. A generation module generates a second address for the client. The second address does not compete with other addresses on the at least one network. An interface module disables the network interface to the client. The interface module then enables the network interface between the client and the host. A communication module receives a request for a new address from the client. The communication module assigns the second address to the client.
摘要:
A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position.
摘要:
A method for increasing the capacity of a connection table in a firewall accelerator by means of mapping packets in one session with some common security actions into one table entry. For each of five Network Address Translation (NAT) configurations, a hash function is specified. The hash function takes into account which of four possible arrival types a packet at a firewall accelerator may have. When different arrival types of packets in the same session are processed, two or more arrival types may have the same hash value.
摘要:
A method for increasing the capacity of a connection table in a firewall accelerator by means of mapping packets in one session with some common security actions into one table entry. For each of five Network Address Translation (NAT) configurations, a hash function is specified. The hash function takes into account which of four possible arrival types a packet at a firewall accelerator may have. When different arrival types of packets in the same session are processed, two or more arrival types may have the same hash value.
摘要:
An apparatus, system, and method are disclosed for wireless presyncing of data. A scan module scans a partial email stored on a mobile electronic device. The partial email comprises subject text, address data, and a specified quantity of message text. A complete version of the partial email resides on a server. The server is in communication with the mobile electronic device over a wireless network. A download module determines if the partial email satisfies a priority policy. In addition, the download module downloads the complete email to the mobile electronic device if the partial email satisfies the priority policy.
摘要:
A method and apparatus are disclosed for modifying a transition to an altered power state of an electronic device based on accelerometer output. The apparatus includes an electronic device having a display and an accelerometer. The apparatus also includes a determination module, and a modification module. The determination module determines an in-use condition of the electronic device based on accelerometer output for the electronic device. The modification module modifies a transition to an altered power state of the electronic device in response to the determination module determining the in-use condition.
摘要:
An apparatus, system, and method are disclosed for URL sharing. A link module links a plurality of user browsing sessions in a URL sharing session. A select module selects a user browsing session. A communication module communicates a URL for the selected user browsing session to each linked user browsing session. A display module displays the URL and corresponding web page of the selected user browsing session at each user browsing session.
摘要:
A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position.
摘要:
An apparatus and method are disclosed for variable authentication requirements. The apparatus includes an operating status module identifying a change in an operating status of a device and maintaining a history of operating statuses, and an access control module comparing a current operating status with a previous operating status. The apparatus also includes a profile module maintaining a trust indicator for each operating status. The access control module determines a level of authentication required to unlock the device in response to the trust indicator associated with the current operating status. The method includes identifying a change in an operating status of a device and maintaining a history of operating statuses, and comparing a current operating status with a previous operating status. The method also includes maintaining a trust indicator for each operating status, and determining a level of authentication required to unlock the device in response to the trust indicator associated with the current operating status.
摘要:
While an information handling device is in a reduced power state, the information handling device transitions from the reduced power state to a higher power state in response to receiving a message over an established wireless network connection that maintains a presence on a wireless network. In turn, the information handling device processes the message accordingly in the higher power state.