Abstract:
A method for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, information contained in the second serialized byte stream is used to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.
Abstract:
A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may he situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.
Abstract:
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
Abstract:
A method of extending telecommunications service, wherein the method is implemented in an extension application server. The extension application server is coupled for data communications to a customer data source and to a telecommunications server. The telecommunications server includes, installed and operating upon the telecommunications server, a multiplicity of telecommunications extension services. The method of extending telecommunications service includes receiving, in the extension application server, from a requesting telecommunications extension service in the telecommunications server, a telecommunications service request; preparing, in dependence upon information from the customer data source, a response to the telecommunications service request; and transmitting the response to the requesting telecommunications extension service.
Abstract:
A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Abstract:
A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep).
Abstract:
An approach is provided to provide privacy control in a social network. In the approach, a first post is posted from a first user to a second user in the social network with the first post including private data belonging to the first user. Subsequent postings are monitored for the first user's private data. When the monitoring detects a second post of the first user's private data with the second post being from the second user to a third user in the social network, privacy controls are performed. The privacy controls mask the first user's private data from the third user so that the first user's private data inaccessible (not visible) to the third user.
Abstract:
Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.
Abstract:
While creating a document in a document editing application, a user may wish to locate more information on a particular topic to add more detail to the document. For example, a user begins creating an outline of topics for a research paper. Functionality can be implemented in a document editing application to dynamically perform searches on determined keywords, and to automatically associate search results with those keywords. In addition, searches are refined based on document context, and results can be categorized based on prior consumption of the information contained in each result. This allows a user to locate results best pertaining to topics in the document while being able to retrieve resources that have been useful in the past. Automatically performing searches and associating search results with text in a document gives a user instant access to relevant information which allows the user to spend less time researching.
Abstract:
Timing parameters that influence an install time interval for installing a product on computing machines in a test environment in accordance with an installation configuration option are identified. A test value of the timing parameter and a test value of the install time are determined for each of the computing machines. The test values of the timing parameter and the install time determined for the sample computing machines are analyzed to determine an install time calculation expression for the installation configuration option. For installation in accordance with the installation configuration option in a normal operating environment, a current value of each of the timing parameters of the predetermined install time calculation expression for the installation configuration option. The install time interval in the normal operating environment is estimated based on the current value of the timing parameters and the install time calculation expression.