摘要:
A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party. A reporting notification message is further transmitted by the telecommunications network to the calling party to let the calling party know that the called party has been notified of the incoming call.
摘要:
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
摘要:
A method and a corresponding system and computer-usable medium for discovering software products on a plurality of one or more computers. The discovering method, system and/or computer-usable medium can populate a software catalogue without the manual intervention of an administrator. Such an approach reduces the cost of producing and maintaining a comprehensive knowledge base (e.g., the catalogue), which contains definitions of software products and the related signature. Signature definitions combine information obtained by the data gathering process and information contained in the registries. This combination allows the creation of a robust signature which reduces to a great extent the possibilities of both “false positive” and “false negative” results.
摘要:
A method is presented for managing user preferences upon reading a multimedia article. The method may include receiving a request to read the multimedia article, and reading a RFID tag coupled to the multimedia article. The RFID tag may store user preference information for reading the multimedia article. The user preference information may then be applied, and the multimedia article may be read in accordance with the user preference information.
摘要:
A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.
摘要:
A method is presented for deploying a component onto a production computer system. The method may include identifying one or more alterations associated with deployment of a first application onto a first computer system, where the first application on the first computer system is substantially similar to a second application on a second computer system. Embodiments may further include generating a command and an object corresponding to the alteration, where the command and the object are generated as a function of the first application. The alteration may then be replicated on the second application of the second computer system by executing the command and the object on the second computer system.
摘要:
A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information.
摘要:
An incompatibility problem during a virtual environment migration from a first host to a second host can be addressed by changing a configuration of the virtual environment and/or by migrating the virtual environment to a host other than the second host. A migration advisor module is configured to take such action automatically upon detection of the incompatibility problem. Alternatively, the migration advisor module may take such action with assistance and/or input from an operator. The migration advisor module can change the configuration of the virtual environment by removing unnecessary components of the virtual environment and causing the reconfigured virtual environment to be migrated to the second host. Alternatively, the migration advisor module can cause the virtual environment to be migrated to a third host with sufficient physical system resources to meet the requirements of the virtual environment.
摘要:
A software distribution method and system are provided. In a software distribution application, packages including instructions specifying the actions to be carried out on each target computer for installing or removing selected software products are prepared in a central site. Each package is transmitted to the target computer, and the corresponding instructions are interpreted so as to enforce the desired software products meeting the current configuration of the target computer. The configuration of the target computer is monitored to detect any hardware upgrade. In response thereto, the target computer generates a list of actions for removing software products not meeting the new configuration any longer and a list of action for installing software products now meeting the new configuration. These lists are transmitted to the central site, and they trigger the building of a delta package. The delta package is then distributed to the target computer.
摘要:
A solution for distributing software products in a data processing system is disclosed. A set of models of each software product is to be distributed (for example, of the UML type) is provided; each model includes an indication of relationships among a plurality of available logical items (representing functions provided by the software product, such as use cases) and a plurality of available distribution artifacts (used to distribute the software product). A set of logical items is then selected among the available ones. The process continues by identifying a set of distribution artifacts required to implement the selected logical items (among the available distribution artifacts); the required distribution artifacts are identified according to the corresponding relationships in the models. A software package is built including the required distribution artifacts. The software package is then distributed to a set of data processing entities of the system (i.e., endpoints), so as to cause each entity to install the required distribution artifacts on the entity.