摘要:
Peer-to-peer approaches to servicing subscriptions to information feeds are generally disclosed. Network nodes may exchange information about information feeds that they can provide to other nodes, and other information about information feeds to which they may be interested in subscribing. Any of a variety of techniques may then be applied to allow the nodes to negotiate for feeds to which they may be interested in subscribing. For example, each node may apply algorithms that service feed subscriptions of other nodes on a prioritized basis, prioritized for example based on which other nodes service subscriptions in return.
摘要:
A system and method for configuring access to an electronic mailbox based on limited configuration parameters received from a user. A database stores configuration conventions for a mail domain. A mailbox interface module receives configuration information from a user that is limited in the configuration parameters required for accessing the electronic mailbox. The module retrieves configuration conventions for the mail domain from the database and generates sets of potentially valid configuration parameters based on the retrieved configuration conventions and user supplied configuration information for accessing the mailbox.
摘要:
A communications system and method includes a mobile device having a mail user agent. A mobile office platform as a server includes a mail agent that is operative with the mail user agent for accessing one or more electronic mailboxes of the mail user agent using at least one protocol specific connector. The mobile office platform is operative for providing only the n-most recent mail headers of electronic messages to the mail user agent.
摘要:
A system and method for configuring access to an electronic mailbox based on limited configuration parameters received from a user. A database stores configuration conventions for a mail domain. A mailbox interface module receives configuration information from a user that is limited in the configuration parameters required for accessing the electronic mailbox. The module retrieves configuration conventions for the mail domain from the database and generates sets of potentially valid configuration parameters based on the retrieved configuration conventions and user supplied configuration information for accessing the mailbox.
摘要:
An email communications system for operating over a communications network may include an email server for sending and receiving electronic mail (email) messages via the communications network, where at least some of the received email messages include electronic file attachments. The system may further include a communications device comprising a display, a user input device, and a processor for communicating with the email server. The processor may also cooperate with the display and user input device for displaying an email folder hierarchy for user navigation of the received email messages, and for displaying an electronic file attachment folder hierarchy corresponding to the email folder hierarchy for navigating the electronic file attachments.
摘要:
A communications system may include at least one data storage device for storing messages for respective users, and a plurality of mobile wireless communications devices each associated with a respective user for accessing the messages stored on the at least one data storage device. Moreover, the communications system may further include an adaptive polling engine for polling the at least one data storage device for stored messages and providing the polled messages to mobile wireless communications devices of respective users. The adaptive polling engine may advantageously learn respective user usage patterns for each mobile wireless communications device, and change a respective rate of polling for each mobile wireless communications device based thereon.
摘要:
A system and method generates configurations used for accessing electronic mailboxes. A database stores the configuration conventions that are sets of e-mail expressions formed by symbols. A transformer module expands configuration conventions stored in the database to generate configurations based on user supplied context data.
摘要:
A communications system and method includes a mobile device having a mail user agent. A mobile office platform as a server includes a mail agent that is operative with the mail user agent for accessing one or more electronic mailboxes of the mail user agent using at least one protocol specific connector. The mobile office platform is operative for providing only the n-most recent mail headers of electronic messages to the mail user agent.
摘要:
A communications system may include a plurality of data storage devices each using at least one of a plurality of operating protocols. The system may also include a plurality of mobile wireless communications devices for accessing the data storage devices, and each may use at least one of the plurality of operating protocols. Furthermore, the system may also include a protocol interface device including a front-end proxy module for communicating with the plurality of mobile wireless communications devices using respective operating protocols, and a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols. More particularly, the front-end proxy module and the protocol engine module may communicate using a common interface protocol able to represent a desired number of protocol-supported elements for a desired operating protocol.
摘要:
Database system and methods are described for maintenance of B-Tree indexes, such as are commonly used in a relational database environment. "Load patterns" are monitored, for optimizing B-Tree node splitting, based on a particular load pattern's effect on B-Tree growth. More particularly, an "ascending insert" load pattern--that is, the insertion of data records for a multi-column table where the particular records to be inserted have a fixed value for the first column and a monotonically increasing value for the subsequent column(s)--can be identified and optimized. Methods are described for splitting the B-Tree nodes or pages, not at the half-way point, but instead exactly at the point of insertion, a position where the insert row would have gone into the page (had it not overflowed). Since splitting the index nodes or pages at the insertion point all the time would lead to regression in performance (particularly for random inserts), the methods of the present invention further include steps for testing conditions which should preferably exist before pages are split at insertion points.