摘要:
A computer implemented method, apparatus and computer usable program code for processing e-mail messages. In response to a selection of a particular e-mail message from a sender as being undesired, a message identifier is stored in the e-mail message, wherein the message identifier uniquely identifies the e-mail message and any subsequent replies based on the e-mail message. Further, in response to receiving another e-mail message, the another e-mail message is processed using a policy to filter out e-mail messages containing the message identifier, wherein subsequent e-mail messages from the sender without the message identifier are unfiltered.
摘要:
A method, apparatus, and computer instructions for providing updated time at a mobile data processing system. An area code is determined from a call made to a server from the mobile data processing system. A time zone is determined using the area code to form an identified time zone; and an adjusted time based on the identified time zone is sent to the mobile data processing system.
摘要:
A display interface at a sending terminal including the conventional means enabling the sender of an electronic mail document to specify users to receive the document; but, in addition, provides means enabling the sender of the electronic mail document to specify users not receive the document. Then, users specified not to receive the electronic mail document are precluded from receiving the document. Thus, the sender is enabled to specify users not to receive a copy, forward or print of the document. A display interface is also provided at a receiving terminal that includes means enabling the receiver of an electronic mail document to further specify users to be forwarded the document; and also means enabling the receiver of the electronic mail document to specify users not to be forwarded the document. Thus, the means for precluding users specified not to receive the electronic mail document precludes those specified not to receive in the sender's E-Mail or specified not to receive by the recipient of a forwarded E-Mail document.
摘要:
A method and apparatus for providing hardware aware logical volume mirrors are provided. In particular, the an improved logical volume system and method are provided in which a mirroring device driver is provided that selects a physical storage device from which data is to be read based on information obtained regarding the physical devices used in the mirror of the data. The mirroring device driver may be part of a logical volume device driver (LVDD), such that a modified LVDD is provided, or may work in concert with the logical volume device driver to achieve the purposes of the present invention. The information regarding the physical devices used in the mirror may include characteristic data of physical storage devices (e.g., whether a write cache is used, whether a read-ahead cache is used, RPM speed, connector type, etc.) and may also include operational history data. One or more rules are applied to this information to determine which physical storage device is an optimum storage device from which data is to be accessed.
摘要:
A method, apparatus, and computer instructions for modifying a document. A determination is made as to whether a portion of the selected content is protected from deletion. This determination is made in response to receiving a user input to delete selected content within the document. Deletion of the portion of the selected content is prevented in response to the portion of the selected content being protected. In some cases, the portion may be deleted after receiving a second user input confirming the deletion.
摘要:
A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.
摘要:
A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
摘要:
A computer implemented method, apparatus, and computer usable program code for screening data packets. A determination is made as to whether a signature of a trusted security element is present in a header of the data packet in response to receiving a data packet. The signature indicates that a previous security action has been performed on the data packet. A security action is performed on the data packet based on the previous security action performed on the data packet in response to the signature of the trusted security element being present.
摘要:
A system, apparatus and method of performing e-mail message searches across multiple mailboxes are provided. The system, apparatus and method perform the e-mail message searches across multiple mailboxes by launching a search feature of a currently accessed mailbox where at least one search term for a search is entered. Then, if multiple mailboxes are to be simultaneously searched, each mailbox is identified. The mailboxes are identified by their address, the username and password that are used to access them. Each mailbox is then accessed using the provided address, username and password. After accessing the mailbox, its search feature is launched and the search criteria passed to each launched search feature in order to perform the search. The mailboxes may be further identified by a particular name.
摘要:
A computer implemented method, a computer program product, and a data processing system for presenting search results in the context of a table-of-contents. A keyword search term and a stratum-level are identified. An occurrence of the keyword search term is then identified from a searched document. The occurrence of the keyword search term is then presented within a context of a table-of-contents of the searched document, wherein the occurrence of the keyword search term is presented according to the indicated stratum-level.