摘要:
A method of analysing a network having a plurality of computing and infrastructure elements, some of which run agents that monitor one or more network phenomenon, the method comprising the steps of: disabling a selected infrastructure element on which it is not possible to run a monitoring agent; acquiring data from an element adjacent a disabled element; and generating, from the acquired data, a signature representative of the selected element being inoperative.
摘要:
A communication system includes a data base storing voice applications corresponding to programs executable by user equipment and user profiles. The voice applications are arranged to provide assistance in relation to the programs. A communication handler causes execution of a voice application from the data base responsive to user identification data.
摘要:
Methods are described for securing access to an electronic annotation provided on an object. The methods include the steps of providing the object with a plurality of memory tags, providing an electronic annotation on at least one of the memory tags, and defining a sequence in which the memory tags must be accessed in order to access the annotation. A corresponding object is also described.
摘要:
An information technology network comprises a plurality of printers and at least one computing entity which serves as a print manager. The print manager is adapted to process print jobs by distributing the ripping process between two or more different printers, and then returning disparately ripped data to a single printer for physical marking of documents with indicia in accordance with the ripped data.
摘要:
A multi-stage or process operation, such as the printing of a document from a data file in the form of a word processing document may be performed either by passing the document directly along a relatively fast network link to a printer 300, or by passing the document along a relatively slow link to a printer 200, where the document is ripped, and then passing the ripped data along a further relatively fast link to printer 300. To determine the optimum course of action in view of a policy demanding speed of printing the probable speed of each course of action is determined, and the course of action most likely to yield a result in conformity with the policy is selected.
摘要:
Apparatus for producing an electronic model of a communications network or system having at least one host and a plurality of nodes connected thereto, directly or otherwise, the apparatus comprising means for obtaining data relating to at least some of the nodes and/or the host and means for creating an electronic model of the system or network using the data. The apparatus comprises a trusted computer host for use in analysing the network. The trusted computer host comprises means for detecting nodes on the network. As nodes are detected, sampling probes are inserted at each such node wherever possible. The probes take measurements at the respective nodes and return the resultant data to the trusted computer host. For a case where it is not possible to insert a probe at a detected node, the trusted computer host comprises means for performing traffic analysis and obtaining a profile of behavior between that node and the network host. The data received from the probes and the traffic analysis data is used by model simulation means in the trusted computer host to create a model of the network.
摘要:
A method of operating a supercomputer having a plurality of computing elements each connected to a fast communications link is disclosed, the method comprising the steps of: scheduling specified elements to perform computing tasks in specified cycles of a computing operation; in the event of failure of a fast communications link in a given cycle, transferring state from a disabled element no longer able to communicate as a result of the failure to an idle element not scheduled to perform a task in the given cycle; operating the idle element to perform any uncompleted tasks scheduled for the disabled element remaining in the cycle.
摘要:
A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
摘要:
In carrying out a task that consumes data from a one-time pad, task inputs comprising at least first data and second data from the pad, are combined together to form an output from which the data used from the pad cannot be recovered without knowledge of at least one of the first and second data. The task concerned can be, for example, the encrypting of a message or the creating of an attribute verifier.
摘要:
Embodiments of the present invention relate to a communication system comprising means to process identification data associated with a communication; and means, responsive to the identification data, to access a data base to invoke at least one voice application arranged for providing assistance in relation to a respective fault; the data base having been configured to comprise the at least one voice application related to the respective fault.