Abstract:
A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.
Abstract:
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
Abstract:
Methods, systems, and media for providing a location-based service are disclosed. Embodiments include hardware and/or software for receiving from a user at a current location differential information indicating a difference between the current location and a particular, different location, determining the current location, determining the particular location based on the current location and the differential information, providing a location-based service based at least partially on the particular location, and displaying information to the user. Embodiments may also include determining directional information between the current location and the particular location. In one embodiment, the differential information comprises a distance between the current and particular locations.
Abstract:
A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.
Abstract:
A method, apparatus, computer program product, and data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. The virtual machines share information such that a virtual machine may be added to the virtual machine cluster or such that a virtual machine may be removed from the virtual machine cluster as the virtual machine cluster continues to run. Load-balancing operations may be performed within the virtual machine cluster, and threads and objects may be moved within the virtual machine cluster.
Abstract:
A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.
Abstract:
A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may be situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone.
Abstract:
A confidential content search engine system and method are provided. With the system and method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Abstract:
A method, computer program product, and data processing system for allocating memory for arrays in a fragmented heap is disclosed. In a preferred embodiment, a JAVA virtual machine (JVM) is enhanced to organize each array as an array of arrays (or, internally, an array of pointers to arrays, since JAVA arrays are reference types). The individual “inner arrays” within the “outer array” are segments that collectively simulate a larger “virtual array.” Because all accesses and allocations of these arrays are performed by the JAVA virtual machine, the array segmentation is entirely transparent to the programmer, at least at the JAVA-language level. Support for native methods is provided by making relatively minor modifications to some of the array manipulation functions of the JAVA Native Interface (JNI), so as to minimize the impact of the segmentation scheme on native code.
Abstract:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.