摘要:
A portable phone a portable phone is equipped with a personal area network (PAN) detection mechanism to detect all portable phones and electronic identifiers (e.g., key fobs) in its PAN. A buddy list is included in the portable phone. If an electronic identifier is detected, such as from a key fob, but its corresponding portable phone is not, a proxy signal mechanism signals to the wireless telephone network that the phone may receive calls for a different phone. In response, the wireless telephone network routes calls for the different phone to the proxy phone instead. In this manner a phone may change functions automatically as devices enter and leave the PAN.
摘要:
In an embodiment, an instant message is received that includes data, a privacy indication, and an override indication. In an embodiment, if the privacy indication specifies that the data is non-private, then the data is presented. But, if the privacy indication specifies that the data is private, then a privacy notice is presented and the data is hidden until an acknowledgment of the privacy notice is received. The privacy notice may include a prompt for the acknowledgment. In an embodiment, if the privacy indication specifies that the data is private and the override indication allows the privacy indication to be overridden, the data is presented. In another embodiment, if the privacy indication specifies that the data is private, the override indication allows the privacy indication to be overridden, and a time period since a user interface device received input is less than a threshold amount of time, then the data is presented.
摘要:
An apparatus, program product and method utilize metadata collected for a lock in a computer program to determine an optimal lock acquisition strategy for the lock. The metadata is typically collected via profiling of the computer program to determine a wait characteristic for the lock in the particular runtime environment in which the computer program executes, and the metadata is used to select from among different lock access implementations to be used to attempt to acquire the lock, often enabling an optimum lock access implementation to be selected for a lock.
摘要:
A method, apparatus, and program product for tiered, multi-state intelligent detection and enforcement of security on a pervasive device is provided. The method/apparatus first monitors the pervasive device for the presence of a security identifier, then establishes a current security level chosen from a plurality of security levels for the pervasive device based on the presence of the security identifier.
摘要:
Methods, computer program products and systems for displaying an advertising image in a Web browser window when the window becomes deactivated or idle for a period of time. The image may replace the Web content previously loaded and displayed in the Web browser window. However, it is desirable for the Web content to remain loaded in memory so that the Web content may be quickly displayed after reactivating the window or detecting user interaction with the window. However, the advertisement preferably remains for a brief delay period after either reactivation or detection of user interaction in order to enhance advertising effectiveness and provide the user with a brief opportunity to read the advertisement, click on a hyperlink for more information, or hold the image for further viewing. After the delay period, the Web content preferably will automatically return to be displayed in the client area of the Web browser window.
摘要:
In an embodiment, a send command is received that specifies a reply email, which is a reply to a source email. If the source email includes an answer-required field associated with a question, a determination is made whether the reply email includes an answer associated with the answer-required field. If the reply email includes the answer, then the reply email is sent to a source of the source email, but if the reply email does not include the answer, the reply email is blocked from being sent. In an embodiment, the source email is embedded in the reply email as a replied-to email, the source email includes reply data that is separate from the replied-to email, and the reply data includes the answer and a pointer that identifies the answer-required field. In another embodiment, the answer is embedded in the answer-required field in the replied-to email. In this way, answers may be required to email questions.
摘要:
A method, apparatus, and program product for tiered, multi-state intelligent detection and enforcement of security on a pervasive device is provided. The method/apparatus first monitors the pervasive device for the presence of a security identifier, then establishes a current security level chosen from a plurality of security levels for the pervasive device based on the presence of the security identifier.
摘要:
In an embodiment, an instant message is received that includes data, a privacy indication, and an override indication. In an embodiment, if the privacy indication specifies that the data is non-private, then the data is presented. But, if the privacy indication specifies that the data is private, then a privacy notice is presented and the data is hidden until an acknowledgment of the privacy notice is received. The privacy notice may include a prompt for the acknowledgment. In an embodiment, if the privacy indication specifies that the data is private and the override indication allows the privacy indication to be overridden, the data is presented. In another embodiment, if the privacy indication specifies that the data is private, the override indication allows the privacy indication to be overridden, and a time period since a user interface device received input is less than a threshold amount of time, then the data is presented.
摘要:
An apparatus, program product and method improve management of available computing resources by adjusting use of the resource over a first interval according to actual use of the resource during a second interval. This feature enables a computing resource to exceed its normal limits during the first interval of operation. Use during the second interval may be limited to balance out the burst, or excessive resource usage of the first interval.
摘要:
A portable phone a portable phone is equipped with a personal area network (PAN) detection mechanism to detect all portable phones and electronic identifiers (e.g., key fobs) in its PAN. A buddy list is included in the portable phone. If an electronic identifier is detected, such as from a key fob, but its corresponding portable phone is not, a proxy signal mechanism signals to the wireless telephone network that the phone may receive calls for a different phone. In response, the wireless telephone network routes calls for the different phone to the proxy phone instead. In this manner a phone may change functions automatically as devices enter and leave the PAN.