摘要:
A solution is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system includes a set of security applications (such as firewalls), which are adapted to control communications of the entities. A corresponding method starts with the step of determining a target configuration of the security applications for allowing execution of the software product on the entities. A software package (or more), being adapted to enforce the software product and the target configuration, is then built. The method continues by distributing the software package in the system, so as to cause the application of the software package for enforcing the software product on each entity and the target configuration of each security application.
摘要:
A solution (A1-A16) is proposed for distributing a software product to a set of data processing entities (such as endpoints) in a data processing system; the system includes a set of security applications (such as firewalls), which are adapted to control communications of the entities. A corresponding method starts with the step of determining a target configuration of the security applications for allowing execution of the software product on the entities. A software package (or more), being adapted to enforce the software product and the target configuration, is then built (A11). The method continues by distributing (A12-A16) the software package in the system, so as to cause the application of the software package for enforcing the software product on each entity and the target configuration of each security application.
摘要:
Controlling electrical power consumption of a display monitor screen involves grouping screen pixels into different resolution cells, detecting display of one or more windows on the screen, and selectively controlling the cells by providing power only to the pixels in cells corresponding to one or more windows of interest to the user, and reducing power to pixels in remaining cells.
摘要:
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
摘要:
An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading.
摘要:
Localizing a software product is improved. A plurality of attributes of a plurality of interface elements according to a specified type of user interface are retrieved. Responsive to user input, one or more countries in which the software product is to be localized are specified. An interface element for the user interface is selected. From the attributes of the selected interface element, it is determined whether the interface element is consistent with the specified countries. If not, an alert on a computer display is displayed, in the event the selected interface element is not consistent with the countries specified by the user. The invention also calculates a cost of localizing the selected interface element, wherein the projected cost of localizing the user interface is incremented with the cost of localizing the selected interface element. An alert for the projected cost of localizing the user interface is displayed on the computer display.
摘要:
A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party. A reporting notification message is further transmitted by the telecommunications network to the calling party to let the calling party know that the called party has been notified of the incoming call.
摘要:
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
摘要:
A method is presented for managing user preferences upon reading a multimedia article. The method may include receiving a request to read the multimedia article, and reading a RFID tag coupled to the multimedia article. The RFID tag may store user preference information for reading the multimedia article. The user preference information may then be applied, and the multimedia article may be read in accordance with the user preference information.
摘要:
A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.