摘要:
An approach is provided to establish, over a network adapter, network sessions with various client computer systems. Requests for a webpage are received at the network adapter from the client computer systems. The requested webpage is retrieved from a storage area. Multiple timeout intervals are initialized and stored in a memory area, wherein each of the plurality timeout intervals corresponds to one of the client computer systems. The timeout intervals that are initialized are different for at least some of the client computer systems. The requested webpage is returned to the client computer systems. When a timeout interval elapses for any of the client computer systems, the system terminates the session that was established with the client computer system.
摘要:
An approach is provided to establish, over a network adapter, network sessions with various client computer systems. Requests for a webpage are received at the network adapter from the client computer systems. The requested webpage is retrieved from a storage area. Multiple timeout intervals are initialized and stored in a memory area, wherein each of the plurality timeout intervals corresponds to one of the client computer systems. The timeout intervals that are initialized are different for at least some of the client computer systems. The requested webpage is returned to the client computer systems. When a timeout interval elapses for any of the client computer systems, the system terminates the session that was established with the client computer system.
摘要:
A user alias for concealing a user's user identification is provided. When signing-on, the user inputs a user alias to a log-in shell. The log-in shell verifies the validity of the user alias. The log-in shell then obtains a user identification associated with the valid user alias.
摘要:
A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset.
摘要:
A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset.
摘要:
A method for consistent version of multiple information items is provided. The method includes receiving a conditional request to copy a version of multiple information items at a condition fulfillment point of time that is associated with a fulfillment of a condition of the conditional request. Then determining that the condition is fulfilled, and participating in generating a condition fulfillment point in time version of the multiple information items.
摘要:
A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
摘要:
A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction.
摘要:
A method for re-establishing a backup relationship between first and second volumes associated with one or more storage media in a data storage system is provided. The method comprises storing first information for preserving the backup relationship, in response to or in advance of receiving a request to terminate the backup relationship; recording changes to the first or second volumes that occur subsequent to terminating the backup relationship; and re-establishing the backup relationship between the first and second volumes according to the first information such that the first and second volumes are synchronized by merging the recorded changes with the first or second volumes.
摘要:
Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied.