摘要:
A method for conferencing may include monitoring a status of participants in a conference and recording the conference in response to at least one participant being disconnected or exiting the conference. Another embodiment of the present invention may also include transmitting a re-invite signal to any participant that is disconnected or exits the conference in response to the participant being reconnectable or transmitting a request to rejoin the conference. A further embodiment of the present invention may include replaying a recording of the conference from a disconnect or exit time to a present time for each participant, that is involuntarily disconnected or exits the conference and communicates an indication of an intent to return, in response to a rejoining participant rejoining the conference.
摘要:
The present invention provides a method, system, service, and computer program product for identifying incorrect domain name to IP address mappings. The method comprises: providing a domain name and a valid IP address for the domain name to a plurality of nodes; and at each node: performing a local domain name system (DNS) lookup for the domain name; determining if an IP address returned by the local DNS lookup comprises the valid IP address for the domain name; and providing a notification that an invalid IP address was returned for the domain name if the IP address returned by the local DNS lookup does not comprise the valid IP address for the domain name.
摘要:
A method, system and apparatus for tagging the seen/not-seen status of an instant message. A method for tagging a seen/not-seen status of a real time message can include receiving a real time message and presenting the real time message through a real time communications client disposed in a host client computing device. The environmental characteristics of the host client computing device can be inspected to determine whether the real time message has likely been reviewed. As such, if it is determined that the real time message has likely been reviewed based upon the inspected environmental characteristics, the real time message can be tagged as seen.
摘要:
An interface for managing incremental data storage includes a write function that appends an entry to an incremental log, a read function that retrieves a most recent log entry corresponding to a block address, and a snapshot function that automatically partitions the incremental log into an additional volume. The interface may also include a policy assignment function that associates specified policies with explicitly or implicitly specified resources, a read entry function that retrieves sequential entries from the incremental log, and a compact volume function. The provided functions and associated apparatus, method, and system, facilitate management of incremental data including snapshot, remote copy, data compaction, policy management, data restoration, and other operations on data storage devices and systems.
摘要:
An interface for managing incremental data storage includes a write function that appends an entry to an incremental log, a read function that retrieves a most recent log entry corresponding to a block address, and a snapshot function that automatically partitions the incremental log into an additional volume. The interface may also include a policy assignment function that associates specified policies with explicitly or implicitly specified resources, a read entry function that retrieves sequential entries from the incremental log, and a compact volume function. The provided functions and associated apparatus, method, and system, facilitate management of incremental data including snapshot, remote copy, data compaction, policy management, data restoration, and other operations on data storage devices and systems.
摘要:
A method to protect a file system form a viral infection may include flagging the program in response to opening a local file on a local file system to perform a read operation and opening a shared file on shared or network file system to perform a write or append operation on the local file. The program may also be flagged in response to the program reading or opening itself and the program attempting to write or append itself or any content to the shared file on the shared or network file system or to write or append itself or any content to the local file on the local file system. The program may also be flagged in response to the program attempting to write or append the local file to the shared or network file system and to preserve a filename of the local file in the shared or network file system. The program may also be flagged in response to the program attempting to write or append a remote file to the local file system.
摘要:
A technique is provided to organize different virus signatures into anti-virus sets to minimize the impact on processor utilization due to the scanning of computer viruses. All of the virus signatures assigned to an anti-virus set share a common characteristic. The defined anti-virus sets are then associated with an executing agent so that whenever the executing agent's target file is accessed, the target file is scanned with virus signatures stored in the previously assigned anti-virus set to determine if the target file is contaminated with a virus.