Abstract:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.
Abstract:
A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.
Abstract:
A method and system for self-healing of routers within a distributed computer network. In response to a detected communication error at a local router over a primary communication path to a distant router, an alternate path is established. Thereafter, a diagnostic process is initiated in the distant router via the alternate path. Communication settings are then reconfigured in the distant router and communication via the primary communication path is tested. If communication is restored, the new communication settings are made permanent. If communications via the primary path are not restored, alternate communication settings are attempted in the local router and communication is tested again. If communication is re-established via the primary path, the new communication settings are made permanent.
Abstract:
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
Abstract:
Methods, systems, and media for providing a location-based service are disclosed. Embodiments include hardware and/or software for receiving from a user at a current location differential information indicating a difference between the current location and a particular, different location, determining the current location, determining the particular location based on the current location and the differential information, providing a location-based service based at least partially on the particular location, and displaying information to the user. Embodiments may also include determining directional information between the current location and the particular location. In one embodiment, the differential information comprises a distance between the current and particular locations.
Abstract:
Operating a publicly accessible purchasing system including receiving, on a receipt date, from a purchaser in a publicly accessible purchasing system, a deferred purchase request (“DPR”) for an item, granting to vendors review access to DPRs, receiving from a proposing vendor a proposal regarding a reviewed DPR, selecting a selected vendor, in dependence upon the proposal, and issuing a purchase order to the selected vendor for an item on a date subsequent to the receipt date.
Abstract:
Provided is an improved method for recording audio notes for easier later retrieval. The system monitors audio input and recommends recording of an extended audio segment based on detection of audio triggers. If the user accepts the recommendation, the use is provided with the opportunity to record a segment name. Segment names are recorded with links to the extended audio segment. Later review of segment names eases retrieval of extended audio segment with desired content.
Abstract:
Methods, systems, and media for acquiring ratings for points of interest associated with a particular location are disclosed. Embodiments include hardware and/or software for receiving from a user at a current location a request for rating information related to a particular location, receiving differential information, determining the current location, determining the particular location based on the current location and the differential information, transmitting the particular location to a wireless network to request the rating information, receiving rating information related to the particular location, and displaying at least part of the rating information to a user. Embodiments may also include receiving rating information relating to a particular location, wherein the rating information includes ratings for a plurality of points of interest. In one embodiment, the ratings for a plurality of points of interest are user ratings. In a further embodiment, differential information comprises a distance between the current and particular locations.
Abstract:
A method, apparatus, computer program product, and data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. The virtual machines share information such that a virtual machine may be added to the virtual machine cluster or such that a virtual machine may be removed from the virtual machine cluster as the virtual machine cluster continues to run. Load-balancing operations may be performed within the virtual machine cluster, and threads and objects may be moved within the virtual machine cluster.
Abstract:
A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object.