摘要:
The present invention provides a method, system, and computer program product for preventing a browser from loading content from undesirable sources. A method in accordance with an embodiment of the present invention includes: selecting an area of a web page containing undesirable content; substituting an alternate Internet Protocol (IP) address for a hostname of a website that provided the undesirable content based on a profile; and redisplaying the web page with content from the alternate IP address displayed in the selected area of the web page.
摘要:
A mechanism is provided for maintaining some global windowing context to parent/child relationships. When a current window spawns a child window, a data structure stores the parent/child relationship within the window hierarchy. A cascading menu indicates to the user the contextual relationship of a current window to related windows. The user may then navigate among related windows using the cascading menu.
摘要:
Embodiments of the present invention provide a method, system and computer program product for cross-cutting event correlation in an enterprise computing monitoring and management system. An enterprise computing monitoring and management system can include a hierarchy of nodes, where several of the nodes are each coupled to a corresponding embedded correlation engine and an event bus. The system further can include a root node among the nodes. The root node can be coupled to the event bus and to centralized correlation logic programmed to identify a high correspondence between events from a particular event source among the nodes and a particular set of correlation rules in that correlation engine. The identification of such correspondence can be used to move to the set of correlation rules to an embedded correlation engine closer to the particular event source.
摘要:
Embodiments of the invention provide a fraud prevention method for a pay-per-click data processing system. The method can include receiving a click through for a link in a host site which references a marketed site. The method also can include identifying a link address for the link in the click through. The method yet further can include comparing the identified link address to a modified link address recorded for an actual link address for the marketed site. Finally, the method can include quashing the click through if the identified link address is not the modified link address. Conversely, the method can include redirecting the click through to the marketed site if the identified link address is the modified link address.
摘要:
The present invention provides multi-file transfer via instant messaging. A method in accordance with an embodiment of the present invention includes: selecting a plurality of files to be transferred; generating a collection descriptor describing the files; sending an instant message with a collection reference that includes the collection descriptor to a recipient; and upon receipt of the instant message, the recipient selectively retrieving at least one of the files.
摘要:
A system and method for managing an electronic storage volume is described. The method includes assigning a threshold to a constrained storage space to define a first state in which an amount of data stored in the constrained storage space exceeds the threshold and a second state in which the amount of data stored in the confined storage space does not exceed the threshold. The method also includes comparing the amount of data to be stored in the constrained storage space and the threshold, and performing a predefined action if the comparison indicates that the amount data to be in the confined storage space would cause a transition between the first state and the second state.
摘要:
The present invention provides a self-updating email message. A method in accordance with an embodiment of the present invention includes: sending an email message to a recipient, the email message including encapsulated content; and selectively updating the email message in accordance with the encapsulated content when the email message is opened by the recipient.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to message prioritization and provide a method, system and computer program product for audio-visual presentation of message prioritization in a human-to-human collaborative environment. In one embodiment, a data processing system for audio-visual presentation of prioritized messages in a collaborative environment can include a human-to-human collaborative system client, a data store of prioritized messages, and a table correlating display characteristics of user interface elements with message priorities for messages referenced by the data store. The system also can include prioritization and visualization logic which can include program code enabled to render each of the user interface elements with corresponding display characteristics consonant with priorities assigned to individual messages displayed in each of the user interface elements.
摘要:
Methods, apparatus, computer program instructions and products, and services for identifying, to a called party, a calling party who uses a terminal that would otherwise be unrecognized by the called party, such as a borrowed cellphone. According to one aspect of the invention, a service provider receives set-up information from a calling party bearing a first caller ID number; determines a second caller ID number associated with the calling party, where the first caller ID number and the second caller ID number are not the same; and initiates connection of the calling party and the called party, using the second caller ID number to identify the calling party to the called party.
摘要:
A computer system includes a plurality of LEDs situated in correspondence to a plurality of connectors. System peripherals which connect to the plurality of connectors are outfitted to include a transponder having a unique RF ID tag The system further includes an RFID reader which detects an RF ID tag emitted by a proximate transponder when a user proceeds to plug-in a system peripheral outfitted with such transponder. The system further includes a light controller which selectively energizes the LEDs and provides a distinguishing energization signal to at least one but less than all of the LEDs based on the RF ID value. Preferably, the system processor oversees the selection.