摘要:
A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.
摘要:
A cellular telephone system, including: a first cellular telephone for a child; a second cellular telephone for a first relative of the child; and at least a third cellular telephone for at least a second relative of the child; the first cellular telephone including a single button that, when the single button is pushed, automatically activates only one call to a closest one of either (a) the second cellular telephone or (b) a closest one of the at least a third cellular telephone; where closest is measured by at least one of closest geographically, closest by driving time, and closest by driving distance.
摘要:
Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag.
摘要:
Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
摘要:
A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip.
摘要:
A system and method for selecting calendar events based on examining the content of a user's recent e-mail activity. According to an embodiment of the present invention, a scheduling manager assembles a keyword list, wherein the keyword list includes a collection of keywords with associated weights for each keyword among the collection of keywords. If the scheduling manager detects at least two conflicting calendar events scheduled within a calendar program, the scheduling manager searches the at least two conflicting calendar events for at least one keyword on the keyword list. The scheduling manager computes a keyword weight score for each of the at least two conflicting calendar events. If one calendar event among the at least two conflicting calendar events has a highest keyword weight score, the scheduling manager schedules the one calendar event within the calendar program.
摘要:
A system and method for providing visual keyboard guides according to a programmable set of keys are provided. With the mechanisms of the illustrative embodiments, a user may select for which keys of a keyboard the user wishes to receive visual guides on a display of a data processing device associated with the keyboard. Thereafter, when the user's fingers are in proximity to keys of the keyboard, a comparison of the keys in proximity to the user's instrument to the keys for which visual guides are to be provided is made. If the keys in proximity to the user's instrument match keys for which visual guides are to be provided, a visual guide is displayed on the display of the data processing device. A graphical user interface may be provided to the user for setting which keys are to have associated visual guides.
摘要:
Resource utilization information for accessing a file is stored in metadata associated with the file. In response to a command to access the file, the resource utilization information is compared to pre-established warning criteria to determine if the resource utilization for accessing the file meets the criteria for generating a warning. Based on the results of the comparison, a warning message may be output, prior to accessing the file, if results of the comparison indicate that one or more warning criteria are met. The warning message may provide a provide a prompt for a user to determine if he/she still wishes to access the file and if so, the file is accessed; otherwise the operation for accessing the file is terminated prior to the file being accessed.
摘要:
A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip.
摘要:
Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.