摘要:
A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
摘要:
A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
摘要:
A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
摘要:
A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias.
摘要:
A method and system for authentication are provided for verifying a service provider and providing a secure session. The method carried out at the service provider (402) includes: starting (403) a session with a client (401); receiving a challenge (405) from the client (401); responding to the challenge with a response (408); and sending a key (408) to the client (401) in non-OCR format, wherein the key is used for the session between the client (401) and the service provider (402). The response to the challenge is known only to the client (401) and the service provider (402). The key is used by the client (401) to encrypt (412) all the communications with the service provider (402) in the session. The response and the key may be sent to an alternative channel previously supplied by the client (401).
摘要:
A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
摘要:
A defective self-sustained code-upgrade code is recovered. A relevant unset variable is set to avoid an un-initialized command failure. A relevant set variable is unset to render a second invocation of the set variable to appear as a first invocation A fix-named file is retrieved containing a plurality of code entries organized in a stanza style. The fixed-named file is executed. The plurality of stanza-organized entries are sourced by the defective code-upgrade code to change a variable which has been previously set, thereby overriding an existing process.
摘要:
A computer system having primary and recovery file system management, the system including a computing device, an operating system, a primary file system, and a recovery file system, where each of said file systems is labeled, prior to bootstrapping by the operating system the label of the recovery file system identifies the recovery file system as a primary file system, and the operating system is operative to swap the labels of the primary and recovery file systems during bootstrapping, attempt to mount said either of the file systems whose label identifies the file system as the primary file system, and swap the labels of the primary and recovery file systems if the file system whose label identifies it as the primary file system was mounted successfully and if the successfully mounted file system is the primary file system.
摘要:
Two or more received SMS messages can be aggregated into a single consolidated SMS message. The consolidated SMS message can be conveyed across a boundary in accordance with SMS protocols. A fee per SMS message can be incurred for conveying SMS messages across the boundary. The fee can be minimized by use of the consolidated SMS message in lieu of having to convey multiple SMS messages. Once the consolidated SMS message have been conveyed across the boundary, the consolidated SMS message can be parsed or decomposed into its constituent SMS messages, each of which can be conveyed to an intended recipient.
摘要:
A defective self-sustained code-upgrade code is recovered. A relevant unset variable is set to avoid an un-initialized command failure. A relevant set variable is unset to render a second invocation of the set variable to appear as a first invocation A fix-named file is retrieved containing a plurality of code entries organized in a stanza style. The fixed-named file is executed. The plurality of stanza-organized entries are sourced by the defective code-upgrade code to change a variable which has been previously set, thereby overriding an existing process.