摘要:
A method, system, and computer-readable code with which a program component can be dynamically selected for downloading, based on current values of one or more changeable attributes. Multiple versions of a program component are available, and a specific version is dynamically selected for downloading based on current attribute values. Attribute values may represent a user's authorization privileges, current working environment, preferences, network connection type, status, etc. In this manner, software can be optimized for particular users or groups of users, or particular environments of hardware and/or software, while still providing applications that are usable by a wide range of users in a wide range of operating environments. In another aspect, this dynamic selection based on attributes can be used to select a version of a component for remote execution, instead of for downloading. The dynamic selection process may occur on a server in the network, or on the client's local machine. In the latter case, selected component versions may be loaded from local storage instead of downloading them from a server. Administrative policy information based on the user's identity and/or group membership may be used to generate the current attribute values, reflecting one or more of: a user's current working environment, authorization privileges, preferences, network connection type, and status.
摘要:
Described is a conference management system for administering an online conference. The conference management system receives an electronic communication from a conference participant. A group is determined to be associated with the conference participant. An action is performed on the conference participant based on the group association.
摘要:
A mechanism is provided for indexing commercials. A viewer may query a search engine for a particular product or service. The index may include descriptors that are provided within a blanking interval within the media stream or within program guide information associated with the stream. The index information may also include Internet hyperlinks. Commercials may also have associated therewith a value that is relative to a value of media content. A viewer may accumulate value by viewing advertisements. Accumulated value may then be used to acquire more content.
摘要:
Described is a method for administering an online conference. The method includes receiving an electronic communication from a conference participant. A group is determined to be associated with the conference participant. An action is performed on the conference participant based on the group association.
摘要:
An autonomic system for diagnosing and correcting error conditions among interrelated components and resources. The system can include one or more commonly formatted log files utilizing standardized naming conventions for the interrelated components and resources. Each of the commonly formatted log files can include an association with one of the interrelated components and resources. An autonomic system administrator can be coupled to each of the interrelated components and resources and can be configured to parse the log files to identify both error conditions arising in associated ones of the interrelated components and resources, and also dependent ones of the interrelated components and resources giving rise to the identified error conditions. Preferably, the autonomic system can further include a codebase of analysis code and code insertion logic coupled to the autonomic system administrator and programmed to insert portions of the analysis code in selected ones of the interrelated components and resources.
摘要:
A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.
摘要:
Objects including Java bytecodes are embedded in a 3270 datastream structured field. The 3270 datastream structured field, including the objects so embedded, are passed between a primary logical unit and a secondary logical unit that communicate with each other over a network using 3270 datastream architecture. An initialization protocol sends a Read Partition (Query) structured field from the primary logical unit to the secondary logical unit, to query whether the secondary logical unit supports Java. The secondary logical unit sends a Query Reply structured field to the primary logical unit in response to receipt of the Read Partition (Query) from the primary logical unit if the secondary logical unit supports Java. In response to receipt of the Query Reply structured field from the secondary logical unit, the 3270 datastream structured field including embedded objects such as Java bytecodes is passed between the primary logical unit and the secondary logical unit. The objects that are embedded in a 3270 datastream structured field may include Java bytecodes, images and audio. Spanning may be used to send objects that exceed structured field length limits. Accordingly, Java and other objects may be integrated with legacy 3270 applications, without requiring the rewriting of legacy applications, and allowing the use of the highly developed 3270 datastream architecture.
摘要:
A method and apparatus for allowing applets to be executed natively over a non-IP network. The method and apparatus provide an applet loader that initiates the applet download, services the class faults that are encountered and allows calls to non-IP APIs without compromising the security mechanisms of Java running on TCP/IP. This allows applets to be run without web browsers or web servers.
摘要:
A first and second data handling systems provides for shared resources in a docked mobile environment. The first data handling system maintains a set of execution tasks within the first data handling system having a system dock interface to physically couple to the second data handling system. The first data handling system assigns a task to be executed by the second data handling system while the two systems are physically coupled.
摘要:
In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described.