摘要:
A method and implementing computer system are provided in which a request from a client for the display of a web page is processed by initially separating device-dependent display data from device-independent display data. The device-independent data is first sent back to the requesting client while the device-dependent data is being processed prior to being returned to the client. The device-dependent data processing includes separating bitmaps with text and bitmaps without text. The bitmaps are modified to suit the client system and the device-dependent modified bitmaps are returned to the client following the return of the device-independent data.
摘要:
A message is received with an encoding of a group universal resource identifier that identifies a resource group and of a plurality of member universal resource identifiers for a plurality of resources that constitute the resource group. The message is received subsequent to requesting the resource group with the group universal resource identifier. For each of the plurality of member universal resource identifiers in an order designated by the message, the member universal resource identifier is extracted. The member universal resource identifier comprises a member resource name and a universal resource identifier that identifies a corresponding one of the plurality of resources. The member universal resource identifier is inserted into navigation history of a web browser. The member universal resource identifier is inserted into the navigation history in accordance with the order.
摘要:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
摘要:
A system for protecting data within a portable storage device. A self-destruct unit associated with the portable storage device is enabled. If the portable storage device is not within a pre-specified route tolerance or if the portable storage device is not at a pre-selected identification checkpoint, an alert message is sent. In response to receiving a particular response, a self-destruct signal is sent to the enabled self-destruct unit. Then the enabled self-destruct unit creates an electromagnetic pulse from a xenon flash tube to render confidential data within the portable storage device unusable.
摘要:
Enabling automated provisioning on a data processing network includes providing the network with access to an automated provisioning controller. The controller enables a user to specify resource allocation priorities and uses the user-specified priorities, in conjunction with a resource stabilization policy, to resolve conflicting resource requests. The resource allocation priorities include priorities for demand-based resource requests and maintenance-based resource requests. The stabilization policy includes a policy for constraining allocation of a resource based on forecasted demand and a policy for constraining allocation of a resource based on a scheduled maintenance task.
摘要:
A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time.
摘要:
A method, system, apparatus, and computer program product are presented for management of a distributed data processing system on behalf of a plurality of management customers. A set of logical networks within the distributed data processing system and/or a set of physical networks in the distributed data processing system are associated with an anchor object. A topology map can be generated and displayed in which a root node of the topology map is the anchor object. Each anchor object is uniquely associated with a customer for which the distributed data processing system is managed. The topology display can be restricted such that portions of topology information are displayed to an administrative user in accordance with the authorized security access of the user.
摘要:
A dead e-mail identification locator discovers dead e-mail addresses without forwarding messages to valid recipients. Existing headers in the mail protocol are extended to include a test header. A mail server that supports the protocol extension of the present invention may send a reply if the address does not exist and may discard the message if the address does exist. The test header allows a sender to test an e-mail address for validity without the message being forwarded to the user, as will be described below. The sender may be a dead e-mail locator program, which tests a plurality of e-mail addresses. The sender and recipient mail servers may include attributes in the test header to enhance the analysis of delivery failures. Using these attributes, the dead e-mail address locator can pinpoint the location of e-mail message delivery failure and profile the performance of routing of messages and other details hidden from users.
摘要:
A method, program and system for editing data in a distributed computer network are provided. The invention comprises, in response to a request from a user, opening a log file and noting an entry associated with a message of interest. A message locator finds the message of interest in a designated location and bookmarks the message. A bookmark I/O component then locates and modifies the bookmarked message, and rewrites the modified message back to the designated location. The user can then view the modified message via a display device (i.e. GUI).
摘要:
A method, program, and system for dynamically configuring logging elements in a computer system are provided. The invention comprises a logging subsystem within the computer system, wherein the subsystem contains a plurality of logging elements which record events within the computer system. Inheritance relationships are established for the logging elements, which allows the logging elements to be configured either individually or as a group. The logging elements are then configured to record specified types of events and send the logging data of the events to specified locations within the computer system. In one embodiment of the present invention, the computer system is one of a plurality of nodes in a distributed computer network, wherein logging elements within a one network node can be remotely configured from a another node in the network.