摘要:
An invitee who is receiving invitations to meetings, usually via telecommunication, is enabled to predetermine a set of invitee-specific attributes that will be applied to each invitation and to relate the attributes of the invitation to the specific needs of the invitee in the determination of whether the proposed meeting may be scheduled on the specific invitee's calendar.
摘要:
An apparatus for dynamically redirecting a file descriptor includes an identification module, a disassociation module, and an association module. The identification module identifies a first executing process using a second executing process. The first executing process may include a file descriptor and the first executing process may be independent of the second executing process. The disassociation module disassociates the file descriptor from a first data stream using the second executing process without involvement of the first executing process. The association module associates the file descriptor with a second data stream using the second executing process without involvement of the first executing process in response to the disassociation module disassociating the file descriptor from the first data stream.
摘要:
Systems, methods and computer program products may provide software installation on a computer in a computer system. A software installation method may include installing at a server in a computer system a first files package including computer program files for a first software application, the computer system including at least a first computer installed with a first configuration package, the first configuration package including files necessary to configure and register the first software application, receiving a request at the server from the first computer for access to the first files package, and making the first files package available for use by the first computer.
摘要:
A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width. If the number of tabs is greater than the maximum number of tabs is to be displayed, the method collapses some of the tabs in to a tab of tabs.
摘要:
A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.
摘要:
Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.
摘要:
A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account.
摘要:
In response to a payor planning a specific payment for a given amount to a payee, the given amount is reserved from a balance of a financial account of the payor from which the specific payment is to be made. As such, the given amount reserved from the balance is only available for settling the specific payment and is otherwise unavailable. After the payor has planned the specific payment for the given amount to the payee, in response to the specific payment for the given amount actually being made to the payee, the given amount reserved from the balance of the financial account is used to settle the specific payment for the given amount being made to the payee.
摘要:
Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.
摘要:
The method includes identifying a first executing process using a second executing process. The first executing process may include a file descriptor and the first executing process may be independent of the second executing process. The method includes disassociating the file descriptor from a first data stream using the second executing process without involvement of the first executing process. The method includes associating the file descriptor with a second data stream using the second executing process without involvement of the first executing process in response to disassociating the file descriptor from the first data stream.