摘要:
A tool for notifying a recipient of an email message, belonging to an email thread, that a recipient address has been added to or dropped from the thread. Address fields of the email message received are compared to the address fields of the most recent prior email message in the thread. Addressed that are determined to be added or dropped are stored in the metadata of the email message received so the added or dropped recipient addresses can be accessed to notify recipients of subsequent emails in the email thread. The metadata of previous email messages in the email thread are accessed to notify the recipient of recipient addresses added or dropped between any two consecutive email messages in the thread.
摘要:
A tool for notifying a recipient of an email message, belonging to an email thread, that a recipient address has been added to or dropped from the thread. Address fields of the email message received are compared to the address fields of the most recent prior email message in the thread. Addressed that are determined to be added or dropped are stored in the metadata of the email message received so the added or dropped recipient addresses can be accessed to notify recipients of subsequent emails in the email thread. The metadata of previous email messages in the email thread are accessed to notify the recipient of recipient addresses added or dropped between any two consecutive email messages in the thread.
摘要:
Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider. The method further includes allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot.
摘要:
An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF.
摘要:
A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information.
摘要:
A method includes determining conference data associated with a conference and determining an optimum congestion control technique for a call leg of the conference based on the conference data. The determining the conference data includes obtaining or receiving the conference data from at least one of: a Home Subscriber Service (HSS), a presence server, and a conference object. The conference is a Session Initiated Protocol (SIP) conference.
摘要:
Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure.
摘要:
A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved.
摘要:
A method includes determining a first subset of a plurality of links to be set to a first power state and a second subset of the plurality of links to be set to a second power state, different from the first power state, based on estimated data transmission. The method also includes instructing at least one network apparatus to set the first subset of the plurality of links to the first power state and to set the second subset of the plurality of links to the second power state different from the first power state.
摘要:
Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining.