Abstract:
A method, system, apparatus, and computer program product are presented for a meta-archive information server that provides a set of operations or services for obtaining information from a meta-archive; these operations may include dynamic indexing, searching, comparing, or other operations. A meta-archive is a set of one or more archive files that are logically grouped in (or otherwise associated with) a container object, e.g., a file system folder, a directory, or another archive file. By allowing a user to derive sets of information from an entire meta-archive, a user can maintain more files within archives, thereby reducing file system disorganization. The meta-archive information server can be easily run over a specific meta-archive when necessary, thereby generating information dynamically, even if the archive files within a meta-archive change over time.
Abstract:
Operating a publicly accessible purchasing system including receiving, on a receipt date, from a purchaser, in a publicly accessible purchasing system, a deferred purchase request (“DPR”) for an item to be purchased; identifying a vendor; and issuing, in dependence upon the DPR, a purchase order to the vendor on a date subsequent to the receipt date. In some embodiments, a DPR includes an item identification for the item to be purchased, and identifying a vendor further comprises identifying a vendor in dependence upon the item identification. Some embodiments includes selecting a vendor in dependence upon vendor item prices. Some embodiments include selecting a vendor having a lowest vendor item price for the item to be purchased. Embodiments include selecting vendors in dependence upon purchasers' indicated maximum prices, in independence upon information in purchase orders previously issued to vendors, and in dependence upon proximity of a vendor to a purchaser.
Abstract:
A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.
Abstract:
A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.
Abstract:
A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.
Abstract:
A method for preparing and automatically updating a greeting on a voice mail system comprising receiving a call to a voice mailbox, selecting a greeting template based on one or more conditions, identifying greeting parameters present within the greeting template, retrieving values for the greeting parameters, and generating a greeting using the values of the greeting parameters in accordance with the greeting template. The method allows the voice mailbox user to better manage incoming calls when the user is not available to accept them. The method further provides a benefit to the caller by providing a greeting that contains information tailored to benefit the caller, thereby helping the caller to decide, for example, whether or not to leave a voice mail message in the user's voice mailbox.
Abstract:
A system for processing and displaying command-line input data is described. The system includes a keyboard buffer configured to store a pending command entered in a command line interface such that the entered pending command may be executed shortly thereafter. The system also includes a display that houses a screen. The display is configured to display the entered pending command in the command-line interface on the screen, such that a user may review, validate and edit the entered pending command prior to execution. The system also includes a central processing unit. The central processing unit houses the processor. The keyboard buffer, the command-line interface and the display are operably associated with the processor. The processor is configured to interpret and execute the pending command stored in the keyboard buffer.
Abstract:
Methods, systems, and media to capture a redialing sequence and to redial a phone or similar device are disclosed. Embodiments may capture a dialing sequence of a caller and provide access to the dialing sequence, or redialing sequence, when the caller desires to re-establish a telephone connection. More specifically, embodiments recognize a significant pause in a dialing sequence by a caller and associate the pause with a line event such as a circuit event or an audible event, or a length of time. Some embodiments comprise resource managers and agents of the resource manager may monitor a line, and identify, interpret, and/or route the line events to an application server to capture a redialing sequence or replay the redialing sequence to re-establish a telephone connection. Other embodiments incorporate security measures to protect private data and error detection to determine when a redialing sequence is invalid.
Abstract:
Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system.
Abstract:
A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.