摘要:
A method of scheduling a group meeting wherein, the request for the group meeting is received as a message from a mobile device. The received message identifies the group. The group comprises of a plurality of members and information on the group and its members is pre-defined and stored in a repository. Availability of the members of the group for the requested group meeting is determined from a calendar system and accordingly a schedule for the group meeting is created. A message is sent to all the members of the group providing information on the scheduled group meeting.
摘要:
A message originator, such as an author of an email, can designate “section access settings” which can selectively permit or deny access of portions of the email's content. Recipients who are not authorized may not exercise the access right upon the designated portion of content. For example, an access right may allow displaying a section of text in an email message only for specified recipients and not to other recipients. In a preferred embodiment, the entire email content, including restricted portions, is provided to all recipients, including unauthorized recipients. Unauthorized recipients are prevented from exercising the access right even though the restricted portion has been received.
摘要:
Techniques for provisioning and decommissioning web servers in an automated manner. In one embodiment, a threshold value relating to an operational metric of a web server can be stored. The metric can be monitored as the web server receives requests. If the metric exceeds the threshold value, additional web servers can be automatically provisioned to handle a portion of the requests. If the metric falls below the threshold value, the additional web servers can be automatically decommissioned. In another embodiment, information can be logged pertaining to web server requests received over time. Based on this information and a threshold value, patterns of high/low server load can be determined and a policy can be generated identifying time intervals during which additional web servers should be provisioned (or existing web servers should be decommissioned). The policy can be used at server runtime to provision or decommission web servers at the identified intervals.
摘要:
An embodiment of the invention provides an apparatus and method for optimizing reads in a mirrored file system. The apparatus and method receives a plurality of read request blocks for reading the target regions in disks. The apparatus and method will chain the read request blocks in a first set, where all of the read request blocks in the first set are targeted to a first disk. The read request blocks in the first set are then sent as a read request to the first disk. When each read request block in the first set has completed accessing their respective target regions in the first disk, then the read data is generated from the first disk. Therefore, by chaining the read request blocks in a read request to a single disk, read striping is not performed across multiple disks during a read operation.
摘要:
A system for communicating with a mobile device is provided by aggregating content from at least one source of content having a first set of markup tags readable by executable code on the mobile device and a second set of markup tags. The aggregated content having the second set of markup tags is formatted with the first set of markup tags by either reorganizing the aggregated content, extracting irrelevant information, incorporating relevant information, combining one or more source together. A set of actions based on the formatted content is displayed using the first set of markup tags.
摘要:
A system and method for verifying the consistency of mirrored data sets between source and destination storage systems is provided. A destination verification module sends version information to the source storage system where the source verification module determines whether the source and destination storage systems are utilizing compatible versions of the verification module. If the destination verification module receives an acceptable version from the source, the destination module then determines a base PCPI to utilize for verification and sends a PCPI identifier of the base PCPI to the source. The source verification module generates and transmits a data stream consisting of comprising of checksum information. The destination verification module compares the received data stream with checksum information retrieved from disk. If there are mismatches, i.e. the received data differs from the data retrieved from disk, the destination verification module logs the data mismatches in a verification log file.
摘要:
A machine-controlled method may include a web server identifying data to be cached and caching the data at the web server, the data originating from an external data source, an application server generating metadata that corresponds to the cached data, determining whether external data corresponding to the cached data has changed, receiving information corresponding to the changed external data, and updating the cached content based on the metadata and the received information.
摘要:
A system and method for verifying the consistency of mirrored data sets between source and destination storage systems is provided. A destination verification module sends version information to the source storage system where the source verification module determines whether the source and destination storage systems are utilizing compatible versions of the verification module. If the destination verification module receives an acceptable version from the source, the destination module then determines a base PCPI to utilize for verification and sends a PCPI identifier of the base PCPI to the source. The source verification module generates and transmits a data stream consisting of comprising of checksum information. The destination verification module compares the received data stream with checksum information retrieved from disk. If there are mismatches, i.e. the received data differs from the data retrieved from disk, the destination verification module logs the data mismatches in a verification log file.
摘要:
A system for communicating with a mobile device is provided by aggregating content from at least one source of content having a first set of markup tags readable by executable code on the mobile device and a second set of markup tags. The aggregated content having the second set of markup tags is formatted with the first set of markup tags by either reorganizing the aggregated content, extracting irrelevant information, incorporating relevant information, combining one or more source together. A set of actions based on the formatted content is displayed using the first set of markup tags.
摘要:
Techniques for provisioning and decommissioning web servers in an automated manner. In one embodiment, a threshold value relating to an operational metric of a web server can be stored. The metric can be monitored as the web server receives requests. If the metric exceeds the threshold value, additional web servers can be automatically provisioned to handle a portion of the requests. If the metric falls below the threshold value, the additional web servers can be automatically decommissioned. In another embodiment, information can be logged pertaining to web server requests received over time. Based on this information and a threshold value, patterns of high/low server load can be determined and a policy can be generated identifying time intervals during which additional web servers should be provisioned (or existing web servers should be decommissioned). The policy can be used at server runtime to provision or decommission web servers at the identified intervals.