Abstract:
Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.
Abstract:
Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.
Abstract:
The present invention provides a mobile station implemented method for managing a requested name and phone record. The method comprises steps of the requester associated device receiving a user's identification from a mobile station phonebook owner and a search term. The requester associated device transmits the user identification of the mobile station phonebook owner and the search term. Receiving at least one matching name and phone record, the requester associated device presents the at least one matching name and phone record to a user. The requester associated device receives a user management command to perform an action on the name and phone record. The method may complete when the requester associated device performs the action on the name and phone record.
Abstract:
The present invention provides a computer implemented method for communicating a signature in a received email. Initially, a server receives a source email from a source client, the source email comprising a signature index entry, and a body. The server determines for a first recipient that a first associated destination client is capable of rendering a signature of the signature index entry in response to a selection of an indexed signature. The server, responsive to a determination that the destination client is capable of rendering the signature index entry, forwards the source email to the first recipient as a delivered email using the body of the source email such that an indexed signature is present in the body of the delivered email. In addition, a method for generating a signature header is shown that provides a many to one correspondence between indexed signatures and a signature index entry.
Abstract:
Migrating a workload partition (WPAR) is provided. Responsive to receiving a request to checkpoint the WPAR, a list of virtual identifiers used by the WPAR to refer to IPC objects is generated and stored. Each virtual identifier corresponds to an IPC object and to a real identifier used by a kernel that corresponds to the IPC object. IPC object data and control information is collected and stored. Each process in the WPAR stores per process data. Responsive to receiving a request to restart the WPAR, the virtual identifier that the WPAR wants to be used is registered. A new IPC object is created by a kernel. The kernel maps a real identifier used by the kernel for the new IPC object to the registered virtual identifier. The restart process retrieves IPC data and control information and overlays it on the new IPC object. The per process data is restored.
Abstract:
A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.
Abstract:
The present invention provides a computer implemented method and apparatus to invite people by an email system to meetings or events through a scheduling server of a data processing machine. The scheduling server receives a plurality of invitees, where each invitee's vote has weight in the probability of scheduling a meeting at the desired time. The plurality of vote weights is heterogeneous. The scheduling server receives a meeting duration, a meeting option begin-time, and a meeting option end-time. The scheduling server excludes committed time of each invitee between the at least one meeting option begin-time and the at least one meeting option end-time to form a set of meeting times that are divided into a manageable set of meeting options. The scheduling server presents the manageable set of options to each invitee. The scheduling server receives votes from a voting invitee to form collected votes. Each vote is weighted based on the vote weight of the voting invitee. The scheduling server determines a leading option based on the collected votes and commits the leading option as the scheduled time for the meeting.
Abstract:
Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good. The reverse firewall analyzes a header of packet having the source address without analyzing a payload of the packet, responsive to a determination that the positive trust report is received from the receiver host.
Abstract:
An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices.
Abstract:
Migrating a workload partition (WPAR) is provided. Responsive to receiving a request to checkpoint the WPAR, a list of virtual identifiers used by the WPAR to refer to IPC objects is generated and stored. Each virtual identifier corresponds to an IPC object and to a real identifier used by a kernel that corresponds to the IPC object. IPC object data and control information is collected and stored. Each process in the WPAR stores per process data. Responsive to receiving a request to restart the WPAR, the virtual identifier that the WPAR wants to be used is registered. A new IPC object is created by a kernel. The kernel maps a real identifier used by the kernel for the new IPC object to the registered virtual identifier. The restart process retrieves IPC data and control information and overlays it on the new IPC object. The per process data is restored.