Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing System comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can be made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationships can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the elements that establish the relationship.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for hindering undesired transmission or reception of electronic messages within a network of a plurality of users. SOLUTION: This method includes: a step of determining that transmission or reception of at least one specific electronic message is undesirable; a step of automatically extracting detection data that permits detection of the at least one specific electronic message or variants thereof; a step of scanning one or more inbound and/or outbound messages from at least one user for the presence of the at least one specific electronic message or variants thereof; and a step of taking appropriate action, responsive to the scanning step. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To detect and process instances of undesirable mail of all types by scanning multiple inbound messages and confirming whether or not there is a specific electronic message, and taking a proper action in response to the scanning step. SOLUTION: A user 210 while reading a message and adding a label of spam 212 by regarding it as undesirable one scans its messages to confirm whether or not there are multiple undesirable messages which are already known. Messages of a user 218 are scanned several minutes later to confirm whether or not there are multiple undesirable messages 222. Further, a user 220 confirm 4th undesirable messages 222 30 minutes later. Thus, proper actions are taken in response to scanning steps. Consequently, instances of undesirable mail of all types can be detected.
Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing System comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can b e made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationshi ps can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the element s that establish the relationship.
Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing system comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can be made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationships can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the elements that establish the relationship.
Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing system comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can be made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationships can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the elements that establish the relationship.
Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing system comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can be made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationships can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the elements that establish the relationship.
Abstract:
A method, computer program product, and data processing system for constructing a self-managing distributed computing system comprised of "autonomic elements" is disclosed. An autonomic element provides a set of services, and may provide them to other autonomic elements. Relationships between autonomic elements include the providing and consuming of such services. These relationships are "late bound," in the sense that they can be made during the operation of the system rather than when parts of the system are implemented or deployed. They are dynamic, in the sense that relationships can begin, end, and change over time. They are negotiated, in the sense that they are arrived at by a process of mutual communication between the elements that establish the relationship.
Abstract:
A system and method of hindering an undesirable transmission or receipt of electronic messages within a network of users includes the steps of determining that transmission or receipt of at least one specific electronic message is undesirable; automatically extracting detection data that permits detection of the at least one specific electronic message or variants thereof; scanning one or more inbound and/or outbound messages from at least one user for the presence of the at least one specific electronic message or variants thereof; and taking appropriate action, responsive to the scanning step.
Abstract:
A system and method of hindering an undesirable transmission or receipt of electronic messages within a network of users includes the steps of determining that transmission or receipt of at least one specific electronic message is undesirable; automatically extracting detection data that permits detection of the at least one specific electronic message or variants thereof; scanning one or more inbound and/or outbound messages from at least one user for the presence of the at least one specific electronic message or variants thereof; and taking appropriate action, responsive to the scanning step.