Abstract:
Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.
Abstract:
PROBLEM TO BE SOLVED: To facilitate secure operation of an integrated system having multiple levels of software. SOLUTION: Techniques provided for initializing, maintaining, updating and recovering secure operation within an integrated system includes: (1) a step for starting system initialization by decrypting an initial code preserved after encrypting, and also for performing the decrypting by employing a data access control function within the integrated system; (2) a step for authenticating a next level of software among a plurality of levels of software before control of the integrated system is passed to the next level of software; and (3) a step for limiting an ability of the next level of software to modify an operational characteristic of the integrated system, and also for performing the limit in a hardware component of the data access control function within the integrated system. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for creating an annotated transcript of a presentation, and to provide an information processing system, and a computer program. SOLUTION: The method for creating the annotated transcript of the presentation includes steps of: receiving an annotation stream recorded on a mobile device, wherein the annotation stream includes time stamped annotations corresponding to segments of the presentation; receiving a transcript of the presentation, wherein the transcript is time stamped; and then merging the annotation stream with the transcript of the presentation by matching the time stamps from both the annotation stream and the transcript, for creating the annotated transcript of the presentation. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
A method and system for configuring elements of a distributed computing system based on evaluations of their value add and cost impact. The system and method for configuring elements of a distributed computing system comprises the steps of: determining one or more system metrics that relate to hardware and/or software elements of a configured distributed system; determining a system value in response to one or more system metrics, the value determined according to one or more value criteria; and, re-configuring elements of the distributed computing environment according to said determined system value. The re-configuring step further comprises steps of determining one or more potential changes in the distributed computing environment based on the system value determined, and, determining an alternate system value based on at least one potential change determined, the alternate value reflecting an economic consequence including but not limited to: increased revenue, or decreased cost resulting from a potential change.
Abstract:
Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.
Abstract:
Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.
Abstract:
Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.
Abstract:
A method and system for managing electric power consumption by elements of a distributed computing system comprises: determining one or more system metrics that relate to electric power usage as consumed by elements of a configured distributed environment; determining a system value in response to the one or more system metrics, the value determined according to one or more value criteria; and, while in-progress applications are being run in the computing environment, evaluating one or more potential changes in the distributed computing environment and determining an alternate system value based on the changes; and, re-configuring elements of the distributed computing environment dynamically while the computing environment is operating, in accordance with a determined alternate system value. The re-configuring elements step is in accordance with a potential change operative to alter electric power consumption.