Abstract:
A firewall control method includes receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions.
Abstract:
A method comprising: defining a first rate in accordance with which actions in a virtual universe occur; modifying, for a first area of the virtual universe, a rate at which an action occurs to a second rate different from the first rate, wherein said modifying causes actions in the first area to occur in accordance with the second rate.
Abstract:
The present invention provides a system, method and computer program for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Preferred embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Preferred embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Preferred embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.
Abstract:
Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to select segments of text from text files based upon the number of words in phrases of the text files, upon the number of letters in words of the text files, or upon other patterns of the text in the text files. The text files may include web sites and news indexes. Embodiments may also involve indexing the selected segments of text, matching text currently being entered by the user (current text) into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In some embodiments, the matching may be based upon an attribute of text such as a time period, a source, or a recipient.
Abstract:
A method comprising: defining a first rate in accordance with which actions in a virtual universe occur; modifying, for a first area of the virtual universe, a rate at which an action occurs to a second rate different from the first rate, wherein said modifying causes actions in the first area to occur in accordance with the second rate.
Abstract:
A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI).
Abstract:
Ein computerrealisiertes Verfahren, System und Computerprogrammprodukt für das Verwalten von Clientverbindungen aus einer Vielzahl von Clients mit einem Server. Ein Nachrichtenübertragungsserver erkennt durch einen ersten Server ein Attribut einer Clientverbindung, das einen Schwellenwert übersteigt, wobei das Attribut eine Schreibauswahl-Operation ist. Als Reaktion auf das Erkennen, dass das Attribut des Clients den Schwellenwert von Schreibauswahl-Aufrufen übersteigt, wählt der Nachrichtenübertragungsserver einen Client aus, der eine Verbindung mit einem Server herstellt. Als Reaktion auf das Auswählen des Clients wählt der Nachrichtenübertragungsserver einen Verbindungsmechanismus eines zweiten Servers aus. Der Nachrichtenübertragungsserver überträgt eine Verlagerungsnachricht an den Client, wobei die Verlagerungsnachricht mindestens einen einheitlichen Ressourcenbezeichner (Uniform Resource Identifier, URI) aufweist.
Abstract:
Ausführungsformen der vorliegenden Erfindung betreffen das Instanziieren eines Codier-Wettbewerbs, um Problemen in Programmmodulen eine Lösung zuzuführen. Bei einer typischen Ausführungsform wird eine erste Anmerkung in einer Programmcode-Datei erkannt, die eine Gruppe von Programmmodulen aufweist. Die erste Anmerkung gibt im Allgemeinen eine Notwendigkeit einer Funktionalität an, die wenigstens einem Programmmodul aus der Gruppe von Programmmodulen zugehörig ist. In Reaktion auf ein Fehlen einer vorhandenen Bibliothek, die die Lösung aufweist, wird eine Angabe zum Instanziieren eines Codier-Wettbewerbs zwischen einer Gruppe von Entwicklern zum Bereitstellen der Lösung empfangen. In Reaktion auf die Angabe wird eine zweite Anmerkung in die Programmcode-Datei eingefügt. Der Codier-Wettbewerb kann dann instanziiert werden, um eine Gruppe von Entwickler-Bibliotheken zu identifizieren, die eine Möglichkeit zum Bereitstellen der Lösung aufweisen. Anhand des Codier-Wettbewerbs kann die Lösung dann identifiziert und umgesetzt werden.
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include rec eiving a request to authenticate the user to the server and determining whet her authenticating the user requires matching an authentication plan.If a pl an is required, the method may also include accessing a stored authenticatio n plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authenticat ion store where the plan has authorization records each having current infor mation relating to user access. Embodiments ofthe method may also include co mparing the stored authentication plan with the received current authenticat ion plan to determine whether they match and, in response to a match, authen ticating the user.
Abstract:
A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI).