About 60 results
|A method, system, apparatus, or computer program product is presented for |
securing computational resources in a data processing system. A first user uses a
first computational device, ...
|Enhancing access for physically impaired users to selectable items in a |
hierarchical arrangement through the preliminary testing of a user response time
in moving a user controlled on-screen pointer from a start point over an equal
distance to each of a plurality of ...
|A method and apparatus for implementing a performance-based firewall at the |
protocol layer. Application Action Objects (AAOs) are created for requesting
applications and are mapped to specific protocol events. Each AAO is then used
as a Usage Based Firewall (UBF) to monitor all usage of the protocol ...
|A method, apparatus, and computer instructions for sending a user's availability |
information to an instant messaging (IM) partner. A user predefines areas of the
user's display and associates these predefined areas, or “hotspots”, with user
defined messages. If the user is not available to immediately ...
|A method and implementing computer system are provided in which a request |
from a client for the display of a web page is processed by initially separating
device-dependent display data from device-independent display data. The
device-independent data is first sent back to the requesting client while the ...
|A method and apparatus in a data processing system for modifying content of a |
document. A request is received for modified content. The document is
compressed using a ...
|A method, apparatus, and computer instructions for installing software in a |
network data processing system. An event is detected in the network data
processing system indicating that a software module is to be installed in a set of
data processing systems in the network data processing system.
|A system and method for reformatting chain forwarded and chain replied |
electronic messages into thread-of-discussion messages for improved readability
and reader comprehension. The chained electronic messages are parsed into
discussion entries which are then sorted by a preferred order, such as ...
|Information for receiving by a computer system has attributes which the computer |
system is capable of interpreting for displaying on a two-dimensional display
device. The information includes background and character attributes, according
to which the characters are displayable in a color or shade that ...
|An approach is provided in which a maintenance optimizer receives a policy |
change threshold that corresponds to a system. The maintenance optimizer
monitors real-time condition data associated with the system, and determines
whether the real-time condition data has reached the policy change ...