Patent application number | Description | Published |
20080216080 | Method and system to alleviate denial-of-service conditions on a server - A method is presented for processing data in a multithreaded application to alleviate impaired or substandard performance conditions. Work items that are pending processing by the multithreaded application are placed into a data structure. The work items are processed by a plurality of threads within the multithreaded application in accordance with a first algorithm, e.g., first-in first-out (FIFO). A thread within the multithreaded application is configured apart from the plurality of threads such that it processes work items in accordance with a second algorithm that differs from the first algorithm, thereby avoiding the impairing condition. For example, the thread may process a pending work item only if it has a particular characteristic. The thread restricts its own processing of work items by intermittently evaluating workflow conditions for the plurality of threads; if the workflow conditions improve or are unimpaired, then the thread does not process any work items. | 09-04-2008 |
20090157777 | DYNAMICALLY ADDING PARTITIONS TO BE DISTRIBUTED DIRECTORY SETUP WITH NO DOWNTIME - Dynamically adding n partitions to a distributed directory setup having x existing servers by modifying the configuration file to include the n new servers and implementing a replication setup mechanism with agreements to x+n−1 servers. The migration to dynamically add partitions is carried out while continuing to serve clients. | 06-18-2009 |
20090300487 | DIFFERENCE ONLY DOCUMENT SEGMENT QUALITY CHECKER - A system and method for checking an author's revisions to a document or an electronic communication in a multiple party communication string without checking un-authored text. | 12-03-2009 |
20100070545 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) ADMINISTRATOR TASK NOTIFICATION CONTROL - The illustrative embodiments provide for automatically and proactively retrieving administrative maintenance tasks or potential issues from a set of directory servers without direct intervention from an administrator. Responsive to an operation request being sent from a requesting application to the set of directory servers and an administrative maintenance control mechanism being active, an administrative maintenance control is automatically sent to the set of directory servers. Responsive to receiving the response to the administrative maintenance control, an end user application within the data processing system is notified that the at least one of the administrative maintenance tasks or the potential issues have been received. | 03-18-2010 |
20100169485 | Directory viewports - The illustrative embodiments provide for filtering LDAP requests and server responses. A viewport server is configured with filtering rules for responses from a directory server where the responses are generated to fulfill requests from a client application. The filtering rules determine which data is to be forwarded to the client application. One or more responses are intercepted from the directory server to the client application. The one or more intercepted responses are filtered according to the filtering rules to produce a set of filtered responses. The set of filtered responses are then sent to the client application. | 07-01-2010 |
20110161238 | ASSESSMENT OF SKILLS OF A USER - A method, operable on a processing device, for assessment of skills of a user may include receiving, by the processing device, an error message reporting an error associated with the user. The method may also include determining, by the processing device, a categorization of the error. Determining the categorization of the error may include assigning one of a plurality of predetermined skill ratings to the user. Each predetermined skill rating may be associated with a predefined condition. The method may additionally include generating, by the processing device, a report for assessment of the skills of the user. The report may include an identification of the user, the error, identification of a system if a system associated error, identification of a product if a product associated error, the categorization of the error and the predetermined skill rating assigned to the user. | 06-30-2011 |
20110258458 | METHOD AND APPARATUS FOR MANAGING KEYS USED FOR ENCRYPTING DATA - A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information. | 10-20-2011 |
20110289324 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 11-24-2011 |
20120102178 | Lightweight Directory Access Protocol (LDAP) Administrator Task Notification Control - The illustrative embodiments provide for automatically and proactively retrieving administrative maintenance tasks or potential issues from a set of directory servers without direct intervention from an administrator. Responsive to an operation request being sent from a requesting application to the set of directory servers and an administrative maintenance control mechanism being active, an administrative maintenance control is automatically sent to the set of directory servers. Responsive to receiving the response to the administrative maintenance control, an end user application within the data processing system is notified that the at least one of the administrative maintenance tasks or the potential issues have been received. | 04-26-2012 |
20120159192 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 06-21-2012 |
20120191985 | Managing Keys used for Encrypting Data - A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information. | 07-26-2012 |
20120271682 | ASSESSMENT OF SKILLS OF A USER - A method, operable on a processing device, for assessment of skills of a user may include receiving, by the processing device, an error message reporting an error associated with the user. The method may also include determining, by the processing device, a categorization of the error. Determining the categorization of the error may include assigning one of a plurality of predetermined skill ratings to the user. Each predetermined skill rating may be associated with a predefined condition. The method may additionally include generating, by the processing device, a report for assessment of the skills of the user. The report may include an identification of the user, the error, identification of a system if a system associated error, identification of a product if a product associated error, the categorization of the error and the predetermined skill rating assigned to the user. | 10-25-2012 |
20140177842 | Optimizing Use of Hardware Security Modules - Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device. | 06-26-2014 |