Abstract: Methods, systems, and computer program products are disclosed for managing storage resources in decentralized networks. Persistent identifiers are defined for nodes, allowing nodes to be identified across sessions and invocations, even though they re-enter the network with a different network address. Paths taken by content resources as they traverse the network (e.g. which nodes forwarded the content) are persisted, along with reputation information about nodes (e.g. indicating how successful they are at answering queries from peers). Trust relationships can be derived using the persisted information. A tiered broadcast strategy is defined for reducing the number of messages exchanged. Preferred embodiments leverage a web services implementation model.
Type:
Grant
Filed:
March 27, 2002
Date of Patent:
July 31, 2007
Assignee:
International Business Machines Corporation
Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.
Type:
Grant
Filed:
December 31, 2002
Date of Patent:
May 1, 2007
Assignee:
International Business Machines Corporation
Abstract: The e-mail system includes a responsible person terminal holding a plurality of recipient addresses to which given e-mail is sent, and a reference list editor terminal connected to the responsible person terminal through a network for editing a reference list comprising one or more recipient addresses to be updated from among the recipient addresses. The reference list includes recipient addresses to be replaced, recipient addresses to be deleted, and recipient addresses to be added. The reference list end a program or tool that references the reference list to update an e-mail recipient address list are recorded/stored on a server. The reference list editor terminal and the responsible person terminal access the server to cause the update function to be performed.
Type:
Grant
Filed:
August 16, 2002
Date of Patent:
August 15, 2006
Assignee:
International Business Machines Corporation
Abstract: Methods, systems, and computer program products for programmatically enforcing referential integrity constraints defined for classes of an arbitrary modeling framework (such as the Meta Object Facility, or “MOF”) when associations among class instances are modified. The present invention relieves the application programmer of the burden of writing code to maintain the links between instances, and applications are therefore considerably easier to write and to maintain, and programmatically maintains inverse links. This reduces the amount of data to be serialized, as the other link can be automatically resolved at the time the inverse link is reconstituted, and also helps in maintaining referential integrity among serialized instances (e.g. where associations are specified in one or more XML Metadata Interchange, or “XML”, documents) because redundant information about the values of the same association will not have to be written across different documents or storage repositories.
Type:
Grant
Filed:
April 5, 2001
Date of Patent:
June 6, 2006
Assignee:
International Business Machines Corporation
Inventors:
Daniel C. Berg, Martin Nally, Lawrence S. Rich