Abstract: A method and program product for tracking a file attachment in an e-mail is provided. The method includes attaching one or more file attachments to an e-mail, selecting one or more return receipt properties for the file attachments attached to the e-mail, sending the e-mail to one or more intended recipients and writing to an e-mail data log file a set of details pertaining to the file attachments attached to the e-mail sent, such that a sender is able to track in the e-mail data log file any file attachments attached to the e-mail sent. Preferably, the method includes notifying the sender when either a delivery failure or a delivery discrepancy occurs for any file attachment attached to the e-mail sent to any intended recipients. More preferably, the method includes managing the set of details pertaining to the file attachments in the e-mail data log file.
Type:
Grant
Filed:
November 3, 2005
Date of Patent:
June 28, 2011
Assignee:
International Business Machines Corporation
Inventors:
Fonda J. Daniels, Ruthie D. Lyle, Demethria J. Ramseur
Abstract: Correcting information in an electronic mail of a recipient and sending notification of the corrected information. Information is corrected in a received e-mail by a recipient of the received e-mail, and a correction note is generated that contains the correction. The correction note is used by a correcting user agent to correct information in the received e-mail for any other recipients and the sender of the received e-mail. The correction note is sent to the other recipients and the sender of the received e-mail.
Type:
Grant
Filed:
November 8, 2005
Date of Patent:
February 1, 2011
Assignee:
International Business Machines Corporation
Inventors:
Dharmesh N. Bhakta, Trung Q. Ly, Juan Francisco Obas, Lakshmi N. Potluri, Guillermo Jesus Silva
Abstract: A method for managing a session over a network that involves multiple end points obtaining services via an application server, the method involving: after the end points have registered with the application server for the session, establishing initial policies for network traffic flows for each end point participating in the session; after establishing the initial policies, determining information about the network traffic flows for at least some of the multiple end points participating in the session; from the information determined about the network traffic flows, identifying which of the multiple end points is functioning as a host server for the session; and after identifying which of the multiple end points is functioning as the host server, establishing new policies for network traffic flows for the multiple end points, wherein under the new policies fewer network resources are reserved for each of the multiple end points other than and as compared to the end point functioning as the host server.
Abstract: A system processes data related to an electronic mail database by identifying a set of electronic mail databases within a mail domain of an organization and receiving a data collection policy identifying metrics to collect from the set of electronic mail databases. The system executes the data collection policy against at least a portion of the set of electronic mail databases to collect mail summary data containing values for the metrics for mail data stored within the electronic mail database. The system provides the mail summary data to a mail report generator to allow the mail report generator to produce a mail report based on the mail summary data.
Abstract: Multiple servers such as a main server as well as one or more corresponding sub-servers manage configuration information associated with a storage area network. A sub-server operates differently depending on whether the sub-server has been “integrated” with a main server in the storage area network. For example, in response to detecting a presence of a main server in the storage area network and that the corresponding sub-server has been integrated with the main server, a respective sub-server initiates execution of at least a portion of function calls associated with a respective service at the main server in lieu of executing the function calls locally at the respective sub-server. In the absence of the main server and/or integration, the sub-server operates independently and executes function calls locally rather than forward function calls associated with a respective service to the main server.
Abstract: A user interface in a file-based networked storage server enables a user to selectively enable or disable an option to require read-after-write verification for sets of data stored by the file-based networked storage server. In response to a request from a client, specified data is written to a magnetic storage device managed by the file-based networked storage server. A determination is made of whether the specified data is associated with a set of data for which the option to require read-after-write verification is enabled, and if so, then the specified data written to the magnetic storage device is verified, prior to, and as a precondition of, acknowledging completion of the write to the client. The specified data written to the magnetic storage device is designated as being in a WORM state only after successful completion of said writing and said verifying.