摘要:
Techniques of category-based fence are described. A category-based fence can correspond to a group of signal sources instead of a point location fixed to latitude and longitude coordinates. The group of signal sources can represent a category of entities, e.g., a particular business chain. The signal sources can be distributed to multiple discrete locations. A category-based fence associated with the group, accordingly, can correspond to multiple locations instead of a single point location and a radius. Each signal source in the group can be associated with a category identifier unique to the group and uniform among signal sources in the group. The category identifier can be programmed into each signal source. A mobile device can enter the category-based fence by entering any of the discrete locations when the mobile device detects the signal identifier. The mobile device can then execute an application program associated with the category-based fence.
摘要:
The invention relates to an application and a method for allowing the development or adaptation of an application for implementation in an embedded processing system. The apparatus and method includes the use of a programmer interface to allow the input of instructions and the development and/or adaptation of the application and to allow the use of one or more development and/or diagnostic tools via the programmer interface and the embedded system in which the application is to be implemented. A server is provided which allows communication between the said application and the embedded system during the development and/or adaptation of the application so as to allow a greater variety of user interaction and development and diagnostic tools to be available for use.
摘要:
The present invention concerns a lifecycle management system (1) for at least one computing component (20), comprising: a. means for defining a lifecycle model (100) comprising a plurality of lifecycle states (100a-100f) which can be assigned to the at least one computing component (20); b. wherein the plurality of lifecycle states (100a-100f) comprises a production state (100c) and wherein the lifecycle management system (1) ensures that the at least one computing component (20) can be productively used only if it is assigned the production state (100); c. means for receiving a lifecycle transition request for assigning a requested target lifecycle state (100a-100d) of the lifecycle model (100) to the at least one computing component (20); d. means for assigning a conditional lifecycle state (100e, 100f) to the at least one computing component (20) which is different from the requested target lifecycle state (100a-100d), and for specifying at least one condition (300) that has to be fulfilled in order for the at least one computing component (20) to be assigned the requested target lifecycle state (100a-100d); and e. means for automatically assigning the requested target lifecycle state (100a-100d) to the at least one computing component (20) when the at least one condition (300) is fulfilled.
摘要:
The invention relates to a method for executing an application in an NFC device comprising steps during which: a contactless link is established between a first NFC device (HD1) and a second NFC device (POI), the first NFC device transmits, via the contactless link, an identifier stored by the first NFC device, the second NFC device transmits an application identifier via the contactless link, the second NFC device transmits the identifier of the first NFC device and the identifier of the application to an application server (ASRV), the application server transmits the identifier of the first NFC device and the identifier of the application to an authentication server (HSRV), the authentication server checks the identification data, and if the first NFC device and the application are identified, the authentication server authorises the two NFC devices to execute the application by transmitting, to the application server, an identifier of a user of the first NFC device corresponding to the identifier of the first NFC device.
摘要:
The invention relates to a method and a system for transforming an object model by executing a transformation workflow consisting of transformation step instances (TSI), wherein the said transformation workflow is automatically generated on the basis of transformation artifacts (TA) produced or used as inputs by transformation step instances (TSI) derived from pre-defined transformation step templates (TST).
摘要:
Systems, methods, and computer program products are provided for adapting service entities using a declarative approach in a service framework. In accordance with one implementation, a method is provided for adapting service entities. The method includes the steps of retrieving at least one software entity from a first repository in response to a first input and receiving a declaration from a user for adapting the software entity. The method further includes the steps of adapting the software entity to an adapted software entity based on the declaration and storing the adapted software entity in a second repository.
摘要:
A method and system for automatically transitioning configuration settings among computer systems. Multiple configuration settings comprising a computer 'personality' are located on a source computing system using multiple transition rules from a personality object. The computer personality includes customization choices, data files, electronic mail, system preferences, application customization choices, the network environment, browser information, etc. The configuration settings are extracted from multiple locations on the source computing system. The multiple extracted configuration settings are stored in a pre-determined transition format. The multiple extracted configuration settings are manipulated. A transition package is created from the multiple manipulated configuration settings. The transition package includes the multiple manipulated configuration settings. The transition package is sent to a target computing system. The transition package is infused on the target computing system to automatically transition configuration settings from the source computing system to the target computing system. The method and system may vastly reduce transition, configuration and deployment times for service providers, corporations, and end-users when a new computing system is deployed.