摘要:
An apparatus, program product and method are capable of dynamically assigning different code base identifiers to different classes defined in the same code base during class load operations to enable different code base-correlated policies to be assigned to such classes, thereby effectively granting different access permissions to classes that are defined within the same code base.
摘要:
A computer implemented method, apparatus and program product receives user input requesting historical data associated with an entity bean, and generates event information according to the user input. The event information is stored and used to determine the historical bean data. Where so desired, the determination may involve automatically performing statistical analysis relating to the bean.
摘要:
Technologies for switching a set of nodes in an overlay network from one relay tree configuration to another without duplicate packets or packet loss at any of the nodes. A commander node calculates a new relay tree as well as a media stream set configuration for each node in the overlay network, each media stream set corresponding to the new relay tree. Media stream sets include a unique version number or the like that identifies the specific relay tree configuration of which they are a part. Also provided are technologies for associating a media stream with a particular relay tree configuration and the corresponding media stream set of each node in the overlay network.
摘要:
A container managed persistent (CMP) enterprise java bean (EJB) framework includes support for accessing multiple data sources within one deployment. A CMP EJB includes a number of different attributes that can be a variety of values. A session EJB that acts as a front-end to the CMP EJP includes a resource reference for each of the different data sources that the entity CMP EJB may utilize. The application server environment includes a map that defines mapping information between the attributes of the CMP EJB and the resource references of the session EJB. Using the mapping information during runtime, the application server connects to the appropriate data source.
摘要:
Video data from an upload client is received at a hosting node. A request from a download client is received at a bootstrapping node to receive the video data. The download client to receive the video data directly from the hosting node when the hosting node is below a threshold, wherein the threshold is based at least in part on the maximum number of download clients the hosting node can stream to simultaneously. The download client to receive the video data from peers in a peer-to-peer overlay when the hosting node above the threshold.
摘要:
A method, apparatus and program product retrieve, in the client, class metadata of an object that is used by the computer program from a remote service, including retrieving object type data of the object, and dynamically generate on the client a proxy object for the object on the server. The object is dynamically created and resides on a server, and the type of the object is unknown to the computer program prior to retrieval of the class metadata. Furthermore, casting a type of the proxy object to a type that is specific to an interface known to the computer program without receiving any class cast exception. By doing so, the dynamically created proxy object may be utilized for remote method invocation in a distributed environment utilizing objects dynamically created on the server, often avoiding a costly deployment process and independent of any protocols.
摘要:
Improved reliability, availability, and serviceability (RAS) is provided by an extensible and flexible firmware architecture. The architecture provides management for events, where an event is a response to an imminent failure of or capacity change requirement applicable to a component of the system. In response to an event, control of a system is transferred from an operating system to the firmware manager. The manager identifies an action that is specified by the event. Based on the action, the firmware manager selects a firmware handler from a plurality of firmware handlers. The firmware manager dispatches the selected firmware handler to perform the specified action. The firmware manager and the dispatched firmware handler exchange system-independent information regarding the event. The firmware manager also manages time-slices for the performance of the specified action by the dispatched firmware handler.
摘要:
The present invention provides chemokine-like factor (CKLF) polypeptides with chemotactic and hematopoietic stimulating activities and polynucleotides encoding such polypeptides. Additionally, a method for producing such CKLF polypeptides by recombinant techniques is provided. Also provided are the antibodies and antagonists against such polypeptides. The present invention further disclose a drug compound comprising a therapeutically effective amount of such CKLF polypeptides as well as pharmaceutically acceptable excipients and carriers. Also disclosed are the uses of such CKLF polypeptides and polynucleotides in diagnostics or therapeutics to treat immunodeficiency, hematopoietic diseases and primary tumors.
摘要:
A distributed system checker may check a distributed system against events to detect bugs in the distributed system. The events may include machines crashes, network partitions, and packet losses, for example. The distributed system checker may check a distributed system that can have multiple threads and multiple processes running on multiple nodes. To obtain control over a distributed system, a distributed system checker may insert an interposition layer between a process and the operating system on each node.
摘要:
A method, system and program product allow an originator of an electronic mail message to create and attach different topics to messages. Recipients of messages can view different topics from an electronic mail message and can take actions on specific topics and related content. Electronic mail messages can be organized based on topics. Each topic in a string of electronic mail messages is chain-scoped with its lifetime bounded by an electronic mail chain.