摘要:
Methods and systems for calling a service provider using a service manager and a local client proxy. In one exemplary embodiment, a method is provided to instantiate the service manager, the service provider, and the local client proxy. In response to the service provider, the local client proxy calls another service provider through the service manager to complete the call to the other service provider.
摘要:
Embodiments consistent with the principles of the invention check, before the data underlying a changed primary object is persistently save, for related objects whose data is also affected by the change. The related objects may be two or more degrees removed from the primary object. The changed primary object and all its changed related objects are then persistently saved together, so that the saved data is consistent across the related objects. Embodiments consistent with the principles of the invention also provide a state model for controlling access to services by clients and for making services available by servers.
摘要:
Embodiments consistent with the principles of the invention check, before the data underlying a changed primary object is persistently save, for related objects whose data is also affected by the change. The related objects may be two or more degrees removed from the primary object. The changed primary object and all its changed related objects are then persistently saved together, so that the saved data is consistent across the related objects. Embodiments consistent with the principles of the invention also provide a state model for controlling access to services by clients and for making services available by servers.
摘要:
Methods and systems for calling a service provider using a service manager and a local client proxy. In one exemplary embodiment, a method is provided to instantiate the service manager, the service provider, and the local client proxy. In response to the service provider, the local client proxy calls another service provider through the service manager to complete the call to the other service provider.
摘要:
Methods and apparatus, including computer program products, are provided for mapping at run time a value, such as a technical identification (ID) key, to text based on a text association. In one exemplary embodiment, a computer-implemented method includes receiving at run time a request, from a user interface at a client computer, the request associated with an object at a server; instantiating, at a server, a service for mapping at run time the value to text based on the text association, the text association being determined before run time; and at run time providing to a user interface at the client computer, the text based on the text association, such that the text is responsive to the request from the user interface.
摘要:
Methods and apparatus, including computer program products, are provided for mapping at run time a value, such as a technical identification (ID) key, to text based on a text association. In one exemplary embodiment, a computer-implemented method includes receiving at run time a request, from a user interface at a client computer, the request associated with an object at a server; instantiating, at a server, a service for mapping at run time the value to text based on the text association, the text association being determined before run time; and at run time providing to a user interface at the client computer, the text based on the text association, such that the text is responsive to the request from the user interface.
摘要:
Systems, methods and computer readable media are provided for the conformance testing of services through the utilization of a conformance control module. In one exemplary embodiment, the method may include comparing meta-data returned by the service to predetermined parameters to determine whether the meta-data conforms to the predetermined parameters. The method may also include determining a conformance violation exists when the comparison indicates the meta-data does not conform to the predetermined parameters. The method may further include determining a conformance violation does not exist when the comparison indicates the meta-data does conform to the predetermined parameters. Moreover, the method may include continuing execution of the service based on the results of the comparisons made.
摘要:
Methods and apparatus, including computer program products, for providing notifications of events include defining a set of standard events for objects in a back end system and operating on an object in the back end system using an instance of a service provider class. Conditions corresponding to a standard event from the set of standard events are detected. The conditions corresponding to the standard event are defined by meta data stored in a repository. One or more subscribers to the standard event are notified in response to a detected condition.
摘要:
Systems, methods and computer readable media are provided for the conformance testing of services through the utilization of a conformance control module. In one exemplary embodiment, the method may include comparing meta-data returned by the service to predetermined parameters to determine whether the meta-data conforms to the predetermined parameters. The method may also include determining a conformance violation exists when the comparison indicates the meta-data does not conform to the predetermined parameters. The method may further include determining a conformance violation does not exist when the comparison indicates the meta-data does conform to the predetermined parameters. Moreover, the method may include continuing execution of the service based on the results of the comparisons made.
摘要:
Methods and apparatus, including computer program products, for providing notifications of events include defining a set of standard events for objects in a back end system and operating on an object in the back end system using an instance of a service provider class. Conditions corresponding to a standard event from the set of standard events are detected. The conditions corresponding to the standard event are defined by meta data stored in a repository. One or more subscribers to the standard event are notified in response to a detected condition.