摘要:
A bandwidth throttling system is implemented on a server network connected to a computer network system to serve one or more clients over a network. The network server supports a service that presents multiple virtual services that can be individually requested by the clients. The bandwidth throttling system controls bandwidth on a per virtual service basis. The bandwidth throttling system has a measuring subsystem to measure the amount of bandwidth being used by each virtual service supported by the network server. The bandwidth throttling system also has a control subsystem to selectively throttle requests for a particular virtual service independently of others based upon the bandwidth used by the particular virtual service. The bandwidth throttling system utilizes an adaptive, hierarchical throttling strategy that is applied to each virtual service independently. The bandwidth throttling system compares the bandwidth usage for the virtual service against the administrator-defined thresholds for that virtual service. If the presently used bandwidth exceeds a first threshold, a first set of throttling actions is applied. If the presently used bandwidth exceeds a second threshold greater than the first threshold, a different second set of throttling actions is applied. In this manner, the administrator is given maximum control at setting throttling policies for each individual virtual service independently of other virtual services.
摘要:
A bandwidth throttling system is implemented on a server network connected to a computer network system to serve one or more clients over a network. The network server supports a service that presents multiple virtual services that can be individually requested by the clients. The bandwidth throttling system controls bandwidth on a per virtual service basis. The bandwidth throttling system has a measuring subsystem to measure the amount of bandwidth being used by each virtual service supported by the network server. The bandwidth throttling system also has a control subsystem to selectively throttle requests for a particular virtual service independently of others based upon the bandwidth used by the particular virtual service. The bandwidth throttling system utilizes an adaptive, hierarchical throttling strategy that is applied to each virtual service independently. The bandwidth throttling system compares the bandwidth usage for the virtual service against the administrator-defined thresholds for that virtual service. If the presently used bandwidth exceeds a first threshold, a first set of throttling actions is applied. If the presently used bandwidth exceeds a second threshold greater than the first threshold, a different second set of throttling actions is applied. In this manner, the administrator is given maximum control at setting throttling policies for each individual virtual service independently of other virtual services.
摘要:
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.
摘要:
Various types of data can be collected into a data set and related content and/or related concepts across the data in the data set and/or across search histories can be displayed as a visual representation. The related content/concepts can be presented as a function of incremental revealing of relationships. After reviewing the visual representation, a user can customize the data set and relationships by specifically excluding a related data segment. The visual representation can be applied across multiple searches or other obtained data. Through interaction with the visual representation, a user can drill down into common linkages of the data to more narrowly focus on a subset of the data and/or to refocus a search result and/or to provide annotations.
摘要:
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.
摘要:
Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services.
摘要:
The adaptive bandwidth throttling system implements a graceful diminution of services to the clients by delaying a first class of services provided by a network server in response to the effective bandwidth utilized by this network server exceeding a first threshold. If the demand for the bandwidth by this network server exceeds a second threshold, the bandwidth throttling system escalates the throttling response and blocks the first class of services from execution and can also concurrently delay execution of a second class of services. The implementation of the throttling process can be varied, to include additional levels of response or finer gradations of the response, to include subsets of a class of services. In addition, the threshold levels of bandwidth used to trigger the throttling response can be selected as desired by the system administrator.
摘要:
A server architecture has a server program to receive client requests and multiple applications to process the requests. Each application comprises a collection of agents that can be invoked to process the requests and an application manager that manages the collection of agents. The agents within the associated collection are independent from, but dynamically accessible by, the application manager. Depending on the request, the application manager selects one or more agents to generate content to be returned to the client. An application manager director manages the application managers and facilitates delivery of the client requests from the server program to the suitable application. The application managers are independent from, but dynamically accessible by, the application manager director. For a given request, the director selects the appropriate application manager to handle the request. The application manager, in turn, selects the appropriate agent to process the request. The applications, including the agents and associated application managers, can be run either in-process or out-of-process with the server program. The server architecture has a detection and recovery subsystem that detects when an out-of-process application crashes and then recovers the application from that crash. The subsystem logs requests when they are passed to the out-of-process application, and remove the requests from the log when responses to the requests are returned from the application. If the out-of-process application crashes while one or more requests are outstanding, those requests remain listed on the log and thus readily identifiable. During recovery, the subsystem cleans up the outstanding requests until the log is cleared. Thereafter, the subsystem restarts the failed application to restore the service.
摘要:
A server architecture has a server program to receive client requests and multiple applications to process the requests. Each application comprises a collection of agents that can be invoked to process the requests and an application manager that manages the collection of agents. The agents within the associated collection are independent from, but dynamically accessible by, the application manager. Depending on the request, the application manager selects one or more agents to generate content to be returned to the client. An application manager director manages the application managers and facilitates delivery of the client requests from the server program to the suitable application. The application managers are independent from, but dynamically accessible by, the application manager director. For a given request, the director selects the appropriate application manager to handle the request. The application manager, in turn, selects the appropriate agent to process the request. The director can be implemented as part of the server program. The applications, including the agents and associated application managers, can be run either in-process or out-of-process with the server program.
摘要:
Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service.