摘要:
Techniques for debugging applications are provided. Access to an application is controlled by a wrapper. The wrapper intercepts calls to the application and records the calls. The calls are then passed to the application for processing. The recorded calls form a log which may be analyzed or mined to detect error conditions or undesirable performance characteristics associated with the application independent of source associated with the application.
摘要:
Techniques are provided for the delivery of client services and for the establishment of client processing environments. A client receives services within a processing environment which is defined by a processing container. The processing container includes one or more processing groups, and each processing group has a particular context that supports one or more applications or services which are processing within that context. The processing groups communicate with one another via connector interfaces included within the processing container. Services and processing containers can be dynamically added or removed from the processing container.
摘要:
Techniques for dynamic cloud-based edge service computing are provided. A principal requests a service and a policy is evaluated to select a cloud processing environment capable of supplying the service from an optimal network location as defined by the policy. The selected cloud processing environment is configured to supply the requested service and to monitor and control access of the principal to the requested service from the selected cloud processing environment.
摘要:
Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.
摘要:
Techniques for the transparent takeover of network connections are presented. A first server is engaged in a connection with a client. The transactions of the connection and the traffic are monitored by a traffic cache manager. The first server records sequence numbers for the transactions with a synchronization store. If the first server fails, a last recorded sequence number is updated by the traffic cache manager within the synchronization store on behalf of a second server, which is to takeover the connection for the unresponsive first server.
摘要:
Techniques for generic data access are provided. A middle-tier server agent uses data providers that can communicate with backend resources. A request received in a first format is used to identify a specific data provider by the middle-tier server agent; the data provider uses the first format to communicate with a specific backend resource in a second format. Results from the specific backend resource are returned from the data provider in the first format and passed to a client that initially made the request.
摘要:
Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
摘要:
System and method for enabling user access of cloud assets are described. In one embodiment, a method comprises authenticating a user to a system comprising a cloud computing environment in which a plurality of cloud assets are hosted; assembling a deployment associated with the authenticated user in accordance with a policy, the deployment comprising designated ones of the cloud assets; and providing a secure mechanism by which the designated ones of the cloud assets comprising the deployment are accessible by the authenticated user.
摘要:
A schema identifies a field in a document as a key field. Using an XML schema, the key field can be identified by attaching a property to the element or attribute to be used as a key field (if the XML schema standard is modified to support properties). Otherwise, attributes can be used to identify the element or attribute that is to be a key field. Fields can be primary keys, secondary keys, or foreign keys, as supported by data stores. The data store can analyze the schema to determine which fields are key fields. The key fields can be duplicated in the native format of the data store for use in indexing, searching, and other data store functions on the documents. The documents themselves can be stored as objects, into which the data store cannot reach, or can be stored in the native format of the data store, as desired.
摘要:
Techniques for verifiable virtualized storage port assignments in virtual machines are provided. Configuration data for a virtual machine is defined to include a mechanism to verify an identity for the virtual machine in a target physical environment and a mechanism to verify a storage port assignment for use in the target physical processing environment. Before the target physical processing environment initiates the virtual machine an identity for the virtual machine is acquired, the configuration data is verified and the storage port assignment is verified.