摘要:
A system, method, and computer program for identifying evolving regions in a graph of interrelated nodes representing a computer system environment. The method includes generating a series of samples (302) of the environment. Each sample includes a plurality of interrelated nodes (502) and at least one edge (504) classified into a plurality of at least one of node type and edge type, respectively. A summary (900) of the plurality of at least one of node type (502) and edge type (504) is created for the series of samples (302). A summary instance (312) of the summary (900) is created for each sample. At least one summary instance (312) is compared to at least one subsequent summary instance (314) and at least one result (318) is stored in memory (106). A successive behavior is characterized for one or more of the at least one of the node type and the edge type.
摘要:
Embodiments of the present invention provide a method, system and computer program product for declarative instance based access control for persistent application resources in a multi-tier application. In one embodiment of the invention, a method for instance based access control in a persistent application resource can be provided. The method can include creating one or more instances of an persistent application resource for a particular user or based on attributes of the user, coupling the instance(s) of the persistent application resource to a database implementing row-level access control, initializing access to the database according to a role or attribute for the particular user, and accessing a restricted set of data in the database through the instance(s) of the persistent application resource.
摘要:
A processor copies first and second installable binary files into first and second disk images of first and second virtual machines, respectively, before instantiating the images. The processor can copy first installation parameters and second installation parameters into the first image. The processor copies additional first installation parameters and additional second installation parameters into the second image. The processor at least partially executes a first installation process, based on the first installation parameters, to install the first installable binary files, and a second installation process, based on the additional second installation parameters, to install the second installable binary files. The processor at least partially executes the installation processes in an interleaved manner in relation to one another, based on dependencies. After instantiating the images, the processor can execute scripts based on the second installation parameters and the additional second installation parameters to complete installation.
摘要:
A mechanism is provided in a data processing system for providing portable composite solutions. The mechanism deploys a set of virtual images for a plurality of components of a composite solution to a build environment to form a set of virtual machines. The mechanism deploys a network virtual image to the build environment to form a network virtual machine. The network virtual machine comprises a router. The mechanism configures the router to create a private subnet with a set of fixed addresses and set of host names for the composite solution. Optionally, the mechanism may discover the fixed addresses during the build phase. The mechanism optionally installs middleware components to the set of virtual machines for the composite solution to form a set of solution virtual machines. The mechanism captures the set of solution virtual machines as a set of solution virtual images as a portable composite solution.
摘要:
A mechanism is provided in a data processing system for providing portable composite solutions. The mechanism deploys a set of virtual images for a plurality of components of a composite solution to a build environment to form a set of virtual machines. The mechanism deploys a network virtual image to the build environment to form a network virtual machine The network virtual machine comprises a router. The mechanism configures the router to create a private subnet with a set of fixed addresses and set of host names for the composite solution. Optionally, the mechanism may discover the fixed addresses during the build phase. The mechanism optionally installs middleware components to the set of virtual machines for the composite solution to form a set of solution virtual machines. The mechanism captures the set of solution virtual machines as a set of solution virtual images as a portable composite solution.
摘要:
A processor copies first and second installable binary files into first and second disk images of first and second virtual machines, respectively, before instantiating the images. The processor can copy first installation parameters and second installation parameters into the first image. The processor copies additional first installation parameters and additional second installation parameters into the second image. The processor at least partially executes a first installation process, based on the first installation parameters, to install the first installable binary files, and a second installation process, based on the additional second installation parameters, to install the second installable binary files. The processor at least partially executes the installation processes in an interleaved manner in relation to one another, based on dependencies. After instantiating the images, the processor can execute scripts based on the second installation parameters and the additional second installation parameters to complete installation.
摘要:
The present invention discloses a method and system for generating Simple Object Access Protocol (SOAP) message, wherein, at least one first information sets are pre-stored and each of the first information sets contains at least one piece of information. The method comprises: generating a first SOAP message which contains a second information set that contains at least one piece of information; retrieving a first information set that corresponds to the second information set; and generating a second SOAP message using the retrieved first information set and the first SOAP message.
摘要:
The different illustrative embodiments provide a method, computer program product, and apparatus for converting a first image for a virtual machine formatted for a first virtual environment. A second image is created, wherein the second image is non-specific to any virtual environment. A determination is made whether a portion of files to be copied from the first virtual image to the second virtual image should be replaced using a compatibility matrix, wherein the compatibility matrix identifies changes between the first virtual environment and a second virtual environment. A replacement for the portion of the files is copied to the second image using the compatibility matrix responsive to a determination that the portion of the files in the set of files should be replaced. The file is copied to the second image responsive to an absence of a determination that the each file in the set of files should be replaced.
摘要:
Embodiments of the present invention provide a method, system and computer program product for aggregating database and component logic authorization rules in a multi-tier application. In an embodiment of the invention, a method for aggregating database and component logic authorization rules in a multi-tier application system can include aggregating role-based authorization rules for both a persistence layer and a logic layer of a multi-tier application in a unified policy, distributing the unified policy to both the persistence layer and the logic layer of the multi-tier application, transforming the unified policy into respectively a set of role based permissions for the persistence layer and a set of role based permissions for the logic layer, and applying the set of role based permissions for the persistence layer in the persistence layer, and the set of role based permissions for the logic layer in the logic layer of the multi-tier application.
摘要:
A system, method, and computer program for identifying evolving regions in a graph of interrelated nodes representing a computer system environment. The method includes generating a series of samples (302) of the environment. Each sample includes a plurality of interrelated nodes (502) and at least one edge (504) classified into a plurality of at least one of node type and edge type, respectively. A summary (900) of the plurality of at least one of node type (502) and edge type (504) is created for the series of samples (302). A summary instance (312) of the summary (900) is created for each sample. At least one summary instance (312) is compared to at least one subsequent summary instance (314) and at least one result (318) is stored in memory (106). A successive behavior is characterized for one or more of the at least one of the node type and the edge type.