摘要:
A reservation management system includes at least one processing node that includes a memory and a processor. The at least one processing node further includes a set of reservation processing and transaction modules that manage and process reservation requests and inquiries. At least one general purpose database is communicatively coupled to the at least one processing node. The at least one general purpose database includes a set of pre-allocated tables of fixed length records. At least one persistent storage device is communicatively coupled to the at least one processing node. The general purpose database persistently stores the set of pre-allocated tables of fixed length records on the at least one persistent storage device.
摘要:
A method of sharing telematics data for a vehicle with service providers can include receiving the telematics data for the vehicle, where the telematics data dynamically changes over time, and comparing the telematics data with a privacy policy associated with the vehicle. The privacy policy can specify rules for selectively releasing items of the telematics data to one or more service providers. Data items of the telematics data can be selectively provided to the service providers according to the comparing step.
摘要:
Spatial rules involve locations of entities, such as wireless devices, from a mobile population. When evaluating rules in a communication network, attributes of an entity are determined, where one of the attributes comprises location of the entity. Rules are evaluated to produce one or more results, each of the rules operating on the attributes of the entity. Specified actions for the rules are performed, based on the evaluation of the rules. At least one of the specified actions comprises communicating a result to an application. The communication network may have a portion that is wireless. An attribute of the entity can include subscriber information and an entity generally corresponds to a particular subscriber in the communication network, but the entity may also correspond to multiple subscribers. An entity may be a wireless device, which can subscribe to a network. Rules can apply to particular geographical regions, to particular subscribers, to both, or to additional criteria.
摘要:
The present invention discloses a method for coordinating zero or more modelings, zero or more implementations and zero or more deployments of a computer system, including but not limited to computer systems involving sensors, actuators, or both and a system providing assistance to designers, implementers, and deployers of computer systems. The method and system including: defining one or more interfaces of one or more components; creating models for the one or more components, each of which is either a composite component model or a atomic component, model, creating the one or more composite components as instances of the composite component models creating the one or more atomic components as instances of the atomic component models creating a domain model by specifying the computational resources; and creating a deployment model by specifying one or more component-model instances and specifying which the component-model instances should be executed on which the computational resources of the domain model.
摘要:
The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
摘要:
The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
摘要:
Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.
摘要:
Aspects of the present invention provide a solution for passively monitoring a computer system. In an embodiment, an indexing agent operates on a physical server having a plurality of virtual servers. The indexing agent has a framework having a plurality of indexing layers. Each of these indexing layers is adapted to index a virtual server along a different abstraction level to extract abstraction level features indicative of changes in the virtual server. Further, each of the indexing layers has an application programming interface, which is adapted to receive one or more external indexing modules to be plugged into the framework. Each indexing module is adapted to provide instructions to the indexing agent while the indexing layer to which it is plugged is indexing the associated abstraction level of the virtual machine.
摘要:
The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
摘要:
Various embodiments of the present invention allow concurrent accesses to a cache. A request to update an object stored in a cache is received. A first data structure comprising a new value for the object is created in response to receiving the request. A cache pointer is atomically modified to point to the first data structure. A second data structure comprising an old value for the cached object is maintained until a process, which holds a pointer to the old value of the cached object, at least one of one of ends and indicates that the old value is no longer needed.