摘要:
A computer implemented method for accessing data begins with receipt of a data access request. In response to determining that the requested data needs to be acquired in real time from an original data source, the processor acquires and stores that data. In response to determining that the data cannot be acquired in real time from the data source, the processor acquires the data from a configuration management database in which the requested data was previously stored.
摘要:
A computer implemented method, apparatus, and computer usable program code to aggregate data. Data is parsed for a behavior tag assigned to a portion of the data. In response to detecting a behavior tag, a determination is made as to whether a policy is associated with the behavior tag. The policy associated with a behavior tag defines how the portion of the data assigned to the behavior tag is to be aggregated. The portion of the data is aggregated using the policy associated with the behavior tag.
摘要:
A method, system and process for enhancing a database server by improving memory allocation and memory copying during the process of reconstructing a data structure.
摘要:
A computer implemented method, apparatus, and computer usable program code for collecting data. The data is collected from a particular data source by an application portion of agent to form collected data. The application portion is associated with the particular data source in response to an event. The collected data stored in a temporary data store for transfer to a data storage system to form stored data. The stored data sent to the data storage system using a generic portion of the agent, wherein the generic portion of the agent is configured to send data to the data storage system.
摘要:
For concurrent access by a plurality of users to a data set in a memory, a computer system first searches for a write lock on a first portion of the data set which the user wishes to access. For no write lock detected, the request is granted by allowing write access to the first portion. A write lock is placed on the first portion of the data set to prevent other users from changing it, while allowing other users read access to the first portion. If a second user wants write access to a second not interesting portion of the data set, the process is similar. A search for a write lock on a second portion of the data set is conducted. If not found, the second user's request for write access to the second portion is granted. A write lock on the second portion is placed to prevent other users from changing the second portion while allowing read access. If a third user wants access to a third portion of the data set wherein the third shares some common elements with the first portion, but has other elements which are not shared, his request will partially granted to the portion of the third portion which is not shared by the first portion. A write lock is placed on the portion of the third portion to which the third user is allowed write access. When a user has finished with his portion of the data set, the write lock is removed and the parent version of the data set is updated.
摘要:
A method of hierarchical LDAP searching in an LDAP directory service having a relational database management system (DBMS) as a backing store. According to the invention, entries in a naming hierarchy are mapped into first and second relational tables: a parent table, and a descendant table. These tables are used to "filter" lists of entries returned from a search to ensure that only entries within a given search scope are retained for evaluation. Thus, for example, the parent table is used during an LDAP one level search, and the descendant table is used during an LDAP subtree search. In either case, use of the parent or descendant table obviates recursive queries through the naming directory.
摘要:
A method of enabling persistent access by a Web server to files stored in a distributed file system of a distributed computing environment that includes a security service. A session manager is used to perform a proxy login to the security service on behalf of the Web server. Persistent operation of the session manager is ensured by periodically spawning new instances of the session manager process. Each new instance preferably initializes itself against a binding file. A prior instance of the session manager is maintained in an active state for at least a period of time during which the new instance of the session manager initializes itself. Upon receipt of a given transaction request from a Web client to the Web server, a determination is made regarding whether a new instance of the session manager process has been spawned while the Web server was otherwise idle. If so, the Web server is re-bound to the new instance of the session manager process so that the new instance of the session manager process can respond to the transaction request.
摘要:
A method, system and process for enhancing a database server by improving dynamic memory allocation and memory copying during the process of reconstructing a data structure from a communication buffer.
摘要:
A consistency control method for a fault tolerant file system. Data files in this fault tolerant file system are replicated on file system servers. The update request will be sent to all the file servers. However, since different servers might receive update requests in different order. The "dual-counter" scheme described in this invention is to resolve this problem. To perform an update, the client needs to obtain a sequence number from a sequencer. Two counters will be maintained by each server. The first counter is used primarily by the sequencer to sent out sequence numbers. The second counter is used by the server to keep track of the largest sequence number of requests which have been completed on the server. With the sequence numbers and the first and second counters, updates will be performed in the same order on different file servers.
摘要:
A work performance acquisition module of an intelligent assets maintenance system obtains work performance data of intelligent assets from a device operation production control system. A status monitoring module obtains operation status data of the intelligent assets. A loss calculation module calculates a loss degree of the intelligent assets according to the obtained work performance and operation status data. A maintenance determining module determines whether the intelligent assets need maintenance according to the loss degree of the intelligent assets.