摘要:
Techniques for provisioning and decommissioning web servers in an automated manner. In one embodiment, a threshold value relating to an operational metric of a web server can be stored. The metric can be monitored as the web server receives requests. If the metric exceeds the threshold value, additional web servers can be automatically provisioned to handle a portion of the requests. If the metric falls below the threshold value, the additional web servers can be automatically decommissioned. In another embodiment, information can be logged pertaining to web server requests received over time. Based on this information and a threshold value, patterns of high/low server load can be determined and a policy can be generated identifying time intervals during which additional web servers should be provisioned (or existing web servers should be decommissioned). The policy can be used at server runtime to provision or decommission web servers at the identified intervals.
摘要:
A system and method verifies and repairs mirrored data sets. Verification modules executing on both the source and destination computers cooperate to identify a common persistent consistency point image (PCPI) of the source and destination data sets. Once the common image has been identified, the source sends a data stream comprising the data from the source data set to the destination to be compared with the destination data set.
摘要:
A machine-controlled method may include a web server identifying data to be cached and caching the data at the web server, the data originating from an external data source, an application server generating metadata that corresponds to the cached data, determining whether external data corresponding to the cached data has changed, receiving information corresponding to the changed external data, and updating the cached content based on the metadata and the received information.
摘要:
A message originator, such as an author of an email, can designate “section access settings” which can selectively permit or deny access of portions of the email's content. Recipients who are not authorized may not exercise the access right upon the designated portion of content. For example, an access right may allow displaying a section of text in an email message only for specified recipients and not to other recipients. In a preferred embodiment, the entire email content, including restricted portions, is provided to all recipients, including unauthorized recipients. Unauthorized recipients are prevented from exercising the access right even though the restricted portion has been received.