摘要:
Methods, apparatuses, and products are disclosed for session replication that include enqueueing sessions on a replication queue and flushing enqueued sessions, from the replication queue to a replication peer, in dependence upon flushing criteria, for storage on a replication medium. The replication medium may be non-volatile storage in a database or remote random access memory. Flushing may be carried out periodically or in dependence upon replication queue depth. Flushing may include aggregating sessions from the replication queue for transmission to the replication peer.
摘要:
Method and apparatus for providing information services to telephony devices. In one embodiment, a telephony device transmits a request for telephone numbers related to a provided telephone number. A service provider looks up related telephone numbers and provided the related telephone numbers to the requesting telephony device. The provided telephone number and the related telephone numbers may be related by being associated with the same or similar type of business. In one embodiment, the information services are fee-based.
摘要:
Exemplary methods, systems, and products are disclosed for managing transactions for Enterprise Java Beans (“EJBs”) that typically include receiving in an EJB container a plurality of container managed transactions for EJB components having container managed persistence. Each transaction typically comprises at least one computer program instruction affecting a data value of an EJB component, and typical embodiments include combining two or more of the transactions into a single transaction. Typical embodiments also include combining two or more of the instructions into a single instruction. Embodiments may include maintaining, by an EJB container, a pool of open transactions.
摘要:
An emergency notification feature for a mobile station calls for automatically and periodically activating the mobile station and polling a wireless communications network for emergency messages. Notice of an emergency is provided to a user of the mobile station through at least one of a ring tone and an automatic call-back.
摘要:
A method for autonomically detecting and recreating exceptions occurring in a runtime environment during software development/testing. Dynamically-generated code of an exception detecting and recreating (EDR) utility is inserted into the application programming interface (API) entry points to the server to store method call parameter states by either cloning the objects or implementing Java serialization/de-serialization. The runtime listens for exceptions to be thrown and generates a java file that allows the API to be later invoked with the stored parameters for the specific interaction that generated/caused the exception. When the application is stopped, the java files generated are packaged into an application that will run on the server and allow re-execution of the problem paths.
摘要:
A method, apparatus, system, and signal-bearing medium that, in an embodiment, create a tag that identifies an application, store the tag in a class of the application, and count a number of times the tag appears in an entry nearest a top of a runtime stack. Counting the number of times the tag appears may include finding an entry nearest a top of a runtime stack that includes the tag and incrementing a count associated with the tag in response to the finding. The creating is performed in response to submission of the application to an application server. In an embodiment, the tag is created based on a cryptographic hash of an archive file that contains the application. In response to a method associated with the class requesting a remote service, the tag is embedded in a remote service request message, which is sent to a remote application server, where the tag is stored in a service class.
摘要:
A method for compensating for disruption caused by trace enablement is provided. The method includes receiving a selected target to run a program, receiving a selected program that has been identified as having a problem, and receiving a selected trace type. The method also includes enabling a trace compensator for identifying non-critical code in the selected program. The non-critical code is determined by the trace type. The method further includes running the program with a trace to identify the problem, the trace compensator causing the program to suppress the non-critical code for problem reproduction to adjust for timing discrepancies.
摘要:
An apparatus, program product and method associate a unique key with routines in an application to enable a profiler to ascertain whether to collect profile information for a routine during its execution. A key may be generated, for example, during deployment or installation of an application in an application server or other runtime environment, and subsequently associated with the routines in the application, e.g., by storing the key in the class and/or library files for the application. By doing so, each application in a runtime environment may be uniquely identified by a profiler during execution, such that profile information will only be collected for those applications for which profiling has been enabled.
摘要:
A method, system, and computer program product for enabling efficient start up of an application server with the components required for complete operation of the supported application. A pre-processor autonomically determines the specific services that are required by the application to be initiated within the application server during start up of the application. The specific services are selected from a comprehensive list of available services for start up of the application server. The application server is then started up with only the specific services required by the application, rather than the full list of services.
摘要:
Maintaining connections between application servers and databases in a multitier computer architecture, including providing, through a highly available connection proxy, connections between application servers and databases, where the highly available connection proxy implements a single call point for providing the connections; monitoring by the highly available connection proxy connected databases for database failures; and replacing by the highly available connection proxy a connection to a failing database with a connection to a replica of the failing database.