摘要:
Techniques are disclosed for processing messages in a messaging system, particularly during an overload condition. For example, a method of processing messages of an instant messaging system includes the following steps. A message from a first instant messaging user is received during an overload condition. A message type associated with the received message is determined. The method then decides whether to send the message to a second instant messaging user based on the determined message type of the received message. In another method, processing messages in an instant messaging system includes the following steps. Presence information associated with a first instant messaging system user is received. The presence information is sent to a second instant messaging system user when the second messaging system user requests the presence information associated with the first instant messaging system user.
摘要:
A method (and system) for managing and controlling allocation and de-allocation of resources based on a guaranteed amount of resource and additional resources based on a best effort for a plurality of customers, includes dynamically allocating server resources for a plurality of customers, such that the resources received by a customer are dynamically controlled and the customer receives a guaranteed minimum amount of resources as specified under a service level agreement (SLA).
摘要:
This invention provides methods and apparatus for validating that transformations that are expected to occur in an IP network are indeed occurring as expected. Generally, these transformations establish logical communication tunnels within an IP network between the devices that perform the transformation and the devices that perform the reverse transformation. The invention is useful to validate the configuration of devices that support a variety of IP transformation methods, including IP-security protocols using the standard Encrypted Secure Payload protocol and Authenticated Header protocols as defined by the IETF. The invention is particularly useful to validate cases in which transformations occur on the full path of a packet traversing between two machines in an IP network, or when the transformations only occur on part of this path.
摘要:
This invention provides methods and apparatus which provide a solution to the problem of server load balancing. Log files are collected from each server within a server cluster. The log files are analysed by the monitoring process to find file relations. The analysis uses a window to search for requests such that a file relation is established. Other techniques are described to establish file relations. Based on file relations files are merged into groups such that these groups of files can be distributed to N servers within a server cluster. The file merging process continues until there are N groups corresponding to the N servers. The files for each group are either distributed to each server, or all files are distributed to all servers and each server activates only the subset which comprises the group of files for that server. Once all files have been distributed to the servers, each server updates any links that point to other files that now may reside in a different location due to the redistribution of files.
摘要:
A method, system and product for resource constrained network elements to validate a set of records in a network repository by verifying validation information stored in the repository by a record validator. A record validator with adequate computational resources validates one or more set of records in a repository such a network directory, and stores validation information records in the repository. The resource-constrained network elements run simple checks to verify the validation information records thus stored. The validation information records may include the modification or creation time of validated records in the repository. The network elements compare the time stored in the validation information records to the actual modification or creation time of records to verify validity information. Cryptographic signature for enhanced security, and validation status records may be used to ensure fault-tolerant behavior.
摘要:
An adaptive data replication and caching system configured for deployment at the network edge. This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system.
摘要:
A system and method to self-configure a distributed system includes obtaining a description of a distributed system which has a plurality of computing nodes, each node being capable of performing any of a plurality of tasks in the description. At each node, a persona of that node is determined in accordance with the description such that the nodes are assigned tasks in the distributed system. Each node is reconfigured in accordance with the persona such that the nodes are linked in the distributed system to provide a self-configured distributed system for performing at least one application.
摘要:
A system and method to self-configure a distributed system includes obtaining a description of a distributed system which has a plurality of computing nodes, each node being capable of performing any of a plurality of tasks in the description. At each node, a persona of that node is determined in accordance with the description such that the nodes are assigned tasks in the distributed system. Each node is reconfigured in accordance with the persona such that the nodes are linked in the distributed system to provide a self-configured distributed system for performing at least one application.
摘要:
The present invention provides round-the-clock, in-home emergency notification service by employing wide-area wireless broadband servers to send alerts on an as-needed basis to notification terminals comprised of no-frills, battery-operated, in-home units which may be manufactured and packaged in a manner similar to smoke detectors and carbon monoxide detectors.
摘要:
A method (and system) for managing and controlling allocation and de-allocation of resources based on a guaranteed amount of resource and additional resources based on a best effort for a plurality of customers, includes dynamically allocating server resources for a plurality of customers, such that the resources received by a customer are dynamically controlled and the customer receives a guaranteed minimum amount of resources as specified under a service level agreement (SLA). The best effort is defined in the SLA as a range of service to be provided to the customer if server resources are currently available.