摘要:
A method, system and infrastructure that allow an application to run with specified versions of assemblies bound thereto, while allowing the application author, assembly publisher and/or an administrator to change the originally-specified version as desired. Each assembly may exist and run side-by-side on the system with other versions of the same assembly being used by other applications. An application manifest specifies any desired assembly versions, which may be redirected to another version (overridden) by an application configuration. A publisher configuration provided by an assembly publisher can similarly override the specified version. Lastly, an administrator configuration is capable of overriding other configuration versioning information. A table built from the manifest and any configuration redirection may be accessed during execution to quickly locate the appropriate version. The various configuration data structures themselves may be wrapped as assemblies, thereby enabling versioning of configurations.
摘要:
Methods and systems automatically download computer software components from a computer network like the Internet or an intranet. The methods and systems can be used to provide dynamic or interactive multimedia components in HTML documents with HTML tags. The HTML tags can contain parameters including uniform resource locators (URLs) which reference dynamic or interactive multimedia components on remote computers. Network browsers and other applications can obtain computer software components from a computer network like the Internet or an intranet in a uniform, portable, architecture-neutral, robust manner. The computer software components obtained can be used to provide a variety of new multimedia functionality to an application program.
摘要:
A software package manager uses a distribution unit containing components for a software package and a manifest file that describes the distribution unit to manage the installation, execution, and uninstallation of software packages on a computer. Information in the manifest file pertaining to a software package is stored in a code store data structure upon installation of the package. The manifest file also contains information that permits the software package manager to resolve any software dependencies upon installation. The software package manager uses the code store data structure to locate the required components when the software is executed and to remove the components appropriately when the software is uninstalled.
摘要:
A method and system to automatically locate, download, verify, install, register and display computer software components from a computer network like the Internet or an intranet. The method and system is used to provide dynamic or interactive multimedia components in HTML documents with HTML tags. The HTML tags contain parameters including uniform resource locators (URLs) which reference dynamic or interactive multimedia components on remote computers. Network browsers and other applications can obtain computer software components from a computer network like the Internet or an intranet in a uniform, portable, architecture-neutral, robust manner. The computer software components obtained can be used to provide a variety of new multimedia functionality to an application program which is stored on remote computers.
摘要翻译:一种自动定位,下载,验证,安装,注册和显示计算机软件组件的方法和系统,如Internet或Intranet等计算机网络。 该方法和系统用于使用HTML 标签在HTML文档中提供动态或交互式多媒体组件。 HTML 标签包含参数,包括在远程计算机上引用动态或交互式多媒体组件的统一资源定位符(URL)。 网络浏览器和其他应用程序可以从计算机网络(如Internet或Intranet)以统一,便携,架构中立,稳健的方式获取计算机软件组件。 获得的计算机软件组件可用于向存储在远程计算机上的应用程序提供各种新的多媒体功能。
摘要:
A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a hypervisor host that has a hypervisor and a proxy agent. The hypervisor manages execution of the VM. A mapping is maintained indicating which VMs execute on which hosts. When the host or application is to send a message or packet to the target VM, the mapping is consulted and the hypervisor host hosting the target VM is identified. The message or packet, which may identify the target VM, is transmitted to the hypervisor host. A proxy agent at the hypervisor host selects a communication channel between the hypervisor and the target VM. The hypervisor then passes the message or packet through the selected channel to the target VM.
摘要:
Techniques are described to allow substation of blocks into a virtual machine image of an executing virtual machine. A patch may be applied to a first virtual machine image. One or more blocks modified by the patch are identified and copied to a host having a virtual machine executing from a virtual machine image that is based on the first virtual machine image (prior to the patch). While the virtual machine is executing, the substitution blocks are applied (supersede) corresponding original blocks in the virtual machine image. A guest operating system in the virtual machine may either begin using an executable file in a substitution block. In addition, the guest operating system may be forced to flush from memory and cache executable code replaced by the substitution block.
摘要:
Software update techniques are described. In at least one implementation, updates are filtered based on criticality to operation of one or more items of software. A plurality of identities are published to a plurality of computing devices, each for a respective one of the updates that are filtered as being critical to the operation of the one or more items of software. The updates that are not filtered as being critical to the operation of the one or more items of software are made available via polling.
摘要:
Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.
摘要:
Regulatory compliance techniques are provided for dynamically modifying access to data based on the jurisdiction a user seeking access to the data is located within. Dynamically modifying access to data provides for a more efficient and accurate solution to regulatory compliance issues faced when hosting data in a central repository. Users can be notified when their access to data is modified due to a compliance issue. In addition, an audit history can be associated with data packets that allow an administrator or the like to view the history of data packet access. Finally, signatures associated with a data packet can be used to search data store(s) to track access to information within the data packet that may have been subsequently modified.
摘要:
An end user of an enterprise is enabled to receive secure remote presentation access to the assigned virtual machines in a hosted public cloud through the cloud provider's virtualization hosts and remote presentation gateway. Thus an enterprise administrator may purchase computing capacity from the cloud provider and further sub-divide the purchased computing capacity among enterprise end users. The cloud provider need not create shadow accounts for each end user of the enterprise. The cloud provider AD and the enterprise AD do not need to trust each other. The cloud provider also need not expose host information to the tenants. Authorization may be provided by using a combination of a custom authorization plug-in at the terminal services gateway and an indirection listener component at the virtualization host. The host details may also be abstracted when the client connects to the remote presentation gateway so as to protect the fabric from attack and enabling the tenant virtual machines to freely move across the cloud provider's virtualization hosts.