摘要:
A method, program and system for editing data in a distributed computer network are provided. The invention comprises, in response to a request from a user, opening a log file and noting an entry associated with a message of interest. A message locator finds the message of interest in a designated location and bookmarks the message. A bookmark I/O component then locates and modifies the bookmarked message, and rewrites the modified message back to the designated location. The user can then view the modified message via a display device (i.e. GUI).
摘要:
A method, program, and system for dynamically configuring logging elements in a computer system are provided. The invention comprises a logging subsystem within the computer system, wherein the subsystem contains a plurality of logging elements which record events within the computer system. Inheritance relationships are established for the logging elements, which allows the logging elements to be configured either individually or as a group. The logging elements are then configured to record specified types of events and send the logging data of the events to specified locations within the computer system. In one embodiment of the present invention, the computer system is one of a plurality of nodes in a distributed computer network, wherein logging elements within a one network node can be remotely configured from a another node in the network.
摘要:
A method and apparatus for implementing a performance-based firewall at the protocol layer. Application Action Objects (AAOs) are created for requesting applications and are mapped to specific protocol events. Each AAO is then used as a Usage Based Firewall (UBF) to monitor all usage of the protocol at the endpoint identified by the application, thereby acting as a performance-based, protocol layer firewall for communications at that endpoint. A responsible logical gateway monitors the AAO and reports AAO activity to a UBF Manager at a control server to direct the AAO regarding continued usage based on bandwidth considerations
摘要:
A method for hybrid Discovery Library Adapter (DLA) book processing identifies a first logical group in a first DLA book, the first DLA book including a first set of objects constructed according to a Common Data Model (CDM) specification to represent a first set of corresponding instances of resources at a first time, the first logical group being a grouping of related subset of the first set of objects. A first value corresponding to the first logical group, and usable for ascertaining a difference between the first logical group and a second logical group in a second DLA book, is computed. A second value corresponding to the second logical group is computed and matched with the first value. If matched, a change in the first logical group as compared to the second logical group is identified and output to a DLA delta book.
摘要:
A method, a system, an apparatus, and a computer program product are presented for facilitating the customization, translation, or localization of messages, strings, or other program resources to be used by a locale-sensitive version of a Java™ program stored in a Java™ JAR file. After opening the JAR file, text strings within a resource bundle for a first locale can be determined through a particular process for inspecting the resource bundle. A resource bundle for a second locale containing translated versions of the text strings can be created through various means and then stored into the modified JAR file.
摘要:
A system and method for incorporating “Application Responsibility Scope” for each distributed application in a million device installation using network topology. A distributed discovery engine is first used to discover the physical network and to define the physical scope per distributed network device. Thereafter, the logical network is created based on the physical network topology. Using the logical network, the application responsibility scope is defined for each application. Once application responsibility scopes have been defined, that information can be used to determine in runtime if an application has access to a particular endpoint. In the instance of a self-replicating program, the scope can be used to define and limit the span of control of endpoints at which the application can replicate itself.
摘要:
A dead e-mail identification locator discovers dead e-mail addresses without forwarding messages to valid recipients. Existing headers in the mail protocol are extended to include a test header. A mail server that supports the protocol extension of the present invention may send a reply if the address does not exist and may discard the message if the address does exist. The test header allows a sender to test an e-mail address for validity without the message being forwarded to the user, as will be described below. The sender may be a dead e-mail locator program, which tests one or a plurality of e-mail addresses and compiles metrics regarding the quality of service. The metrics may be displayed to an administrator through a graphical user interface.
摘要:
A dead e-mail identification locator discovers dead e-mail addresses without forwarding messages to valid recipients. Existing headers in the mail protocol are extended to include a test header. A mail server that supports the protocol extension of the present invention may send a reply if the address does not exist and may discard the message if the address does exist. The test header allows a sender to test an e-mail address for validity without the message being forwarded to the user, as will be described below. The sender may be a dead e-mail locator program, which tests a plurality of e-mail addresses, such as an e-mail address list or white pages of e-mail addresses.
摘要:
Information for receiving by a computer system has attributes which the computer system is capable of interpreting for displaying on a two-dimensional display device. The information includes background and character attributes, according to which the characters are displayable in a color or shade that contrasts to the background. At least one of the characters has a certain character attribute for two dimensionally displaying, such bold, italic, underlining, font type or color. The information is rendered in a delineation that is tactile-detectable on a control surface of a three-dimensional display device. As thus rendered, a representation of the background is rendered in a first plane, while a representation one of the characters has a top surface of the character rendered in a second plane, and a representation of the one of the characters having the certain character attribute has a top surface of the character rendered in a third plane.
摘要:
A topographical aware Operating System (OS) which is platform and application independent. The OS contains a 2D to 3D rendering converter within a topographical framework, a Java Virtual Machine (JVM) interface and topographical application programming interface (APIs). The OS operates within a 2D environment and is capable of receiving input from a topographical input device and generates topographical output to a topographical or 2D output device. The OS further contains means for converting topographical input signals into topographical output, independent of which platform or applications which are running on the data processing system. In the preferred embodiment, the OS operates within a JVM environment and the topographical attributes enabled within the JVM environment include height, temperature, roughness, intensity, color, illumination, springiness etc. In another preferred embodiment, a topographical selection GUI is provided by which the OS may dynamically select attributes, etc. or allow user selection of particular attributes to apply to an object.