摘要:
An improved solution for allowing role based selective access to a document between a plurality of domains is provided. In an embodiment of the invention, a method for allowing selective access to a document between a plurality of domains includes: obtaining a composed section of the document at a first domain; applying a security policy at the first domain to the composed section of the document; distributing the security policy from the first domain to a second domain, wherein the second domain is different than the first domain; and applying the security policy to the document at the second domain.
摘要:
The invention described is a new and useful process for minimizing the overall rebate a provider disburses to customers when a service level agreement (SLA) breach occurs in a utility computing environment. Specifically, the process compares performance data and resource usage with the SLAs of the customers, and reallocates shared resources to those customers who represent a lesser penalty to the provider in the event of an SLA breach. The process determines which resources, used by customers representing the lesser penalty, are operating below peak capacity. The process then reallocates these under-utilized resources to those customers requiring additional resources to meet SLA thresholds. If all resources are operating at peak capacity, the process reallocates the resources to those customers whose SLAs represent a greater penalty in the event of an SLA breach as compared to those customers whose SLAs provide for a lesser penalty, thereby minimizing the total rebate due upon an SLA breach.
摘要:
A method and system for automatically creating a webpage using a scanned file created from a hard copy. A lookup table correlates a particular text symbol, such as a dollar sign (“$”), to a specific functionality. For example, if a chart in the hard copy has a dollar sign before values in the chart, then the lookup table associates the dollar sign with a pointer to an HTML routine (object) for creating an input box in a webpage. The HTML routines can be used to create new webpages or to modify existing webpages.
摘要:
A document merging method and system. The method includes receiving by a computing system from a first user, a plurality of documents and a command for tagging portions of each document according to various parameters. The computing system assigns identification tags to the portions of each document. The computing system receives from a second user, a command for generating a merged document. The computing system receives a selection of a first identification tag associated with a first document and a selection of a second identification tag associated with a second document. The computing system generates a merged document comprising a first portion of the first document and said second portion of the second document. The computing system stores the merged document.
摘要:
A weighted search program is disclosed. The weighted search program may be integrated into a translation program, or the weighted search program may be used independently with an available search engine. When integrated with the translation program, setting and weighting may be combined in a single search. In one embodiment, the weighting would be used in conjunction with a Pin Yin translation program so that a user could set some terms, and allocate a search weight to the remaining terms. The invention may be applied independently in Internet searching so that a user can apply weights to multiple elements of a search term.
摘要:
A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
摘要:
A document merging method and system. The method includes receiving by a computing system from a first user, a plurality of documents and a command for tagging portions of each document according to various parameters. The computing system assigns identification tags to the portions of each document. The computing system receives from a second user, a command for generating a merged document. The computing system receives a selection of a first identification tag associated with a first document and a selection of a second identification tag associated with a second document. The computing system generates a merged document comprising a first portion of the first document and said second portion of the second document. The computing system stores the merged document.
摘要:
A method for the rapid, dynamic conversion of Pin Yin words is disclosed. The present invention comprises a web-based computer program. The user identifies an input which may be a hybrid or unaccented Pin Yin word. The character is translated dynamically into an accented Pin Yin word, a Simplified Chinese character or a Traditional Chinese character. The translated character is then displayed. The translation is done in the web page without a round trip to the server.
摘要:
The invention described is a new and useful process for minimizing the overall rebate a provider disburses to customers when a service level agreement (SLA) breach occurs in a utility computing environment. Specifically, the process compares performance data and resource usage with the SLAs of the customers, and reallocates shared resources to those customers who represent a lesser penalty to the provider in the event of an SLA breach. The process determines which resources, used by customers representing the lesser penalty, are operating below peak capacity. The process then reallocates these under-utilized resources to those customers requiring additional resources to meet SLA thresholds. If all resources are operating at peak capacity, the process reallocates the resources to those customers whose SLAs represent a greater penalty in the event of an SLA breach as compared to those customers whose SLAs provide for a lesser penalty, thereby minimizing the total rebate due upon an SLA breach.
摘要:
Described herein are a system and method for remote mirroring of data and metadata from a local node to a remote node using out-of-order delivery (OOD), while also providing data integrity at the remote node. OOD may utilize increased throughput of multiple connection paths between nodes. A mirroring layer/engine executing on the local node may receive related groups of data and metadata for storing to the remote node, each related group comprising one or more data sets and one metadata set that describes and is associated with each of the one or more data sets in the related group. The mirroring layer provides data integrity at the remote node by ensuring that the metadata set of a related group is stored to the remote node only after all the data sets in the related group are stored to the remote node, thus ensuring data consistency at the remote node.