摘要:
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.
摘要:
A number of synchronization objects simultaneously usable during runtime by a group of threads within a multi-threaded execution environment is predicted by a processor that manages synchronization object allocations within the multi-threaded execution environment. A synchronization object pool is allocated with the predicted number of synchronization objects, each initialized with a deployment state of undeployed and an acquisition state of unlocked. Over time, the deployment state is changed between deployed and undeployed in response to requests by threads to deploy and undeploy the synchronization objects. The acquisition state is independently controlled as the synchronization objects are acquired and released by the threads. The allocated number of synchronization objects within the synchronization object pool is adjusted during the runtime in response to determined deployment rates of the allocated number of synchronization objects.
摘要:
A processor of a first loss-prevention configured mobile device detects a second loss-prevention configured mobile device in proximity of the first loss-prevention configured mobile device. Responsive to detecting the first and the second loss-prevention configured mobile devices in proximity, spatial separation of the first loss-prevention configured mobile device from the second loss-prevention configured mobile device beyond a configured separation distance is detected. A voice of an owner of the second loss-prevention configured mobile device is detected at the first loss-prevention configured mobile device located beyond the configured separation distance. An alert is generated at the first loss-prevention configured mobile device that indicates that the owner of the second loss-prevention configured mobile device is separated from the second loss-prevention configured mobile device.
摘要:
A principal model is configured to facilitate automatic generation of at least one resource for use by a computer-executable application. The principal model includes a group of classes, references, attributes, and associations between any of the classes. At least one model item required for a task that is absent from the principal model is identified. The absent model item is instantiated in a decoration model that operates with the principal model to augment operational functionality of the principal model. The decoration model includes a class, a reference, and an attribute for any corresponding one of the group of classes, references, and attributes of the principal model.
摘要:
In response to receipt of a process-level input request that is subject to business-level requirements, multiple sets of attributes are identified. The sets of attributes are each from one of multiple informational domains that represent processing factors associated with at least the process-level input request, contemporaneous infrastructure processing capabilities, and historical process performance of similar processes. The multiple sets of attributes from the multiple informational domains are hashed as a vector into an initial process prioritization. The attributes of the hashed vector of the multiple sets of attributes from the multiple informational domains are weighted in the initial process prioritization into a hashed-weighted resulting process prioritization. The process-level input request is assigned to a process category based upon the hashed-weighted resulting process prioritization.
摘要:
Placement of instances of virtual machine (VM) images in a cloud computing environment is optimized. A request is received to deploy a new VM image instance. User-specific and generic VM resource usage profiles are read that include resource consumption data. Resource pool profiles for multiple resource pools are read that include resource consumption data for the resource pools. For each of the resource pool profiles, a selected VM resource usage profile is analyzed and aligned with the resource pool profiles. An aggregated resource consumption profile is calculated. A determination is made of one of multiple resource pools with the least aggregated resource consumption.
摘要:
User input including a social network notification symbol followed by a social network tag is detected in association with a social network user interface. The social network tag includes a text keyword that identifies a social network topic within the social network. A subset of social network users within the social network that follow the social network topic identified by the text keyword of the social network tag is determined. A referential third-party social network user notification subset within the social network is defined as the determined subset of social network users within the social network that follow the social network topic. A referential third-party social network notification is published to the defined referential third-party social network user notification subset within the social network. The referential third-party social network notification includes the detected user input that includes the social network notification symbol followed by the social network tag.
摘要:
Establishment of an exclusive lock on each of an outer database ownership table and an inner database ownership table is attempted. In response to establishing the exclusive lock on each of the outer database ownership table and the inner database ownership table, a switch is made to a pair of overlapping shared locks on each of the outer database ownership table and the inner database ownership table. Release and re-acquisition of each of the pair of overlapping shared locks on the outer database ownership table and the inner database ownership table is alternated.
摘要:
An administrative control interface is provided that controls deployed application server plugins that operate within an application-server plugin framework deployed at a group of application servers. The administrative control interface controls dynamic adjustment of runtime application server plugin configurations that perform request-level management and server-level management of the group of application servers. Request-level application server functionality and server-level application server functionality of at least one of the group of application servers is controlled using at least one of the deployed application server plugins as specified by application-server plugin commands received from the administrative control interface.
摘要:
A portion of a transaction is received at a distributed transaction system from an initiator region. The distributed transaction system operates under a multi-tier two-phase commit protocol. A local unit of work is established that represents the portion of the transaction received from the initiator region. Processing of the local unit of work is invoked with at least one transaction participant. An indication is received from the initiator region to assume a role of transaction coordinator for the transaction. The initiator region is instructed to commit last relative to the at least one transaction participant of the local unit of work.