摘要:
A protocol management system is capable of detecting certain message protocols and applying policy rules to the detected message protocols that prevent intrusion, or abuse, of a network's resources. In one aspect, a protocol message gateway is configured to apply policy rules to high level message protocols, such as those that reside at layer 7 of the ISO protocol stack.
摘要:
A protocol management system is capable of detecting certain message protocols and applying policy rules to the detected message protocols that prevent intrusion, or abuse, of a network's resources. In one aspect, a protocol message gateway is configured to apply policy rules to high level message protocols, such as those that reside at layer 7 of the ISO protocol stack.
摘要:
The invention is a reorganization system having a reorganization application, a database management system, and one or more database files. The reorganization application communicates with the database management system and the one or more database files to reorganize an object, such as, for example, a table or index, while providing one or more clients substantially continuous access to the object. The reorganization application employs one or more trigger locks to synchronize the data in an original table and a reorganized table. The one or more trigger locks block select data modification operations while allowing one or more read-only operations and structural modification operations.
摘要:
The invention is a reorganization system having a reorganization application, a database management system, and one or more database files. The reorganization application communicates with the database management system and the one or more database files to reorganize an object, such as, for example, a table or index, while providing one or more clients substantially continuous access to the object. The reorganization application employs one or more trigger locks to synchronize the data in an original table and a reorganized table. The one or more trigger locks block select data modification operations while allowing one or more read-only operations and structural modification operations.
摘要:
A user agent residing within a remote client and configured to enforce message protocol policy is disclosed. The user agent includes a communications monitoring element that examines a communications connection between the client and an external message server to determine if the message server matches a restricted server attribute. The user agent also includes a communications controller element that works with the communications monitoring element to block communications between the client and the message server when the message server matches a restricted server attribute unless the communications are monitored by a protocol inspection gateway. The gateway intercepts the communications between the client and the message server and inspects a message protocol associated with the intercepted communications to determine if the message protocol matches a protocol definition file, and when a match occurs, apply a policy enforcement rule that overrides aspects of the message protocol associated with the intercepted communications.
摘要:
Automatic discovery of users associated with screen names for rogue protocols. A local server associates screen names with users, updating those associations in response to the protocol. The local server intercepts protocol messages, determines if they relate to unknown users, and obtains information associating screen names with users. Policy rules are applied to all screen names for the same user in an aggregated manner. The local server sends a request to an authorization server coupled to the local network, including the IP address for that screen name. The authorization server interrogates a registry file on the user workstation to obtain a GUID for that user, and from that GUID obtains a unique logon name for that user from the domain controller for a local network.
摘要:
An apparatus and method for measurement, analysis, and optimization of content delivery over a communications network is presented. In one embodiment, the apparatus detects data packets en route over a communications network. The detected data packets are read by the apparatus, combined into application messages, and further combined into user centric events. The events are analyzed to identify metrics and statistics relating to the delivery of content over a communications network and the experience of the end user. The metrics and statistics are saved in a data storage area. When the metrics exceed a configurable threshold, the apparatus provides real-time notification of content delivery problems or end user experience problems. Alternatively, the system can take action to proactively prevent anticipated content delivery problems or end user experience problems.
摘要:
Aspects of embodiments of the present disclosure include a highly available database cluster employing replication between two or more data files. The cluster also can maintain a connection with potentially geographically remote client application programs, including non-fault tolerant application programs, even in the event of one of the database management systems (DBMS) of the cluster becoming unavailable.
摘要:
Aspects of embodiments of the present disclosure include a highly available database cluster employing replication between two or more data files. The cluster also can maintain a connection with potentially geographically remote client application programs, including non-fault tolerant application programs, even in the event of one of the database management systems (DBMS) of the cluster becoming unavailable.
摘要:
A method for providing for the graceful degradation of the performance and functionality of a distributed computer application. A plurality of sensors monitor the performance and availability of various external resources and/or services required by the application, as well as the performance of various components of the application, and report the information to one or more controllers. The controllers make decisions based on rule-based criteria as to how to modify the behavior of the application according to the performance and availability of the various required resources and services. The controllers send messages to one or more actuators which effect the change in behavior of the application. A console displays the status of the system and allows users to modify the rules used to modify the behavior of the application.