摘要:
A method includes establishing an ad hoc network between at least a borrower and at least one lender of bandwidth and downloading requested data from a data source via the ad hoc network. The method further includes leaving the ad hoc network while maintaining some of the downloaded requested data. The method further includes reestablishing a connection to the data source for completing the downloading of the requested data.
摘要:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
摘要:
A method comprises establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two lenders as a multiplexer to manage data flow over the ad-hoc network between the borrower and lenders of the at least two lenders of bandwidth. The method may include providing a computer infrastructure to perform the steps of the invention. A system is also provided which includes a server having a database containing data associated with one or more lenders and a borrower in an ad-hoc network and at least one hardware and/or software component. The system may further includes computer usable medium having readable program code embodied in the medium to perform processes of the invention.
摘要:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
摘要:
Systems and methods for determining whether a node in a bandwidth-sharing ad hoc network should advertise as a borrower or a lender of bandwidth, or alternatively not advertise as either a borrower or lender of bandwidth. The method comprises establishing an ad-hoc network between nodes configured to be a borrower of bandwidth or a lender of bandwidth. At least one of the nodes advertises to be the borrower of bandwidth or the lender of bandwidth in the ad hoc network based on at least one selected factor.
摘要:
Systems and methods for compensating lenders of bandwidth in an ad hoc network and, more particularly, to systems and methods for providing payment strategies for bandwidth sharing in an ad-hoc network. The method comprises establishing an ad-hoc network between a borrower and at least one lender of bandwidth, and providing compensation instructions to compensate the at least one lender of bandwidth for lending the bandwidth to the borrower. The system may be a computer infrastructure for implementing the steps of the method.
摘要:
Systems and methods for filtering in bandwidth sharing ad hoc networks. A method includes maintaining at least one filtering parameter associated with formation of a bandwidth sharing ad hoc network. The method further includes preventing data transfer across the bandwidth sharing ad hoc network when a parameter of a request to establish the bandwidth sharing ad hoc network corresponds to the at least one filtering parameter.
摘要:
Method, system, and computer program product for enabling dynamic creation of a coalition of multiplexed ad hoc networks to form larger ad hoc networks for service provisioning, in which multiplexers can be connected together in either a hierarchical structure or a parallel structure. Includes method, system, and computer program product for forming an ad hoc network composed of a multiplexer coupling a borrower to at least one lender and forming a coalition composed of the ad hoc network and at least one other multiplexer.
摘要:
The present invention relates to fraud mitigation in a virtual universe through avatar identity determination. A method in accordance with an embodiment of the present invention includes: correlating an avatar in the virtual universe with a user; determining if the user is controlling a plurality of avatars in the virtual universe; and taking an action if it is determined that the user is controlling a plurality of avatars in the virtual universe.
摘要:
A method comprises establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two lenders as a multiplexer to manage data flow over the ad-hoc network between the borrower and lenders of the at least two lenders of bandwidth. The method may include providing a computer infrastructure to perform the steps of the invention. A system is also provided which includes a server having a database containing data associated with one or more lenders and a borrower in an ad-hoc network and at least one hardware and/or software component. The system may further includes computer usable medium having readable program code embodied in the medium to perform processes of the invention.