Abstract:
Techniques and tools are described for refining source-code query results. For example, source-code query results for a query can be generated, semantic clusters of the source-code query results can be generated, and based on a selection of a semantic cluster option, refined source-code query results can be sent. Also, for example, source-code query results can be received, selections of facet values associated with groups of the source-code query results can be sent, and based on selected facet values, a subset of the source-code query results can be received.
Abstract:
Described are methods, systems, and computer-readable storage media for decision making through convex hull optimization. A plurality of key performance indicators (KPIs) are received. A convex hull encompassing the plurality of KPIs is generated. Based at least in part on the generated convex hull and on at least one KPI satisfying a condition, an operating range of one or more other KPIs is determined. Moreover, specific values at which each of the other KPIs may be maintained in order to reach a defined objective are determined.
Abstract:
An online integrated development environment (IDE) providing code assist is described. A method for providing code assist within the online IDE comprises receiving a request from a client device to access a software development project, storing code assist information related to the software development project, and sending code assist information to the client device. The client device stores the received code assist information and uses it for local code assist operations at the client device. The client device can receive a subset of a database of code assist information stored at a server environment providing the online IDE. The client device accesses the online IDE via a web browser.
Abstract:
A service definition document (SDD) framework is provided for defining blended services that utilize multiple service endpoints. The SDD framework can comprise a first category that defines a service endpoint representing a blended service, a second category that defines a plurality of service endpoints utilized by the blended service, and a third category that defines execution of the blended service. Blended services can be provided by creating a model of a blended service and saving a representation of the model of the blended service in a service definition document (SDD) framework. A blended service defined in a SDD framework can be executed by receiving the SDD and executing the blended service as defined by the SDD using a service execution environment (SEE).
Abstract:
A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN.
Abstract:
A method, system, and computer program product for network management, including masking a true service set identifier (SSID) in beacon frame; and broadcasting the beacon frame with the masked true SSID, whereby an authorized device retrieve the true SSID from the broadcast beacon frame.
Abstract:
A method, system, and computer program product for preventing network service attacks, including processing a message to validate the message for message version and syntax via a security firewall; canonicalizing the message and extracting a message header and body via a converter; converting the body into a Patricia Trie via the converter; and validating the header and the converted body for security via a comparator.
Abstract:
A system, method, and computer program product for executing a task via a communication network, including devices configured to establish the communication network, wherein each of the devices includes a database having a capability of the devices, wherein the devices are adapted for executing a pre-defined set of activities indicative of the task. The device further includes a resource module adapted to select an optimal capability among the devices for performing the task based on the capability of the devices and a decision module adapted to allocate the task among the devices based on the selection of the optimal capability among the devices. The device further includes an execution module adapted to perform the task in any of the devices based on the allocation of the optimal capability among the devices and wherein the application resource is exchanged among the devices prior to invoking the task.
Abstract:
The invention provides a framework for developing the architecture of an enterprise information technology (IT) eco-system for an organization. The framework includes a business function appliance module, a core architecture appliance module, and a technology architecture appliance module. The business function appliance module provides one or more functionalities for the business processes of the information technology eco-system. The core architecture appliance module provides one or more functionalities for the deployment and integration of the one or more functionalities provided by business function appliance module across IT processes, based on metadata configuration. The technology architecture appliance module is configured to provide technical operational services for the one or more functionalities provided by the core architecture appliance module based on the metadata. The framework, therefore, provides a metadata-based architecture that enables the business configuration to be defined, stored and managed as an independent layer.
Abstract:
A tool can automate the process of downloading from a mainframe to a local area network (LAN). A back-end tool and a front-end tool can cooperate to accomplish the downloading process. Both tools can simplify the download process, avoiding complications and common errors. A user interface can provide features for simplifying the download process. Files can be downloaded from separate sub-areas on the mainframe to respective separate sub-areas on the LAN. Download settings can be saved and later retrieved via a name. Downloading for multiple software projects can be supported.