摘要:
A method for moving an executing process from a source isolation scope to a target isolation scope includes the step of determining that the process is in a state suitable for moving. The association of the process changes from a source isolation scope to a target isolation scope. A rule loads in association with the target isolation scope.
摘要:
A method for isolating access by application programs to native resources provided by an operating system redirects a request for a native resource made by an application program executing on behalf of a user to an isolation environment. The isolation environment includes a user isolation scope and an application isolation scope. An instance of the requested native resource is located in the user isolation scope corresponding to the user. The request for the native resource is fulfilled using the version of the resource located in the user isolation scope. If an instance of the requested native resource is not located in the user isolation scope, the request is redirected to an application isolation scope. The request for the native resource is fulfilled using the version of the resource located in the application isolation scope. If an instance of the requested native resource is not located in the application isolation scope, the request is redirected to a system scope.
摘要:
A distributed processing system is described that employs “role-based” computing. In particular, the distributed processing system is constructed as a collection of computing nodes in which each computing node performs a particular processing role within the operation of the overall distributed processing system. Each of the computing nodes includes a conventional operating system, such as the Linux operating system, and includes a plug-in software module to provide a distributed memory operating system that employs the role-based computing techniques. The plug-in module provides seamless inter-process communication mechanisms and a distributed file system within the operating system services provided by each of the computing nodes, thereby allowing the computing nodes to cooperate and implement processing services of the overall distributed processing system.
摘要:
The present invention is directed to systems and methods that treat the monitoring of a software application as a separate and independent concern from the software application itself. The present invention utilizes aspect oriented programming to intercept, analyze, decompose the application states of a software application and then to link appropriate non-invasive constructs into the software application code to provide application state information to an autonomic manager through a plurality of sensors. The autonomic manager analyzes the application state information for compliance pre-defined parameters, and takes appropriate corrective action including modifying the software application states using a plurality of effectors. The sensors and effectors are linked as non-invasive constructs to the software application, and in aspect oriented programming constitute aspects. In order to prevent any adverse or undesirable effects to the software application as a result of the application state analysis and selected action, a safety mechanism is included in communication with the effectors.
摘要:
The present invention is generally directed to a method, system, and article of manufacture that provides an internationalization service in a generalized message-oriented middleware system. In one embodiment, the internationalization handler for the MOM messages exists on both the message-producing and the message-consuming sides. The front-end server and back-send server application containers pass control to the internationalization handlers at predefined points during message production and consumption. On the message production side, the message producer passes control to the internationalization handler after the creation of the MOM message is complete but before the message is dispatched by the MOM for routing and delivery. On the message consumption side, the back end application passes control to the consumer side JMS internationalization handler just before invoking an nullonMessagenull method or similar message listener method. Some embodiments may also include a reply indicator to indicate whether or not the message is a reply to a service request.
摘要:
Disclosed herein are a system and method for using a remote terminal to control processes executing on a client terminal by transmitting data to the client terminal emulating keystroke inputs at the client terminal. A remote control application program executing at the remote terminal initiates the transmission of a message for emulating keystroke inputs to the client terminal. The remote terminal also executes an operating system having logic for responding to a detection of any one combination of keystrokes of a set of predetermined combinations of keystrokes, independently of any application program executing on the remote terminal. While the remote control application is active, the remote terminal inhibits the operating system from responding to detected keystrokes and transmits a message to the client terminal emulating an input of the detected keystrokes at the client terminal.
摘要:
A method for detecting and preventing unauthorized or illegal attempts to gain enhanced privileges within a computing environment by exploiting the buffer overflow-related weakness of the computer system.
摘要:
A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
摘要:
A USB-based data acquisition system including virtual buffer software which increases USB data transfer rates with minimal changes to DAQ driver level software. The virtual buffer software operates to receive or intercept calls made by the DAQ driver level software to acquire data from the device, wherein the DAQ driver level software is designed to read the data from the device one sample at a time from the device. The virtual buffer software intercepts the call and requests the data in bulk packets from the device. The virtual buffer software then stores the received packets of data in a virtual buffer or virtual FIFO maintained in computer system memory. The DAQ driver level software then obtains the data from the computer system memory using much faster transfers. The virtual buffer software emulates operation of the device, including generation of interrupts and responses to status register reads, thus “fooling” the DAQ driver level software into thinking the data is being acquired from the device. Thus, the present invention allows for much faster data transfers, while requiring minimal or no changes to the existing DAQ driver level software.
摘要:
The customer agent 9 transmits a search request 15a to a manager 4, which in turn transmits a search request 15b to a shop agent 5. The shop agent 5 transmits a product information service message 16a to the manager 4. The manager 4 transmits a product information service message 16b to the customer agent 9 and a product information service message 16c to a shop agent 17. Based on the thus monitored product information service message 16c, the shop agent 17 generates an associated information service message 18a and transmits it to the manager 4. The manager 4 then transmits an associated information service message 18b to the customer agent 9.