摘要:
A cooperative e-business complex. The cooperative e-business complex can include one or more electronically accessible e-business complex management services configured to handle e-business processing in the e-business complex on behalf of electronically associated virtual store operators, vendors, business partners and professional services providers. A virtual management office can be included which is configured to coordinate e-business transactions between the associated virtual store operators, the on-line shoppers, the vendors, the business partners, and the professional services providers in the e-business complex. Finally, one or more e-business complex management services requesters can be configured to remotely invoke selected ones of the electronically accessible e-business complex management services. Each e-business complex management services requester can invoke the electronically accessible e-business complex management services on behalf of one of the associated virtual store operators, vendors, business partners and professional services providers.
摘要:
The present invention provides enhanced dropdown selection lists and combination boxes. A method in accordance with an embodiment includes: providing a graphical user interface (GUI) control that displays a dropdown list when actuated, and displaying indicia in the GUI control indicating a number of entries in the dropdown list, wherein a user can visually determine from the indicia the number of entries in the dropdown list prior to display of the dropdown list. A method in accordance with another embodiment of the present invention includes: providing a GUI control having an entry field; and displaying indicia in the GUI control indicating whether the entry field of the GUI control is writable, wherein a user can visually determine from the indicia whether the entry field of the GUI control is writable before placing a cursor in the entry field.
摘要:
The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modem computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.
摘要:
An apparatus and method for searching a database of web site functional characteristics to identify web sites that are compatible with designated functions are provided. With the apparatus and method, a database of functional characteristics is compiled and a search interface is provided. The database may be compiled in an automatic, manual, or semiautomatic manner by, for example, retrieving web site content with various functions of a web browser disabled and analyzing the resultant output through the web browser. With the search interface, a user may enter designations of the functional characteristics that the user is either interested in having or not having in the resultant list of web sites. Based on the user's designation of functional characteristics, the search engine associated with the search interface searches the database of web sites and identifies the web site entries in the database that are compatible with the designated functional characteristics. The search engine then provides a listing of these web site entries through a search output interface which may then be used by the user that requested the search.
摘要:
An intermediate content transcoder. An intermediate content transcoder can include a communicative receiver configured to receive master content while in transit from a content source to at least one content sink in a content distribution network, and a communicative transmitter configured to transmit transcoded content to one or more of the content sinks. A set of content transformations also can be provided. Furthermore, the intermediate content transcoder can include a set of conditions for selecting individual ones of the content transformations to be applied to master content received through the communicative receiver. Finally, the intermediate content transcoder can include a transcoder configured to apply the selected individual ones of the content transformations to the master content. The application of the content transformations can produce transcoded content. The communicative transmitter, in turn, can forward the produced transcoded content to one or more of the content sinks.
摘要:
The present invention provides enhanced dropdown selection lists and combination boxes. A method in accordance with an embodiment includes: providing a graphical user interface (GUI) control that displays a dropdown list when actuated, and displaying indicia in the GUI control indicating a number of entries in the dropdown list, wherein a user can visually determine from the indicia the number of entries in the dropdown list prior to display of the dropdown list. A method in accordance with another embodiment of the present invention includes: providing a GUI control having an entry field; and displaying indicia in the GUI control indicating whether the entry field of the GUI control is writable, wherein a user can visually determine from the indicia whether the entry field of the GUI control is writable before placing a cursor in the entry field.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.
摘要:
The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modern distributed computing environment. A security token used for signing on to the modern computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modern computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.