摘要:
First and second applications having disparate concrete configuration models are integrated into a unified abstract model wherein configuration elements and associated element values are used to control configurable functions of the first and second application programs, respectively, and wherein the second configuration element has a similar configuration function as the first configuration element; using a first equivalence definition reflecting a functional relationship between the first application configuration element and an abstract model configuration element having the similar configuration function, wherein the abstract model configuration is application-independent and platform-independent; using a second equivalence definition reflecting a functional relationship between the second application program configuration element and the abstract model configuration element; and producing and associating a second configuration element value with the second application configuration element wherein the second application program is automatically configured according to the second concrete application configuration model.
摘要:
A computer implemented method, apparatus, and computer program product for integrating first and second applications having disparate concrete configuration models into a unified abstract model comprising through mapping corresponding configuration objects with similar functions in each application, defining an equivalence between at least one particular object within the first application and at least one particular object within the second application, optionally receiving user input at a time of configuration regarding user permissions as they relate to the mapped configuration objects, and configuring each application using the received user input, automatically translating the user input, through mapping rules and equivalence definitions, so that each application is automatically configured to the unified abstract configuration model.
摘要:
Computer implemented method, system and computer program product for creating a resume that facilitates generating and updating multiple versions of the resume. A computer implemented method for creating a resume includes storing resume information. Rules are specified by which a resume for a particular job application is to be created, and the stored resume information is parsed according to the specified rules to provide specified resume information. A resume is then created for the particular job application from the specified resume information.
摘要:
A system and method for utilizing a gaming environment for evaluating security policies is presented. An administrator uses a mapping system to map policy tags corresponding to a policy manager with game tags corresponding to a game manager. In addition, the mapping system configures a participant's game based upon gaming attributes and history data, such as assigning incentives to particular roles or locations, using customized terrains, and configuring screen resolution. Once the mapping system maps policy tags to game tags and configures the game, the mapping system invokes the game and allows the game participant to play the game. While the game participant plays the game, the mapping system identifies policy events, such as a security breach, and rewards the game participant accordingly.
摘要:
A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitored process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface.
摘要:
A computer implemented method, apparatus, and computer program product for effectively reducing a complicated problem space to enable faster implementation of system management software, and in particular, policy management for security software. The policy management tool of the present invention receives input from a user to configure a policy model, wherein the policy model is configured according to a set of policy requirements. The policy management tool presents a graphical view of a policy model according to the input from the user, wherein the graphical view allows the user to visualize internals of the policy model as a whole. The policy management tool performs validations on the policy model against requirements of the set of policy requirements. A simulation of the policy model may then be performed to determine the validity of the policy model and generate real test results feedback at a time the policy model is configured.
摘要:
A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitoring process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface.
摘要:
A computer implemented method, data processing system, and computer program product for providing an auto-completion assist box comprising different views of selectable method and field information, thereby allowing a user to easily locate desired information. A list of methods for an object is provided to one or more view plug-ins in the auto-completion system, wherein each view plug-in manages the list of methods according to a function of the view plug-in to form a managed view. Responsive to receiving a managed view from each view plug-in, an auto-completion assist box is created which comprises the managed views. The auto-completion assist box is then presented to a user, wherein the user selects a managed view to locate a method for the object for code assistance.
摘要:
An approach for utilizing a gaming environment for evaluating security policies is presented. An administrator uses a mapping system to map policy tags corresponding to a policy manager with game tags corresponding to a game manager. In addition, the mapping system configures a participant's game based upon gaming attributes and history data, such as assigning incentives to particular roles or locations, using customized terrains, and configuring screen resolution. Once the mapping system maps policy tags to game tags and configures the game, the mapping system invokes the game and allows the game participant to play the game. While the game participant plays the game, the mapping system identifies policy events, such as a security breach, and rewards the game participant accordingly.