摘要:
A management appliance includes at least one processor; and a memory communicatively coupled to the at least one processor. The memory comprising executable code stored thereon such that the at least one processor, upon executing the executable code, is configured to: dispense an image corresponding to a virtual machine to a distributed computing system comprising a plurality of interconnected computing devices, such that at least one of the computing devices implements the virtual machine; establish a trusted relationship with the virtual machine; and provide an authenticated user with access to the virtual machine without further authentication credentials from the user.
摘要:
A system for securing user created Web resources that includes a data store and a URI security engine. The data store can store digitally encoded content comprising a set of user created, URI identified resources. The URI security engine can provide declarative instance based URI access control to the user created URI identified resources. The URI security engine can apply semantics of user/group control for accessing the URI identified resource. These controls can be group controlled based upon deployer (creator) established privileges rather than being based upon an explicit developer established privileges, which may not be possible since the resources can be deployer (end-user) created resources not existing at development time.
摘要:
Entity relationships are created, discovered, and applied in proximity-based scheduling applications. When a signal is received from an entity in proximity to a user of a data processing system, the signal is compared against previously recorded signals. If a signal match is found, the entity generating the signal is identified using the entity definition associated with the previously recorded signal. Entities associated with the entity generating the signal are also identified. A reminder is provided to the user to perform tasks associated with the entity and tasks associated with the others entities while the user is in proximity to the entity. If a signal match is not found, and if the user has performed a task with an unassociated entity, a relationship may be created between the entity associated with the performed task and the unassociated entity, either automatically or upon prompting the user.
摘要:
The present invention is an installation script generation engine. An application component distribution system can include a repository of semantic models for interdependent ones of application components. A mapping of individual listings in the semantic models to target platform specific installation instructions further can be included. Finally, a script generation engine can be configured to produce a target specific set of instructions for a specified application component based upon a mapping of at least one of the semantic models in the repository. Notably, each of the semantic models can include a listing of component relationships, target platform requirements and platform neutral installation instructions. Moreover, the component relationships can include at least one component relationship selected from the group consisting of a containment relationship, a usage relationship, a contradiction relationship, and an equivalence relationship. Finally, a Web services interface to the repository can be configured to permit remote access to the repository.
摘要:
An autonomic rollback system. An autonomic rollback system can include a registry configured to store meta-data specifying a contemporary state of a system of components. The system also can include a backup location configured to store a backup copy of the meta-data in the registry specifying a past state of the system of components prior to installing a new component. A monitor can be programmed to compare the operation of the system of components with a policy defining a nominal state of operation for the system of components. Finally, a rollback processor can be coupled to the registry and the backup location. Responsive to the monitor, the rollback processor can restore the registry to the past state when the monitor determines that the operation of the system of components falls outside the nominal state defined within the policy. Importantly, the system of components can reside within an application server.
摘要:
A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user.
摘要:
A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user.
摘要:
A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user.