摘要:
An application program identifies a plurality of least recently accessed constructs of the application program that reside in DRAM memory. The application program causes the aggregation of at least a portion of the identified least recently accessed constructs onto one or more pages of the DRAM memory. The application program then causes the one or more memory pages of the DRAM memory to be put into self-refresh operation mode.
摘要:
A system and method for language-agnostic policy management. At least one policy associated with an event occurrence is identified. At least one policy engine associated with the at least one policy is identified. The at least one policy is evaluated by a policy engine of the associated at least one policy engine.
摘要:
Provided are techniques for modeling operational units, each operational unit corresponding to an operational workflow and to one or more deployment engines of a plurality of deployment engines; selecting, for each of the plurality of operational units, one of the corresponding deployment engines; ordering the operational units with respect to the operational workflow; grouping the ordered operation units according to the selected deployment engines into deployment engine groupings; mapping output parameters corresponding to a first operational unit that concludes a first deployment engine grouping to input parameters corresponding to a second operational unit that initiates a second deployment engine grouping, inserting between the first operational unit and the second operational unit a transitional operational unit for transitioning between a first deployment engine corresponding to the first deployment engine grouping and a second deployment engine corresponding to the second deployment engine grouping to generate a multi-deployment engine operational workflow.
摘要:
Embodiments of the present invention provide a method, system and computer program product for aggregating database and component logic authorization rules in a multi-tier application. In an embodiment of the invention, a method for aggregating database and component logic authorization rules in a multi-tier application system can include aggregating role-based authorization rules for both a persistence layer and a logic layer of a multi-tier application in a unified policy, distributing the unified policy to both the persistence layer and the logic layer of the multi-tier application, transforming the unified policy into respectively a set of role based permissions for the persistence layer and a set of role based permissions for the logic layer, and applying the set of role based permissions for the persistence layer in the persistence layer, and the set of role based permissions for the logic layer in the logic layer of the multi-tier application.
摘要:
Provided are techniques for modeling operational units, each operational unit corresponding to an operational workflow and to one or more deployment engines of a plurality of deployment engines; selecting, for each of the plurality of operational units, one of the corresponding deployment engines; ordering the operational units with respect to the operational workflow; grouping the ordered operation units according to the selected deployment engines into deployment engine groupings; mapping output parameters corresponding to a first operational unit that concludes a first deployment engine grouping to input parameters corresponding to a second operational unit that initiates a second deployment engine grouping, inserting between the first operational unit and the second operational unit a transitional operational unit for transitioning between a first deployment engine corresponding to the first deployment engine grouping and a second deployment engine corresponding to the second deployment engine grouping to generate a multi-deployment engine operational workflow.
摘要:
In an embodiment, an approach is provided that differences a source topology model associated with a source platform and a target topology model associated with a target platform. This differencing is performed by a processor and results in a topology difference. An operation in a workflow model is obtained from an asset library, the operation being associated with the topology difference. At least a portion of the asset library is stored in a persistent storage medium. The operation to deploy a portion of a solution is transmitted for deployment. The deployed portion of the solution includes a target image compatible with the target platform.
摘要:
The different illustrative embodiments provide a method, computer program product, and apparatus for converting a first image for a virtual machine formatted for a first virtual environment. A second image is created, wherein the second image is non-specific to any virtual environment. A determination is made whether a portion of files to be copied from the first virtual image to the second virtual image should be replaced using a compatibility matrix, wherein the compatibility matrix identifies changes between the first virtual environment and a second virtual environment. A replacement for the portion of the files is copied to the second image using the compatibility matrix responsive to a determination that the portion of the files in the set of files should be replaced. The file is copied to the second image responsive to an absence of a determination that the each file in the set of files should be replaced.
摘要:
A processor copies first and second installable binary files into first and second disk images of first and second virtual machines, respectively, before instantiating the images. The processor can copy first installation parameters and second installation parameters into the first image. The processor copies additional first installation parameters and additional second installation parameters into the second image. The processor at least partially executes a first installation process, based on the first installation parameters, to install the first installable binary files, and a second installation process, based on the additional second installation parameters, to install the second installable binary files. The processor at least partially executes the installation processes in an interleaved manner in relation to one another, based on dependencies. After instantiating the images, the processor can execute scripts based on the second installation parameters and the additional second installation parameters to complete installation.
摘要:
In an embodiment, an approach is provided that differences a source topology model associated with a source platform and a target topology model associated with a target platform. This differencing is performed by a processor and results in a topology difference. An operation in a workflow model is obtained from an asset library, the operation being associated with the topology difference. At least a portion of the asset library is stored in a persistent storage medium. The operation to deploy a portion of a solution is transmitted for deployment. The deployed portion of the solution includes a target image compatible with the target platform.
摘要:
A client identifier (ID) and a client-specific data field identifier for each item of client-specific data associated with a first client of a set of clients are received at a processor associated with a software as a service (SaaS) module. An extensible markup language (XML) formatted document for storing the client-specific data, including a set of client-specific data elements, each element referenced by one of the client-specific data field identifiers, is created for the first client. The XML formatted document is inserted into an XML formatted column of a row in a database table, where the database table is shared among a set of clients and stored in a shared database. The client ID is inserted into a structured query language (SQL) formatted data column of the row in the database table.