摘要:
System and method are described for an I/O redirection provider for rapidly adapting legacy services, such as Linux services, into CIM management space. In one embodiment, a method of implementing an I/O redirection provider in a management system including a Common Input Model Object Manager (“CIMOM”) comprises, for each of a number of script files, determining whether a class corresponding to the script file exists; responsive to a determination that a class corresponding to the script file does not exist, selectively using at least one template to generate a new schema for the script file; and compiling the new schema within the CIMOM.
摘要:
System and method are described for an I/O redirection provider for rapidly adapting legacy services, such as Linux services, into CIM management space. In one embodiment, a method of implementing an I/O redirection provider in a management system including a Common Input Model Object Manager (“CIMOM”) comprises, for each of a number of script files, determining whether a class corresponding to the script file exists; responsive to a determination that a class corresponding to the script file does not exist, selectively using at least one template to generate a new schema for the script file; and compiling the new schema within the CIMOM.
摘要:
A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile, wherein the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.
摘要:
A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile wherein, the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.
摘要:
A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile wherein, the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.
摘要:
A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile, wherein the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.
摘要:
A method and apparatus are disclosed for managing software components in a network of computers such as a local area network or the Internet. Each software component includes a binary object and at least one interface to the binary object. Suitable software components include OLE components. The network includes a registry file identifying currently registered components and their locations. The network also includes a component server computer on which unregistered components reside. A database associates software component identifiers with software component locators. Suitable databases include Novell NetWare Directory Services databases and Internet search engine databases. Database objects or entries representing unregistered components are found by a search based on the class identifier of a desired component. Software components found by the search are selected, transferred as needed, and then registered, thereby making them available to clients.