Abstract:
A schema that facilitates the centralized management and deployment of applications, components and services across a computer network. Centralized class stores are provided under policies associated with a directory container such as a site, domain or organizational unit. Class stores include definition, state and location information for applications and components, such that applications and components are centrally available as needed. For example, via the class store, updates to components or applications for users under an organizational unit are performed once in a centralized location, whereby users or machines may automatically obtain new versions of applications as they become available, or software implementations as needed from a centralized repository. Class stores may be configured to contain packages of component and application information according to functional areas, level of security access, or other criteria as determined by an administrator. Component categories (e.g., spreadsheet, word processor, and so on) may also be maintained, whereby a suitable application may be located by its function. For customized administration and programmatic query or installation of specific components and packages, the class store also includes a manager object that offers a set of interfaces and APIs.
Abstract:
An improved registration datastore comprises a datastore containing the database coupled to a data table object structure to present the data to a registration system in the form of an abstract table of data. The use of a data table structure between the registration system and the datastore provides storage location and format independence as the data table object presents the registration data to a calling object in the form of a data level table, a collection of configuration data items. The improved registration system permits one or more objects to be simultaneously installed into the registration database by different sources. The new registration system utilizes a database versioning and aging mechanism to permit multiple calling objects to operate using a version of the database known to be valid when its operations began.
Abstract:
Disclosed is a framework to build, deploy, service, and manage customizable and configurable re-usable applications. The framework is defined declaratively as a manifest possessing an identity, namely a strong identity. The application manifest can declare appropriate ways to configure or customize the application securely and provides the ability to only grant such a right to authorized parties. A further aspect of the invention provides a framework for an application deployment to be defined declaratively with a manifest possessing an identity of the customized application. Such a framework offers a way for the system, state infrastructure, setup programs, authoring tools, and management tools to deploy, install, service and manage the customized application using an authoritative composite application identity. The application manifest as well as the deployment manifest can be made available through out the lifecycle of the deployed application—including at runtime—which assists in consistent manipulation of the customized application.
Abstract:
A method and system for managing and deploying applications across a computer network by assigning and publishing applications to user and computer policy recipients. Assigned applications are automatically applied via a script to the policy recipients, thereby ensuring that the recipient has an administrator-specified workstation configuration. Assigned applications are advertised so as to appear available to the user, by adding an application shortcut to the start menu, and by populating the machine registry with appropriate application information. Other applications may be published to users, whereby those applications are optionally available for use by users. Published application information is maintained in a centralized store of information on the network. Assigned and published applications may be installed on demand, such as when the application is activated.
Abstract:
A method for installing and registering a COM component objects within a registration datastore of a computing system. The method comprising checking the COM component object to determine whether it contains a set of self-describing data, and if the COM component contains the set of self-describing data, perform a sequence of operations. These operations begin by extracting the self-describing data from the COM component. Next the operations register the COM component using the extracted self-describing data by storing registration data within the registration datastore. Finally the operations end after deriving additional registration data using the extracted self-describing data and storing the additional registration data within the registration datastore. The self-describing COM component comprises a first data field containing data representing a dynamic link library. A second data field derived from the first data field comprising a reserve word module. A third data field derived from the second data field comprising one or more self-describing component data elements. A fourth data field functioning to indicate the end of the self-describing COM component object, wherein the one or more self-describing component data elements are extracted by the system registrar module to generate data stored within the registration datastore.
Abstract:
A method and system for installing software implementations such as applications and COM classes as they are needed from an external source, such as a centralized network store. When a software implementation is needed, the system and method first look to the local system (e.g., registry) for that software implementation, and if found, returns the information such as a local path needed to use the software implementation. If the implementation is not found locally, the present invention dynamically looks to a centralized class store of a network, to locate the needed implementation. When located, the implementation is downloaded and locally installed in a manner that is essentially transparent to the user. Software implementations such as application products may be divided into features and components to improve on-demand installation thereof.
Abstract:
A system and method for high frequency wagering in a live game. Play events are detecting in a real-time stream of game data. Betting events are created based on the play events. Betting windows are calculated based on real-time and historic game data. Betting odds are calculated based on real-time and historic game data. Wagering options are transmitted to a participant device. A wager is received from the participant device.
Abstract:
The present invention extends to methods, systems, and computer program products for implementing a tenant provisioning system in a multi-tenancy architecture using a single provisioning master in the architecture, and a data center provisioner in each data center in the architecture. The provisioning master receives user requests to provision a tenant of a service and routes such requests to an appropriate data center provisioner. Each service in the multi-tenancy architecture implements a common interface by which the corresponding data center provisioner can obtain a common indication of load from each different service deployed in the data center thus facilitating the selection of a scale unit on which a tenant is provisioned. The common interface also enables a service to dynamically register (i.e. without redeploying the tenant provisioning system) with the provisioning master as a multi-tenancy service by registering an endpoint address with the provisioning master.
Abstract:
A control valve for controlling flow of fuel from a fuel tank to a rocket engine having a valve body longitudinally displaceable between open and closed positions of the control valve, a piston rod secured in the valve body, and a piston secured to the piston rod. The piston is subjected to a pressure gas in a first control chamber to displace the piston to the open position of the valve, against the action of a spring which urges the valve to the closed position. A locking rod is operated by the pressure gas and carries a locking member for engaging in a groove in the piston rod in the open position of the valve. A switching disk is secured on the locking rod and is subjected to the pressure gas in a first gas chamber to displace the locking member from the groove. The switching disk is provided with a control hole for throttled passage of the control gas to the first control chamber to displace the piston with a slight delay to the open position of the valve against the action of the spring. When the first gas chamber is de-pressurized control gas in the control chamber flows out through the control hole in the switching disk. Pressure gas is supplied to a second gas chamber which acts on the locking rod to keep the locking member out of contact with the piston rod.
Abstract:
A method and system for managing and deploying applications across a computer network by assigning and publishing applications to user and computer policy recipients. Assigned applications are automatically applied via a script to the policy recipients, thereby ensuring that the recipient has an administrator-specified workstation configuration. Assigned applications are advertised so as to appear available to the user, by adding an application shortcut to the start menu, and by populating the machine registry with appropriate application information. Other applications may be published to users, whereby those applications are optionally available for use by users. Published application information is maintained in a centralized store of information on the network. Assigned and published applications may be installed on demand, such as when the application is activated.