摘要:
An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user.
摘要:
An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user.
摘要:
An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.
摘要:
A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant.
摘要:
An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.
摘要:
An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.
摘要:
A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form.
摘要:
Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.
摘要:
In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon.
摘要:
Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session.