摘要:
A network server stores database tables for use in resolving labels into network addresses as requested by a remote browser client. Each user has an associated address-table which stores user defined labels associated with network addresses. Users may access other user's address-tables if such other users grant authority to do so. Each user defines the address-tables to be searched, along with a search order, to be used when the user requests that a label be resolved into a network address. During address resolution, the server will resolve a received label into the network address associated with the label as defined by the first accessed address-table which contains the label. The search order as defined by the user may be overridden for a particular address resolution request by an appropriate user command. In various embodiment, the network addresses may be WWW addresses and electronic mail addresses.
摘要:
A system for, and method of, retrieving network management data in a network and a network management station incorporating the system or the method. In one embodiment, the system includes: (1) an information querier, associated with a network management station, that develops a query for at least some network management data from a target agent in the network and assigns a path for a response from the target agent that is unique to the target agent and (2) a response receiver, associated with the information querier, that receives, via the path, the response from the target agent containing the at least some the network management data.
摘要:
A number of configuration elements are associated with a number of devices. Information about input configuration elements is accessed. An input configuration element is associated with one or more input rules. It is determined which of the configuration elements could be accessed by the input rules and any call chains emanating from the rules. Output rules are determined by using the accessed configuration elements, the input rules, and the way the input rule manipulates its accessed configuration elements. Each output rule may be derived from an input rule and corresponds to the same input configuration element associated with that input rule. An executable module is generated that is adapted to access at least a given one of the input configuration elements and to trigger one or more of the output rules corresponding to the given input configuration element. Read and write sets for rules are determined, and the triggered output rules ensure that restrictions associated with a configuration element are not violated.
摘要:
A number of configuration elements are associated with a number of devices. Information about input configuration elements is accessed. An input configuration element is associated with one or more input rules. It is determined which of the configuration elements could be accessed by the input rules and any call chains emanating from the rules. Output rules are determined by using the accessed configuration elements, the input rules, and the way the input rule manipulates its accessed configuration elements. Each output rule may be derived from an input rule and corresponds to the same input configuration element associated with that input rule. An executable module is generated that is adapted to access at least a given one of the input configuration elements and to trigger one or more of the output rules corresponding to the given input configuration element. Read and write sets for rules are determined, and the triggered output rules ensure that restrictions associated with a configuration element are not violated
摘要:
Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.