摘要:
The present invention relates to the field of systems management on IT-resources using web services. An improved method proposes a single web service implementation which dynamically and automatically generates multiple WSDLs for respective multiple resource type classes. This implementation is model-agnostic, as it doesn't require any knowledge about the underlying model, be that a resource model, or any other model in question, and uses introspection of the applied model at the time of invocation for the dynamic WSDL generation. The state of the resource is maintained within the instrumentation of the resource. No additional persistence on top needs to be implemented. A single implementation of a low number of generic web services, basically only two, reduces implementation and maintenance efforts significantly.
摘要:
The present invention relates to the field of systems management on IT-resources using web services. An improved method proposes a single web service implementation which dynamically and automatically generates multiple WSDLs for respective multiple resource type classes. This implementation is model-agnostic, as it doesn't require any knowledge about the underlying model, be that a resource model, or any other model in question, and uses introspection of the applied model at the time of invocation for the dynamic WSDL generation. The state of the resource is maintained within the instrumentation of the resource. No additional persistence on top needs to be implemented. A single implementation of a low number of generic web services, basically only two, reduces implementation and maintenance efforts significantly.
摘要:
The present invention relates to performing systems management on IT-resources using web services, wherein the resources are managed in a computational network within a plurality of runtime environments having different respective instrumentations, wherein the web services are implemented according to a public web service standard, and wherein a resource configuration database is provided for storing a collection of resource-specific data on said IT-resources. In order to to provide an improved method and system for an implementation of dynamic extensibility with instrumentation capabilities the following steps are performed: server-side correlating the network address of a resource comprised of said network with a database entry provided within said configuration database for said resource, wherein said correlation includes the definition of an instrumentation of said resource, selecting said entry for automatically invoking the instrumentation of said resource, accessing said resource via a web service by using said automatically invoked resource instrumentation.
摘要:
A system and method enabling the search for a three-dimensional virtual world object across the universe of virtual worlds by utilizing a two-step search process to first identify the object and second, to actively locate and generate a URI to all presently manifest instances of that object.
摘要:
A mechanism is provided for providing compartmentalized security in product reviews. A central authoritative state module within a compartmentalized security mechanism identifies a clearance level associated with a user that has been authenticated. Responsive to the clearance level of the user being sufficient to access the information, the central authoritative state module determines whether the information requires a simulation to be executed. Responsive to the information failing to require execution of a simulation, a coordination module in the compartmentalized security mechanism retrieves the information. A display and input interaction module on a client system then displays the information in accordance with the clearance level of the user thereby forming displayed information. Displaying the information in accordance with the clearance level of the user comprises displaying in detail only portions of the information of the product that the user has access to.
摘要:
A mechanism is provided for providing compartmentalized security in product reviews. A central authoritative state module within a compartmentalized security mechanism identifies a clearance level associated with a user that has been authenticated. Responsive to the clearance level of the user being sufficient to access the information, the central authoritative state module determines whether the information requires a simulation to be executed. Responsive to the information failing to require execution of a simulation, a coordination module in the compartmentalized security mechanism retrieves the information. A display and input interaction module on a client system then displays the information in accordance with the clearance level of the user thereby forming displayed information. Displaying the information in accordance with the clearance level of the user comprises displaying in detail only portions of the information of the product that the user has access to.
摘要:
The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.
摘要:
A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.
摘要:
The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.
摘要:
A system and method enabling the search for a three-dimensional virtual world object across the universe of virtual worlds by utilizing a two-step search process to first identify the object and second, to actively locate and generate a URI to all presently manifest instances of that object.