摘要:
A method and apparatus for interconnecting first and second networks that use the same protocols for communications by a third network. The third network is defined in the first and second networks as a single virtual communications link of the native type used by the first and second networks. In response to requests from initiating nodes in the first and second networks to communicate with destination nodes in the other of the first and second networks, routing computation services in the first and second networks compute routes through the first and second networks that will connect the originating and destination nodes and that include the virtual link as such a route. The virtual link is also used to remotely support the communication needs of dependent nodes in the first and second networks that do not have the ability to establish communications sessions within the networks on their own.
摘要:
The present invention is an improvement in a known LOCATE process used to locate resources in a computer network. The known LOCATE process always requires that information about a target resource be verified by forwarding a LOCATE request to the node owning the target resource. The present invention improves upon this process by use of selective verification. If predetermined conditions are met, a node in the network may reply to a received LOCATE request by using information about the target resource found in its cache directory. The LOCATE request need not be propagated to the node owning the target resource except for predetermined types of sessions or where past attempts to use selective verification have not been successful.
摘要:
A computer implemented method assigns a data item to a storage location in a computing environment. A request to store a data item is detected. A determination is made as to whether a volatile memory in the second computer comports with an isolation rule for the data item. In response to determining that the volatile memory in the second computer comports with the isolation rule for the data item, access time for data in the volatile memory in the second computer is compared with access time for data in a local hard drive in a first computer. The data item is then selectively stored in either the volatile memory in the second computer or the local hard drive in the first computer as determined by their relative access times.
摘要:
Systems, methods and computer program products manage computing resources for a system. A system includes a set of processors having multiple processor cores present in the computer system, where the processor cores form an aggregated set of processor cores for the system. A dependency analyzer determines dependencies among a set of workload components executing on the set of processor cores. A policy includes rules associated with managing one or more of power consumption, heat production, operating cost or workload balancing for the set of aggregated processor cores. In response to a workload event, a management component sets a state of one or more of the processor cores in accordance with the workload event, the policy and the set of dependencies.
摘要:
Systems, methods and computer program products manage computing resources for a system. A system includes a set of processors having multiple processor cores present in the computer system, where the processor cores form an aggregated set of processor cores for the system. A dependency analyzer determines dependencies among a set of workload components executing on the set of processor cores. A policy includes rules associated with managing one or more of power consumption, heat production, operating cost or workload balancing for the set of aggregated processor cores. In response to a workload event, a management component sets a state of one or more of the processor cores in accordance with the workload event, the policy and the set of dependencies.
摘要:
Functionality can be implemented within a cloud manager to leverage energy consumption data of cloud processing and their associated facility resources when selecting computing nodes to complete the job. The cloud manager can determine possible computing nodes to complete the job based on the job attributes. The cloud manager can determine aggregate energy data of the cloud resources from an energy usage database. The cloud manager can analyze the energy usage data to determine a configuration of the computing nodes to perform the job that reduces total energy consumption. For example, a configuration of servers can be based on a number of servers and processor utilization at the servers to perform the job. The cloud manager can assign the job to the servers and set the processor utilization at the servers in accordance with the resource configuration determined to minimize energy consumption.
摘要:
Methods, systems, and computer program products are disclosed for dynamically integrating software resources (such as web services and other back-end software resources) using the services of a content framework (such as a portal platform). A portlet model is leveraged to allow programmatic portlets to serve as proxies for web services, thereby extending portlets beyond their traditional visual role. A deployment interface and a system interface are described for these portlet proxies. The deployment interface is used for composing new web services, and a composition tool is described. The system interface allows for run-time management of the web services by the portal platform. The service provider for a particular function may be bound to the portlet proxy at development time or at run-time.
摘要:
A process for preparing polyimides having enhanced melt flow properties is described. The process consists of heating a mixture of a high molecular weight poly(amic acid) or polyimide with a low molecular weight amic acid or imide additive in the range of 0.05 to 15% by weight of additive. The polyimide powders so obtained show improved processability, as evidenced by lower melt viscosity by capillary rheometry. Likewise, films prepared from mixtures of polymers with additives show improved processability with earlier onset of stretching by TMA.
摘要:
A fixed, linear, ground-based primary reflector having an extended curved-sawtooth contoured surface covered with a metallized polymeric reflecting material, reflects solar energy to a movably supported collector that is kept at the concentrated line focus of the reflector primary. The primary reflector may be constructed by a process utilizing well-known freeway paving machinery. The solar energy absorber is preferably a fluid-transporting pipe. Efficient utilization leading to high temperatures from the reflected solar energy is obtained by cylindrical shaped secondary reflectors that direct off-angle energy to the absorber pipe. To obtain higher temperature levels, refocusing secondary reflectors, that cause a series of discrete spots of highly concentrated solar energy to fall on the fluid-transporting pipe, are utilized. A seriatim arrangement of cylindrical secondary reflector stages and spot-forming reflector stages produces a high temperature solar energy collection system of greater efficiency.
摘要:
A method, system or computer usable program product for providing initial access Lo the computer system in response to a user providing a first password, and upon detecting a condition meeting a predetermined criteria, providing subsequent access to the computer system in response to the user providing a second password wherein the first password has stronger security than the second password.