摘要:
A method and system for reducing the amount of information sent across a socket when invoking an application using a remote method invocation. The present invention involves creating a list of the classes and fields contained within the application that is to be distributed and determining which of the fields are actually required for the remote method invocation under analysis. Any fields that are in the method but are not necessary for the invocation are marked with place holders.
摘要:
A method and apparatus for allowing applets to be executed natively over a non-IP network. The method and apparatus provide an applet loader that initiates the applet download, services the class faults that are encountered and allows calls to non-IP APIs without compromising the security mechanisms of Java running on TCP/IP. This allows applets to be run without web browsers or web servers.
摘要:
A method and system are described which allow programs to become dynamically reconfigurable without programmer intervention. This means that the programs can be dynamically distributed among multiple computers within a computer network without modification to the source code of the programs running on the system. In addition, the method and system described allow an administrator of the system to specify conditions under which reconfiguration is to occur without modification to the source text of the program to be dynamically reconfigured.
摘要:
Methods, systems and computer program products are provided for automatically generating client/server applications from an application written to execute on a single processing system. The application has program classes and programmed methods associated with the objects. Each program class in the application is identified and the relationships between programmed methods in the classes is determined. The relationships between the programmed methods in the identified classes are then weighted based on the activity of the relationship. Similarly, each identified class in the application is also weighted based on the computing resources required by the identified class. The identified classes are then partitioned into client classes and server classes based on the weighted relationships between the programmed methods in the classes, the weight associated with each class and a computing topology associated with a target client processing system. The resulting client and server partition may then be used for code generation and distribution based on the capabilities of a requesting computer system.
摘要:
Described is a conference management system for administering an online conference. The conference management system receives an electronic communication from a conference participant. A group is determined to be associated with the conference participant. An action is performed on the conference participant based on the group association.
摘要:
A mechanism is provided for indexing commercials. A viewer may query a search engine for a particular product or service. The index may include descriptors that are provided within a blanking interval within the media stream or within program guide information associated with the stream. The index information may also include Internet hyperlinks. Commercials may also have associated therewith a value that is relative to a value of media content. A viewer may accumulate value by viewing advertisements. Accumulated value may then be used to acquire more content.
摘要:
Described is a method for administering an online conference. The method includes receiving an electronic communication from a conference participant. A group is determined to be associated with the conference participant. An action is performed on the conference participant based on the group association.
摘要:
An autonomic system for diagnosing and correcting error conditions among interrelated components and resources. The system can include one or more commonly formatted log files utilizing standardized naming conventions for the interrelated components and resources. Each of the commonly formatted log files can include an association with one of the interrelated components and resources. An autonomic system administrator can be coupled to each of the interrelated components and resources and can be configured to parse the log files to identify both error conditions arising in associated ones of the interrelated components and resources, and also dependent ones of the interrelated components and resources giving rise to the identified error conditions. Preferably, the autonomic system can further include a codebase of analysis code and code insertion logic coupled to the autonomic system administrator and programmed to insert portions of the analysis code in selected ones of the interrelated components and resources.
摘要:
A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping.
摘要:
Objects including Java bytecodes are embedded in a 3270 datastream structured field. The 3270 datastream structured field, including the objects so embedded, are passed between a primary logical unit and a secondary logical unit that communicate with each other over a network using 3270 datastream architecture. An initialization protocol sends a Read Partition (Query) structured field from the primary logical unit to the secondary logical unit, to query whether the secondary logical unit supports Java. The secondary logical unit sends a Query Reply structured field to the primary logical unit in response to receipt of the Read Partition (Query) from the primary logical unit if the secondary logical unit supports Java. In response to receipt of the Query Reply structured field from the secondary logical unit, the 3270 datastream structured field including embedded objects such as Java bytecodes is passed between the primary logical unit and the secondary logical unit. The objects that are embedded in a 3270 datastream structured field may include Java bytecodes, images and audio. Spanning may be used to send objects that exceed structured field length limits. Accordingly, Java and other objects may be integrated with legacy 3270 applications, without requiring the rewriting of legacy applications, and allowing the use of the highly developed 3270 datastream architecture.