Abstract:
Embodiments of the present invention provide a method, system and computer program product for dynamic selection of a runtime classloader for a generated class file. In an embodiment of the invention, a method for dynamic selection of a runtime classloader for a generated class file is provided. The method includes extracting meta-data from a program object directed for execution in an application server and determining from the meta-data a container identity for a container in which the program object had been compiled. The method also includes selecting a container according to the meta-data. Finally, the method includes classloading the program object in the selected container.
Abstract:
Embodiments of the present invention provide a method, system and computer program product for dynamic selection of a runtime classloader for a generated class file. In an embodiment of the invention, a method for dynamic selection of a runtime classloader for a generated class file is provided. The method includes extracting meta-data from a program object directed for execution in an application server and determining from the meta-data a container identity for a container in which the program object had been compiled. The method also includes selecting a container according to the meta-data. Finally, the method includes classloading the program object in the selected container.
Abstract:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
Abstract:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
Abstract:
Systems and methods for providing a social network. The methods involve: creating a relationship between a first entity and a second entity; setting authorization which indicates that a user of said first entity is authorized to view inventory data of said second entity; receiving a request to view first inventory data of said first entity and second inventory data of said second entity by said user; and determining whether said user is authorized to view said second inventory data. If said user is authorized: querying a first remote inventory management system of said first entity for said first inventory data and a second remote inventory management system of said second entity for said second inventory data; receiving said first and second inventory data; generating an aggregate view comprising said first and second inventory data; and providing content of said aggregate view to a client computing device of said first entity.
Abstract:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
Abstract:
Methods are disclosed for grouping search results into a profile page. A search engine accepts a user search string and generates a first set of results. In response to the first set of results, a query generator generates queries corresponding to a number of entities sharing a common name. The search engine executes the queries, returning responsive data sets. An entity resolver merges the data sets to ensure that each unique entity is represented by a single data set. A threshold may be defined such that results meeting a certain level of similarity are merged. A profile generator creates a profile page for each unique entity using biographical data contained in the respective datasets and generates a results page containing links to each unique profile. The results page is then sent to the user for display on a graphical user interface.
Abstract:
Systems and methods for providing a social network. The methods involve: creating a relationship between a first entity and a second entity; setting authorization which indicates that a user of said first entity is authorized to view inventory data of said second entity; receiving a request to view first inventory data of said first entity and second inventory data of said second entity by said user; and determining whether said user is authorized to view said second inventory data. If said user is authorized: querying a first remote inventory management system of said first entity for said first inventory data and a second remote inventory management system of said second entity for said second inventory data; receiving said first and second inventory data; generating an aggregate view comprising said first and second inventory data; and providing content of said aggregate view to a client computing device of said first entity.
Abstract:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
Abstract:
Methods are disclosed for grouping search results into a profile page. A search engine accepts a user search string and generates a first set of results. In response to the first set of results, a query generator generates queries corresponding to a number of entities sharing a common name. The search engine executes the queries, returning responsive data sets. An entity resolver merges the data sets to ensure that each unique entity is represented by a single data set. A threshold may be defined such that results meeting a certain level of similarity are merged. A profile generator creates a profile page for each unique entity using biographical data contained in the respective datasets and generates a results page containing links to each unique profile. The results page is then sent to the user for display on a graphical user interface.