Abstract:
A processor-implemented method and/or computer program product negotiates the processing of incoming transactions based on resource utilization status of backend systems in an appliance cluster. An incoming transaction, which is a specialized function for an appliance, is received by a processor. The processor determines whether the incoming transaction can be processed by the appliance cluster based on a current threshold level and a current transaction count, and then identifies a target appliance from the appliance cluster as a negotiation device in response to determining that the incoming transaction cannot be processed.
Abstract:
A method of locating one or more endpoint connectors of a network cable wherein the network cable includes a first endpoint connector and a second endpoint connector comprises: one or more processors capturing an incoming packet carrying therein a specific identifier, wherein the specific identifier is a specific bit string that has been predefined to trigger an activation of one or more indicating devices located on one or more endpoint connectors on the network cable; determining that the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet carries therein the specific identifier, triggering an activation of a first indicating device indicative of a location of the first endpoint connector.
Abstract:
A first reverse proxy appliance of the plurality of reverse proxy appliances receives an incoming transaction. A machine logic determines that the incoming transaction cannot be directly processed by the first reverse proxy appliance based, at least in part, upon the current threshold level of the first reverse proxy appliance and the current transaction count of the first reverse proxy appliance. Responsive to the determination that the incoming transaction cannot be directly processed by the first reverse proxy appliance, a second reverse proxy appliance of the plurality of reverse proxy appliances and a third reverse proxy appliance of the plurality of reverse proxy appliances negotiate in order to determine that the third reverse proxy appliance will process the incoming transaction. Responsive to the negotiating, the incoming transaction is sent to the third reverse proxy appliance.
Abstract:
A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.
Abstract:
An electrical adapter for identifying the connection state to a network is presented. The adapter comprises a first member and a second member. The first member comprises a male end that is substantially similar in shape to a connector plug, and which electrically connects to a wall outlet or a female receptacle. A first female end is disposed at another end of the first member, which includes a hollow cylinder member and a display window. The second member comprises a second female end which comprises a push latch and a mark for identifying a connection state to a network. When the second member is pushed forward, the second female end is engaged with the first female end via the push latch, and a display window displays the mark that identifies the electrical adapter's connection state to the network.
Abstract:
A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.
Abstract:
A processor-implemented method and/or computer program product negotiates the processing of incoming transactions based on resource utilization status of backend systems in an appliance cluster. An incoming transaction, which is a specialized function for an appliance, is received by a processor. The processor determines whether the incoming transaction can be processed by the appliance cluster based on a current threshold level and a current transaction count, and then identifies a target appliance from the appliance cluster as a negotiation device in response to determining that the incoming transaction cannot be processed.