Abstract:
A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set.
Abstract:
A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set.
Abstract:
In one implementation, a first access behavior is determined. The first access behavior is for accessing a first dataset associated with a first tenant of a storage system, and the first dataset is stored in a first data node in the storage system. A second access behavior is determined. The second access behavior is for accessing a data entry that is to be added into a second dataset associated with a second tenant of the storage system, and the second dataset is stored in at least one data node in the storage system. In response to a deviation between the first access behavior and second access behavior being above a predefined threshold, the data entry is stored into the first data node.
Abstract:
Scheduling automated visual inspection tasks includes capturing an image of a component to be inspected. A visual inspection model is formed with a model engine as a composite model of utility modules and functional modules to perform visual inspection of the image of the component. An abstract processing workflow of the visual inspection model is derived with a scheduler including dependencies between the utility modules and the functional modules. Performance of each of the functional modules is profiled with the scheduler by testing performance with available hardware resources to produce a performance profile. Parallel instances of each of the functional modules in a branch of the abstract processing workflow are scheduled with the scheduler according to the dependencies and the performance profiles. An indication of defects in the component is produced by processing the visual inspection model according to the scheduled functional modules.
Abstract:
A method, system, and/or computer program product configures hierarchical cloud resources. A supervisor server receives a signal indicating a boundary of a set of hierarchical cloud resources. The boundary describes a level of resource sharing among the set of hierarchical cloud resources, which includes a set of software applications, a set of middleware that supports one or more software applications from the set of software applications, and a set of virtual mechanisms that supports one or more middleware from the set of middleware. The supervisor server receives a signal from one or more Isolation/Density (I/D) switches, which are associated with one or more software applications from the set of software applications and one or more middleware from the set of the middleware, and then configures the hierarchical cloud resources, according to the boundary of the set of hierarchical cloud resources, and according to settings of the I/D switches.
Abstract:
A computer-implemented method includes receiving a data stream and dividing the data stream into one or more data artefacts for one or more time intervals. The computer-implemented method further includes generating one or more contexts. Each of the one or more contexts are for at least one of the one or more time intervals. The computer-implemented method further includes storing each of the one or more data artefacts in shared storage. The shared storage is accessible for each of the one or more contexts. The computer-implemented method further includes, for each context of the one or more contexts: determining a dependency for the context; monitoring the context for a completion of said dependency; and responsive to the completion, releasing the dependency. The computer-implemented further includes removing those of the one or more data artefacts that do not belong to the dependency for any of the one or more contexts.
Abstract:
A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set.
Abstract:
A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate violates any constraint in the set.
Abstract:
A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set.
Abstract:
Scheduling automated visual inspection tasks includes capturing an image of a component to be inspected. A visual inspection model is formed with a model engine as a composite model of utility modules and functional modules to perform visual inspection of the image of the component. An abstract processing workflow of the visual inspection model is derived with a scheduler including dependencies between the utility modules and the functional modules. Performance of each of the functional modules is profiled with the scheduler by testing performance with available hardware resources to produce a performance profile. Parallel instances of each of the functional modules in a branch of the abstract processing workflow are scheduled with the scheduler according to the dependencies and the performance profiles. An indication of defects in the component is produced by processing the visual inspection model according to the scheduled functional modules.