摘要:
An Enterprise Data Movement (EDM) system and method for performing data move operations in an enterprise computing system with improved efficiency. Data move operations preferably use operations of an existing database utility, for example, one or more of an unload or load operation, wherein the utility is already required to be performed. In other words, according to the invention, data move operations preferably use the utilities in an opportunistic or parasitic fashion, when they are already being performed for other reasons, thereby providing a dual purpose operation and increased efficiency.
摘要:
An Enterprise Data Movement (EDM) system and method for performing bulk data move operations and changed data propagation operations in an enterprise computing system with improved efficiency. The present invention provides synergy of operations between a bulk data move operation and a changed data propagation, wherein the load process of a bulk data move operation and the apply process of a changed data propagation operation operate to communicate with each other to ensure proper operation and also to ensure that each of the bulk move and propagation operations do not interfere with each other. Thus, the present invention provides an improved and automated procedure for performing bulk move and changed data propagation operations which reduces the amount of time required by database administrators to monitor and/or perform tasks.
摘要:
A system and method for providing consistency of replicated data in a distributed enterprise computing system by maintaining and using edition level values for data objects in both source and target database systems. When the EDM method captures changes made to a source database, the EDM method operates to obtain an edition level value of the source database. The EDM method then creates and stores a change record comprising the captured changed data in a log, wherein the change record includes the edition level value of the source database to which the changes are being made. When a data propagation operation is initiated to one or more target computer systems, the EDM method operates to obtain an edition level value of each of the target computer systems. For each target computer system, the method operates to compare the edition level value comprised in the change record with the edition level value of the target computer system. This comparison determines whether the target and source database edition level values match. If the target and source database edition levels match, the change record is propagated to the target database. If the source database edition level is prior to the target edition level, the change record is not propagated to the target database.
摘要:
The invention provides scalable, secure, and easily administerable methods and systems for providing remote access to networked resources by combing aspects of physical access limitation measures with traditional computer access limitation measures. The methods and systems utilize an enrollment administration system for specifying enrollment rules, an enrollment system configured to communicate with the enrollment administration system to permit enrolling a first networked resource if permitted by specified enrollment rules, and a remote access system for granting a user remote access to the first networked resource if the user successfully enrolled the first networked resource.
摘要:
Systems and methods for providing a uniform network addressing scheme for a user accessing a network that is independent from the computer from which the user accesses the network. A virtual IP address is assigned to a user, a user session or a program run by user, where the IP address is different from the IP address of the computer of the user, and different from other users. A virtual host name is assigned to and associated with the virtual IP address of the user, user session or the program the user is running. As the user accesses the network from different computers, the user can be assigned the same virtual host name and in some cases the same virtual IP address. Furthermore, as the user accesses the network from multiple user sessions, the user can be assigned a virtual host name that uniquely identifies the user and the user session.
摘要:
A method for redirecting, to a second machine, without user intervention, a request for access to a folder on a first machine, the request made by a resource executing within a remote access session on the first machine, includes receiving, by a component on a first machine, folder mapping information associated with a folder provided by a shell namespace on a second machine. The component intercepts a request by a resource executing on the first machine for access to file system data on the first machine. The component redirects the request to the second machine responsive to the received folder mapping information.
摘要:
The invention provides scalable, secure, and easily administerable methods and systems for providing remote access to networked resources by combing aspects of physical access limitation measures with traditional computer access limitation measures. The methods and systems utilize an enrollment administration system for specifying enrollment rules, an enrollment system configured to communicate with the enrollment administration system to permit enrolling a first networked resource if permitted by specified enrollment rules, and a remote access system for granting a user remote access to the first networked resource if the user successfully enrolled the first networked resource.
摘要:
The invention relates to systems and methods for assigning a unique network identifier to one or more programs invoked on a computer. The computer obtains a plurality of network identifiers and associates a first network identifier to a first program invoked on the computer and associates a second network identifier, different from the first network identifier, to a second program invoked on the computer. The program may be a user session hosted by the computer, an application or an application isolation environment. The computer through a network communication interface transmits the first network identifier with the network communication of the first program and transmits the second network identifier with network communication of the second program.
摘要:
The invention provides scalable, secure, and easily administerable methods and systems for providing remote access to networked resources by combing aspects of physical access limitation measures with traditional computer access limitation measures. The methods and systems utilize an enrollment administration system for specifying enrollment rules, an enrollment system configured to communicate with the enrollment administration system to permit enrolling a first networked resource if permitted by specified enrollment rules, and a remote access system for granting a user remote access to the first networked resource if the user successfully enrolled the first networked resource.
摘要:
A method for redirecting, to a second machine, without user intervention, a request for access to a folder on a first machine, the request made by a resource executing within a remote access session on the first machine, includes receiving, by a component on a first machine, folder mapping information associated with a folder provided by a shell namespace on a second machine. The component intercepts a request by a resource executing on the first machine for access to file system data on the first machine. The component redirects the request to the second machine responsive to the received folder mapping information.