摘要:
In accordance with the invention, cookies are automatically synchronized across multiple client machines on a network. A user registers all of the client machines for which he desires cookie synchronization under a single account with a cookie synchronization server. Each of the client machines is equipped with software that monitors all changes made to cookies at that machine and sends notifications of the changes to the cookie synchronization server. The cookie synchronization server stores the cookie change information in a log and sends it out to the other client machine in the account, which then update their cookies accordingly.
摘要:
A system, apparatus, and method for sharing web modules amongst a plurality of other web applications are provided. Shared web modules are stored in an archive data structure for use with web applications. The web applications, and/or the web modules of the web applications, may include a designation file that identifies the shared web modules that are to be incorporated into the web modules for the web application. A runtime component selectively locates these shared web modules and logically merges them with the web modules of the web application according to precedence or priority of the shared web modules as designated by the shared web module designation file. The result is a logically merged web module that contains the shared web modules referenced in the shared web module designation file.
摘要:
A method, apparatus and computer instructions are disclosed for maintaining the compatibility of a multiple nodes in a distributed systems management environment with multiple configuration settings, by transforming the configuration data stored in the master repository (one possible realization is where XML documents contain the configuration data) from one version of the product to a previous version of the product. For multiple versions of the systems management environment, a transformation pipeline process (one possible realization of such a process may utilize XSLT) can be used by a “master” node to transform the configuration data multiple times for each version of the environment, until the configuration data has the format of the intended recipient “slave” node. Also, by performing the transformation process on the “master” side of the computing environment, “slave” nodes with older version configuration settings can continue to operate without having to upgrade their software applications in this regard.
摘要:
A method, apparatus and computer instructions are disclosed for maintaining the compatibility of a multiple nodes in a distributed systems management environment with multiple configuration settings, by transforming the configuration data stored in the master repository (one possible realization is where XML documents contain the configuration data) from one version of the product to a previous version of the product. For multiple versions of the systems management environment, a transformation pipeline process (one possible realization of such a process may utilize XSLT) can be used by a “master” node to transform the configuration data multiple times for each version of the environment, until the configuration data has the format of the intended recipient “slave” node. Also, by performing the transformation process on the “master” side of the computing environment, “slave” nodes with older version configuration settings can continue to operate without having to upgrade their software applications in this regard.
摘要:
A method, apparatus and computer instructions are disclosed for maintaining the compatibility of a multiple nodes in a distributed systems management environment with multiple configuration settings, by transforming the configuration data stored in the master repository (one possible realization is where XML documents contain the configuration data) from one version of the product to a previous version of the product. For multiple versions of the systems management environment, a transformation pipeline process (one possible realization of such a process may utilize XSLT) can be used by a “master” node to transform the configuration data multiple times for each version of the environment, until the configuration data has the format of the intended recipient “slave” node. Also, by performing the transformation process on the “master” side of the computing environment, “slave” nodes with older version configuration settings can continue to operate without having to upgrade their software applications in this regard.
摘要:
A method for embedding behavior tags in a source code so that a computer can choose the appropriate implementation technology to execute the source code comprising a Configuration Program (CP) and a Deployment Program (DP). The CP allows a user to define and modify a plurality of behavior tags in the behavior tag definitions. The CP also allows the user to define and modify the preferences as to the implementation technologies in an implementation technology preference list. The user then creates the source code with embedded behavior tags. The DP reads the source code and automatically selects the appropriate implementation technology based on the behavior tags. The DP gives preference to implementation technologies according to the implementation technology preference list. The result is that the user does not have to specify the implementation technology for the source code or configure the behavior tags to a specific implementation technology.
摘要:
In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur.
摘要:
In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur.
摘要:
In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur.
摘要:
A system for managing code displacement may include a manager and an application operable on a server. The application may include a plurality of modules each module for performing a different operation. The system may also include priority information associated with each module to permit the manager to deactivate selected ones of the modules based on the priority information to improve performance of the application.