摘要:
A published event from a first content element executing within a framework may be detected. In response, a registry may be searched for one or more registered events that match the published event, and if a matching registered event is found, a second content element that registered said matching registered event may be instantiated to start executing within the framework. The second content element is dynamically aggregated into the framework based on the published event without the first content element needing to have previous knowledge of the second content element, and without the second content element needing to have previous knowledge of the first content element. The framework also does not need to be designed initially to deploy the second content element. Which one or more content elements to aggregate into the framework may be determined at run time rather than at design time.
摘要:
A published event from a first content element executing within a framework may be detected. In response, a registry may be searched for one or more registered events that match the published event, and if a matching registered event is found, a second content element that registered said matching registered event may be instantiated to start executing within the framework. The second content element is dynamically aggregated into the framework based on the published event without the first content element needing to have previous knowledge of the second content element, and without the second content element needing to have previous knowledge of the first content element. The framework also does not need to be designed initially to deploy the second content element. Which one or more content elements to aggregate into the framework may be determined at run time rather than at design time.
摘要:
Exemplary embodiments disclose a computer-implemented method for enabling an end-user to dynamically create a hot spot on a user interface (UI) of information resource without the end-user modifying underlying code of the UI. Aspects of the exemplary embodiment include responsive to the end-user activating a hot spot creation component, receiving a designation from the end-user of a location of the hot spot and a size of the hot spot within the UI; receiving from the end-user an assignment of a user gesture to the hot spot; receiving from the end-user an assignment of an action to the hot spot; and responsive to a detection of the user gesture on the hot spot, invoking the action assigned to the hot spot.
摘要:
Exemplary embodiments disclose a computer-implemented method for enabling an end-user to dynamically create a hot spot on a user interface (UI) of information resource without the end-user modifying underlying code of the UI. Aspects of the exemplary embodiment include responsive to the end-user activating a hot spot creation component, receiving a designation from the end-user of a location of the hot spot and a size of the hot spot within the UI; receiving from the end-user an assignment of a user gesture to the hot spot; receiving from the end-user an assignment of an action to the hot spot; and responsive to a detection of the user gesture on the hot spot, invoking the action assigned to the hot spot.
摘要:
Under the present invention, a system, method, and program product for dynamically adding resources in a web application server are provided. The method comprises: providing a resource; detecting an availability of the resource using a resource lookup web application; installing the resource into the resource lookup web application and, once installed, advertising the resource to the at least one web application; receiving a request for the resource from the at least one web application; and dynamically adding the resource to each requesting web application without having to restart the requesting web application and without losing session information in the requesting web application.
摘要:
A method, system and apparatus for estimating an SLA breach value. The method can include processing resource data to identify an acceptable SLA breach value; and, displaying the acceptable SLA breach value through a user interface. The processing step can include identifying a best practices SLA breach value based upon resource data for an aggregation of customers. Alternatively, the processing step can include identifying an average SLA breach value for a specific customer. As a further alternative, the identifying step can include identifying an average SLA breach value for a specific customer for a specific resource. As yet a further alternative, the processing step can include identifying an SLA breach value trend based upon past measured historical systems management data; and, predicting a future SLA breach value based upon the trend. In all cases, the acceptable SLA breach value can be increased by a fixed proportion.