摘要:
Monitoring interactions between application programs and data stores for analyzing stability of application programs. A method of the invention intercepts interactions from a plurality of application programs to a data store. The method also identifies pre-execution data relating to each of the intercepted interactions and the intercepted interaction is executed. The method identifies post-execution data relating to each of the executed interactions. The identified pre-execution data and the identified post-execution data from each of the interactions are normalized to create normalized interaction data for each of the interactions. The method combines the normalized interaction data for each of the interactions as a function of the application programs associated with each of the interactions. The method further stores the combined interaction data for analysis of the interactions between the application programs and the data store which is indicative of the stability of the application programs.
摘要:
System and method for analyzing the impact of interactions of application programs with resources stored in a data store. A method of the invention receiving a selection of the application programs from a user. The interactions of the resources by the selected application programs are identified. The method also determines access types for each of the interactions of the resources by the selected application programs. The method further selects a set of the identified interactions and the determined access types that corresponds to a map, said map including a predefined set of interactions having access types associated therewith. The map with the selected set of the identified interactions and the determined access types is provided to the user. For example, the map identifies potential resource conflicts. Alternatively, the method generates a report including the map.
摘要:
Managing the installation, execution, and removal of application programs by an operating system via an application identity associated with each application program. A method of the invention assigns the application identity to each application program and a resource identity to each resource associated with each application program. The method relates the assigned application identity and resource identity to enable manipulation of the application program and its resources.
摘要:
Granting an application program access to a resource as a function of a privilege associated with the application program. An embodiment of the invention employs a persistent, individual identity associated with the components of an application program or a group of application programs to allow an operating system to identify and differentiate between different application programs or groups of application programs installed on a computing system. The identity associated with each component of an application program enables the identification and removal or uninstallation of the application program. The identity also enables isolation of resources of the application program and protection of operating system resources.
摘要:
Granting an executable object (e.g., an application program, thread, or process) access to a namespace object (e.g., a named object, resource, file, or folder). A request by the executable object for the namespace object is intercepted and processed to determine whether a local namespace associated with the executable object, user, or session stores a copy of the requested namespace object. If the copy exists in one of the local namespaces, the request is granted and allowed to operate on that local namespace. If the requested namespace object exists only in a global namespace, the namespace object is copied to a local namespace. The request is then granted and allowed to operate on the copy of the namespace object in the local namespace. Protecting the namespace objects stored in the global namespace from modification improves the stability of the application program and operating system.
摘要:
A method and apparatus for accelerating data transport through communication networks (e.g., the Internet) is taught. The data sources may include Internet web pages, electronic mails, computer files, digitized pictures, voice and video. The method combines smart content-based data compression schemes with intelligent routing to efficiently move information across a network. The apparatus works with existing communications protocols (e.g., TCP/IP, UDP, HTTP, SMTP and POP3) and fits transparently with Internet browsing applications.