摘要:
A documentation application periodically checks content of a documentation repository to determine whether the documentation repository includes documentation content for update. A documentation archive for update is retrieved from the documentation repository and parsed to read meta information specified in the documentation archive. Based on the meta information, content of the documentation archive for update is integrated into the documentation application at runtime of the documentation application.
摘要:
A documentation application periodically checks content of a documentation repository to determine whether the documentation repository includes documentation content for update. A documentation archive for update is retrieved from the documentation repository and parsed to read meta information specified in the documentation archive. Based on the meta information, content of the documentation archive for update is integrated into the documentation application at runtime of the documentation application.
摘要:
According to some embodiments, an apparatus and a method of capturing a type of file associated with a software deliverable is provided. A software deliverable is scanned for a predetermined type of file, a first file of the predetermined type of file is determined to exist in the software deliverable and the first file of the predetermined type of file is copied to a repository.
摘要:
According to some embodiments, an apparatus and a method of capturing a type of file associated with a software deliverable is provided. A software deliverable is scanned for a predetermined type of file, a first file of the predetermined type of file is determined to exist in the software deliverable and the first file of the predetermined type of file is copied to a repository.
摘要:
Various embodiments of systems and methods to process customized deployment scenarios in a shared computing environment are described. In one aspect, a deployment request is received at the shared computing environment by a client associated with a customized deployment scenario. In a response, a deploy service of the shared computing environment is instantiated. In another aspect, one or more custom deploy processors are identified by the deploy service, where the one or more custom deploy processors correspond to one or more customized deployment scenarios. In yet another aspect, a part of a deployable content passed to the one or more custom deploy processors by the deploy service, is deployed to the shared computing environment by at least one corresponding custom deploy processor.
摘要:
The present disclosure describes methods, systems, and computer program products for retrying message delivery in a network. One computer-implemented method includes determining a retry window (RW) for one or more retry attempts to send a message to a target system, determining a minimum silent interval (MSI) representing the minimum permitted time interval between two successive retry attempts, dividing the RW into one or more time slots of N duration, randomly determining, by a hardware processor, a point-in-time within a time slot starting from the beginning time of the time slot, and sending a message as a retry attempt to the target system at the point-in-time.
摘要:
The present disclosure describes methods, systems, and computer program products for retrying message delivery in a network. One computer-implemented method includes determining a retry window (RW) for one or more retry attempts to send a message to a target system, determining a minimum silent interval (MSI) representing the minimum permitted time interval between two successive retry attempts, dividing the RW into one or more time slots of N duration, randomly determining, by a hardware processor, a point-in-time within a time slot starting from the beginning time of the time slot, and sending a message as a retry attempt to the target system at the point-in-time.
摘要:
Various embodiments of systems and methods to process customized deployment scenarios in a shared computing environment are described. In one aspect, a deployment request is received at the shared computing environment by a client associated with a customized deployment scenario. In a response, a deploy service of the shared computing environment is instantiated. In another aspect, one or more custom deploy processors are identified by the deploy service, where the one or more custom deploy processors correspond to one or more customized deployment scenarios. In yet another aspect, a part of a deployable content passed to the one or more custom deploy processors by the deploy service, is deployed to the shared computing environment by at least one corresponding custom deploy processor.
摘要:
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
摘要:
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.