Generating an electronic form locally on a client computer from input parameters
    1.
    发明授权
    Generating an electronic form locally on a client computer from input parameters 有权
    在客户端计算机上从输入参数生成电子表单

    公开(公告)号:US09348928B2

    公开(公告)日:2016-05-24

    申请号:US13313470

    申请日:2011-12-07

    IPC分类号: G06F17/00 G06F17/30 G06F17/24

    CPC分类号: G06F17/243 G06F17/30887

    摘要: A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form.

    摘要翻译: 计算机显示包含统一资源定位符(URL)的屏幕。 响应于最终用户在计算机上选择统一的资源定位符(URL),计算机拦截计算机内的请求以防止请求被发送到另一台计算机。 计算机确定URL是否包含定义具有缺失值的字段的一个或多个参数,并且需要从最终用户输入一个或多个输入值。 计算机利用一个或多个参数来生成电子表格,以在电子表格内为一个或多个参数中的每个参数制定一个字段。 计算机显示包括用于一个或多个参数中的每一个的字段的电子表单,这使得最终用户能够在电子表单内输入信息到字段中。

    GENERATING AN ELECTRONIC FORM LOCALLY ON A CLIENT COMPUTER FROM INPUT PARAMETERS
    2.
    发明申请
    GENERATING AN ELECTRONIC FORM LOCALLY ON A CLIENT COMPUTER FROM INPUT PARAMETERS 有权
    在输入参数的客户端计算机上产生电子表格

    公开(公告)号:US20130151935A1

    公开(公告)日:2013-06-13

    申请号:US13313470

    申请日:2011-12-07

    IPC分类号: G06F17/00

    CPC分类号: G06F17/243 G06F17/30887

    摘要: A computer displays a screen that includes a uniform resource locator (URL). In response to a selection of a uniform resource locator (URL) by an end-user at a computer, the computer intercepts a request within the computer to prevent the request from being sent to another computer. The computer determines whether the URL includes one or more parameters that define a field with a missing value, and that need entry of one or more input values from the end-user. The computer generates an electronic form utilizing the one or more parameters to formulate a field, within the electronic form, for each of the one or more parameters. The computer displays the electronic form including the field for each of the one or more parameters, which enables the end-user to enter information into the field within the electronic form.

    摘要翻译: 计算机显示包含统一资源定位符(URL)的屏幕。 响应于最终用户在计算机上选择统一的资源定位符(URL),计算机拦截计算机内的请求以防止请求被发送到另一台计算机。 计算机确定URL是否包含定义具有缺失值的字段的一个或多个参数,并且需要从最终用户输入一个或多个输入值。 计算机利用一个或多个参数来生成电子表格,以在电子表格内为一个或多个参数中的每个参数制定一个字段。 计算机显示包括用于一个或多个参数中的每一个的字段的电子表单,这使得最终用户能够在电子表单内输入信息到字段中。

    LINKING INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT
    3.
    发明申请
    LINKING INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT 有权
    连接在一个云计算环境中的事件

    公开(公告)号:US20120072555A1

    公开(公告)日:2012-03-22

    申请号:US12887773

    申请日:2010-09-22

    IPC分类号: G06F15/177 G06F3/01

    摘要: Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (GUI or the like), and associated with a set of rules. The set of rules indicates a behavior/reaction of one instance when an action is performed with respect to another instance linked thereto. These embodiments could be implemented external to or within a cloud operating environment.

    摘要翻译: 本发明的实施例提供了一种允许用户将多个云实例(例如,虚拟机)链接在一起的方法,使得当第二实例的状态改变时,在一个(云)实例上的动作被触发,从而调用预定义的一组规则。 具体来说,实例可以通过图形用户界面(GUI等)彼此链接,并且与一组规则相关联。 一组规则指示当相对于与其链接的另一个实例执行动作时,一个实例的行为/反应。 这些实施例可以在云操作环境外部或内部实现。

    Increased security for computer userID input fields
    4.
    发明授权
    Increased security for computer userID input fields 有权
    提高计算机用户ID输入字段的安全性

    公开(公告)号:US08943566B2

    公开(公告)日:2015-01-27

    申请号:US13247375

    申请日:2011-09-28

    摘要: A computer determines whether current location information of the computer indicates that the computer is at a home location. The computer determines a minimum number of characters to be entered by a user into a userID field to cause the computer to automatically display previously entered userIDs based on whether the computer is located at a home location. If fewer than the minimum characters are entered, previously entered userIDs are not displayed. Location information can be based on one or more of: wi-fi signal strengths, cell tower signal strengths and signal arrival timing information, whether the network connection is wireless or Ethernet cable, the wireless protocol, whether a wi-fi connection is secured or public, whether the computer is a mobile device, and satellite navigation system location.

    摘要翻译: 计算机确定计算机的当前位置信息是否指示计算机在本地位置。 计算机确定要由用户输入到用户ID字段中的最小字符数,以使计算机基于计算机是否位于归属位置自动显示先前输入的用户ID。 如果输入的字符少于最小字符,则不会显示先前输入的userID。 位置信息可以基于以下一个或多个:Wi-Fi信号强度,信元塔信号强度和信号到达定时信息,网络连接是无线或以太网电缆,无线协议,Wi-Fi连接是否被保证或 公众,电脑是否是移动设备,以及卫星导航系统的位置。

    INCREASED SECURITY FOR COMPUTER USERID INPUT FIELDS
    5.
    发明申请
    INCREASED SECURITY FOR COMPUTER USERID INPUT FIELDS 有权
    增加用于计算机用户名输入字段的安全性

    公开(公告)号:US20130081120A1

    公开(公告)日:2013-03-28

    申请号:US13247375

    申请日:2011-09-28

    IPC分类号: G06F21/00

    摘要: A computer determines whether current location information of the computer indicates that the computer is at a home location. The computer determines a minimum number of characters to be entered by a user into a userID field to cause the computer to automatically display previously entered userIDs based on whether the computer is located at a home location. If fewer than the minimum characters are entered, previously entered userIDs are not displayed. Location information can be based on one or more of: wi-fi signal strengths, cell tower signal strengths and signal arrival timing information, whether the network connection is wireless or Ethernet cable, the wireless protocol, whether a wi-fi connection is secured or public, whether the computer is a mobile device, and satellite navigation system location.

    摘要翻译: 计算机确定计算机的当前位置信息是否指示计算机在本地位置。 计算机确定要由用户输入到用户ID字段中的最小字符数,以使计算机基于计算机是否位于归属位置自动显示先前输入的用户ID。 如果输入的字符少于最小字符,则不会显示先前输入的userID。 位置信息可以基于以下一个或多个:Wi-Fi信号强度,信元塔信号强度和信号到达定时信息,网络连接是无线或以太网电缆,无线协议,Wi-Fi连接是否被保证或 公众,电脑是否是移动设备,以及卫星导航系统的位置。

    Linking instances within a cloud computing environment
    6.
    发明授权
    Linking instances within a cloud computing environment 有权
    链接云计算环境中的实例

    公开(公告)号:US09043445B2

    公开(公告)日:2015-05-26

    申请号:US12887773

    申请日:2010-09-22

    IPC分类号: G06F15/173 G06F9/50

    摘要: Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (GUI or the like), and associated with a set of rules. The set of rules indicates a behavior/reaction of one instance when an action is performed with respect to another instance linked thereto. These embodiments could be implemented external to or within a cloud operating environment.

    摘要翻译: 本发明的实施例提供了一种允许用户将多个云实例(例如,虚拟机)链接在一起的方法,使得当第二实例的状态改变时,在一个(云)实例上的动作被触发,从而调用预定义的一组规则。 具体来说,实例可以通过图形用户界面(GUI等)彼此链接,并且与一组规则相关联。 一组规则指示当相对于与其链接的另一个实例执行动作时,一个实例的行为/反应。 这些实施例可以在云操作环境外部或内部实现。

    Policy-based scaling of computing resources in a networked computing environment
    7.
    发明授权
    Policy-based scaling of computing resources in a networked computing environment 有权
    网络计算环境中计算资源的基于策略的扩展

    公开(公告)号:US08966085B2

    公开(公告)日:2015-02-24

    申请号:US13343293

    申请日:2012-01-04

    IPC分类号: G06F15/16

    摘要: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.

    摘要翻译: 本发明的实施例提供了一种用于在联网的计算环境(例如,云计算环境)中的计算资源的策略驱动(例如,价格敏感的)扩展的方法。 在典型的实施例中,将接收对客户的工作负载请求,并且可以识别可用于处理工作负载请求的一组计算资源。 然后将确定该组计算资源是否足以处理工作负载请求。 如果该组计算资源被分配不足(或被过度分配),则可以访问资源缩放策略。 然后可以基于资源缩放策略对该组计算资源进行缩放,从而可以有效地处理工作负载请求,同时保持与资源缩放策略的一致性。

    Differentiating image files in a networked computing environment
    8.
    发明授权
    Differentiating image files in a networked computing environment 失效
    在联网计算环境中区分图像文件

    公开(公告)号:US08775575B2

    公开(公告)日:2014-07-08

    申请号:US12938702

    申请日:2010-11-03

    IPC分类号: G06F15/177

    CPC分类号: H04L41/0813 G06F9/5077

    摘要: In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon.

    摘要翻译: 通常,本发明的实施例提供了一种在网络化(例如,云)计算环境中区分和/或定制图像文件的方法。 具体地,将识别与所请求的实例相对应的多个图像以及与多个图像相对应的所有配置文件。 在识别配置文件时,将确定对于所有多个图像共同的配置文件的第一子集以及对各个图像是唯一的配置文件的第二子集。 然后,用户可以从两个子集中单独选择配置文件,并且可以基于此生成所请求的实例。

    Source Control Execution Path Locking
    9.
    发明申请
    Source Control Execution Path Locking 审中-公开
    源控制执行路径锁定

    公开(公告)号:US20140026117A1

    公开(公告)日:2014-01-23

    申请号:US13604936

    申请日:2012-09-06

    IPC分类号: G06F9/44

    CPC分类号: G06F8/71 G06F8/433

    摘要: An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user.

    摘要翻译: 本发明的实施例提供了一种用于计算机程序中的源控制的方法,其中所述计算机程序包括用于执行多个进程的多个文件。 识别由图形用户界面上的用户选择的修改过程,其中修改的处理包括执行路径。 确定用户正在修改,修改和/或正在计划修改的修改过程中的文件的修改部分。 确定处于修订过程的执行路径中的部分文件。 修改过程的执行路径中的文件部分被源控制处理器锁定。 该锁定不允许在修改的处理的执行路径中的文件不是由用户进行的修改(例如,写入和删除操作)。

    Source control inheritance locking
    10.
    发明授权

    公开(公告)号:US08612407B1

    公开(公告)日:2013-12-17

    申请号:US13552323

    申请日:2012-07-18

    IPC分类号: G06F17/30 G06F7/00

    CPC分类号: G06F17/30171 G06F17/30607

    摘要: An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.