摘要:
A method of managing and maintaining scope in a of service oriented architecture industry model repository comprising defining boundaries and definitions of scope and scope propagation of topics, associations, and occurrences within the SOA IMR; managing boundaries and definitions of scope and scope propagation within the SOA IMR; and maintaining boundaries and definitions of scope and scope propagation within the SOA IMR.
摘要:
A method of managing and maintaining scope in a of service oriented architecture industry model repository comprising defining boundaries and definitions of scope and scope propagation of topics, associations, and occurrences within the SOA IMR; managing boundaries and definitions of scope and scope propagation within the SOA IMR; and maintaining boundaries and definitions of scope and scope propagation within the SOA IMR.
摘要:
In one illustrative embodiment, a computer-implemented method for identifying program components, generates, by a processor unit, associations between the program components stored in a computer usable storage medium to create a first set of relationships, and assigns, by the processor unit, a probability to each relationship in the first set of relationships to create a second set of relationships, wherein the probability indicates a strength of the associations between the program components.
摘要:
An apparatus for automatically analyzing the impact of changing a business requirement on an IT infrastructure of an enterprise. A request is received to perform an analysis of an impact on the enterprise by changing a particular instance of the business requirement. A model repository is queried to determine which IT assets of the enterprise are impacted by changing the particular instance of the business requirement. An impact relevant subset of a topic map is received from the model repository representing the impact on the enterprise by changing the particular instance of the business requirement that includes the particular instance requirement as a root node and only those specific assets impacted by changing the particular instance requirement as connected nodes. Then, the impact relevant subset of the topic map representing the impact on the enterprise by changing the particular instance of the business requirement is outputted on an output device.
摘要:
Techniques are disclosed for rendering geographic information system (GIS) data. A server component responding to a request for GIS data for a given area combines contiguous elements that share the same dynamic characteristics. For example, a map server may combine the polylines of contiguous road segments sharing the same current speed/congestion conditions. Doing so may greatly reduce the number of individual polylines that are sent to a client for rendering.
摘要:
A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights. By providing a DRM-enabled Java runtime, which does not affect the way non-DRM-related programs work, DRM content providers will not require the installation of customized players. By securing the runtime, every Java™ player automatically and transparently becomes a DRM-enabled player.
摘要:
A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights. By providing a Ad DRM-enabled Java runtime, which does not affect the way non-DRM-related programs work, DRM content providers will not require the installation of customized players. By securing the runtime, every Java™ player automatically and transparently becomes a DRM-enabled player.
摘要:
A digital rights management system for controlling the distribution of digital content to player applications. The system comprises a verification system, a trusted content handler, and a user interface control. The verification system is provided to validate the integrity of the player applications; and the trusted content handler is used to decrypt content and to transmit the decrypted content to the player applications, and to enforce usage rights associated with the content. The user interface control module is provided to ensure that users of the player applications are not exposed to actions that violate the usage rights. The preferred embodiment of the present invention provides a system that enables existing content viewers, such as Web browsers, document viewers, and Java Virtual Machines running content-viewing applications, with digital rights management capabilities, in a manner that is transparent to the viewer. Extending content viewers with such capabilities enables and facilitates the free exchange of digital content over open networks, such as the Internet, while protecting the rights of content owners, authors, and distributors. This protection is achieved by controlling access to the content and constraining it according to the rights and privileges granted to the user during the content acquisition phase.
摘要:
A system and method for providing automatic scheduling and establishment of telephone conferences over a network such as the Internet. A user inputs conference information to a desktop application, and the scheduling, the contacting of participants, and the control of the conference are conducted automatically. If the conference is scheduled to dial out to the participants and is marked as a calendar entry, the desktop application stores the conference information, including the start/end time of a conference, the telephone numbers of the participants, the choice of service provider, and an account id. Once a teleconference calendar entry is created, the process starts and the conference is established automatically. At the scheduled time, the desktop application warns the user by running an alarm function to remind them of the time of the conference. Thereafter, a secondary application is invoked and the conference information is passed to the secondary application for automatic establishment of the conference. When the secondary application is invoked, it establishes an Internet connection with the service provider and exchanges data messages to start and monitor the audio conference. The status of the participants and of the conference are reported to the user by the secondary application via a user interface. The conference service provider receives the telephone numbers of the participants over the established data connection and starts dialing out to the participants. When the participants answer, they are all connected to an audio bridge. In one modification of the invention, the service provider returns a dial-in number and a password, upon request, to be distributed to the participants, so that any users who are unable to provide a dial-out number in advance may dial in to the scheduled conference.