摘要:
Methods and apparatus provide for an event identity manager that defines a topology of resources. The topology of resources represents relationships amongst the resources in a data center and each of the resources comprises resource attributes described in a data model. The event manager acquires event data describing an event that occurred amongst the resources. In addition, the event data comprises a format that is incompatible with the data model. The event manager correlates the event data with the data model in order to determine a locus of the event data within the topology of resources, the locus of the event data being a resource where the event is most likely associated.
摘要:
A system uses a design virtual machine to interpret execution over one or more methods to deduce collaborations. When collaborations are deduced in this manner, the collaborations can be visualized and displayed using Object Structure Diagrams, Object Interaction Diagrams and CRC Reports.
摘要:
A method, system, and computer-readable code with which a computing platform for automobiles can be constructed using software components. In particular, device functionality and platform software functionality available to computer applications are represented as JavaBeans in the Java computer programming language. Applications can be written to run on an automotive computing platform to access the device functionality using JavaBeans components. In this manner, software can be optimized for particular automotive applications or particular environments of devices and/or software, while still providing applications that are usable in a wide variety of automobile computing platforms and device configurations.
摘要:
A method and apparatus in a distributed data processing system for providing proxy services. Requests are processed by a primary proxy, using a shared memory in the distributed data processing system. A challenge from a secondary proxy to the primary proxy is detected. A determination is made as to whether the secondary proxy has priority over the primary proxy. This may be determined using priorities assigned to the proxies. Responsive to determining whether the secondary proxy has priority over the primary proxy, a priority of the secondary proxy is stored. Responsive to the secondary proxy having priority over the primary proxy, the secondary proxy to is allowed access the shared memory. Further, the secondary proxy is then allowed to multi-cast a message to clients indicating the secondary proxy's location. This message indicates that the secondary proxy is now the primary proxy.
摘要:
A method and apparatus in a distributed data processing system for scaling servers. Access to a shared memory for a period of time is selectively provided to a server within a plurality of servers, wherein the shared memory is used by the server to process requests. All other servers within the plurality of servers are prevented from accessing the shared memory during the period of time.
摘要:
A system and method for messaging subscription management by subscribing a subscriber to a publisher, providing a broker brokering message flow between the publisher and the subscriber whereby the publisher publishes information to the broker which then forwards the information to the subscriber, and filtering messages whereby any messages not originating from the publisher are filtered out. The filtering may comprise modifying at the publisher a filter supplied by the subscriber and sending the modified filter to the broker, or may comprise modifying at the subscriber a filter and sending the modified filter to the broker.
摘要:
Devices are registered within a zone using a service discovery protocol. At the time of registration, a device sends a grammar and a set of help sequences to a control unit in the zone to be merged into a composite grammar and composite set of help sequences. If the voice command iddued by a user is recognized, an appropriate method invocation is sent to the device to perform the desired operation. If the device in the voice command is recognized but the operation is not recognized, then the user is provided with a help sequence on how to properly perform operations with the device. If the device is not recognized, the command is forwarded to another zone within a set of zones until either the device is found or no such device is located.
摘要:
A method and system for message subscription management is presented. In one embodiment, the method includes sending a subscription request from a subscriber to a publisher. The subscription request is intercepted and redirected to a broker. Upon intercepting the subscription request, additional information, which includes an instruction to send event messages to the subscriber, is added to the subscription request and forwarded to the broker.
摘要:
The invention provides a software construct, herein termed a Web service container, for managing Web services at a network node and an adaptive model for the dynamic configuration of a plurality of Web service containers distributed throughout a network, such as the Internet or an intranet, in a software and hardware platform-independent manner. Containers can communicate with each other via the network to determine contextual information such as the identity of each other, the capabilities of each other, the operating system or platforms of each others, the contents of the container (i.e., the available Web services at that location), etc. By providing a container framework and the ability to exchange contextual information, the present invention allows servers as well as clients to dynamically exchange Web services software as well as contextual information, such as current workload, so that servers and clients are virtually limitlessly reconfigurable based on context.
摘要:
A method and apparatus in a computing platform located in an vehicle for restricting access to a plurality of software components, wherein the plurality of software components are used to interface with a plurality of devices located within the vehicle. A request is received from an application for a software component, wherein the request includes a data structure, wherein the software component is a requested software component. A determination is made as to whether the requested software component is present within the plurality of software components. An access level for the application is identified and a result is returned to the application based on whether the requested software component is present in the plurality of software components and based on the access level identified for the application.