摘要:
A complex task is managed by controlling the independent, cooperating components that make up the complex task. This control includes, for instance, pre-run dynamic validation of the components of the complex task; programmatic determination of the proper order to start, stop or delete one or more of the components; post-run automatic recovery from a terminated component; and/or automatic collection of information regarding the independent, cooperating components, such that the overall status of the complex task is obtained and understood. The control is provided through a centralized mechanism that enables easy configuration, control and monitoring of the independent, cooperating components of a complex task.
摘要:
A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
摘要:
Systems and methods for automatically managing session resources in a distributed network of processors are disclosed. In one embodiment of the invention, a system for managing the use of resources in a system where a remote client uses resources at a server for a limited duration includes: a stored listing of at least one resource being used at the server and the client using that resource; a system which identifies that a remote client is no longer using resources at the server; and in response to the system identifying that the client is no longer using resources at the server, a mechanism which removes the resources which had been used by the client when the client was connected to the server, whereby the resources being used by a client may be used by other clients after the client has disconnected from the server.
摘要:
A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. Because unnatural terminations do not normally provide a farewell message from the client to the server there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client.
摘要:
A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
摘要:
First and second RFID edge servers can interact with RFID tag readers. The first and second RFID edge servers can arbitrate which of the first and second RFID edge servers will be active upon start up or edge server failure.
摘要:
A switching error detection and recovery mechanism recognizes that an I/O configuration has changed. Comparing new configuration data to previous data maintained in a CDT table structure, and detecting unequal path information, an error condition is recognized. After recognizing the error condition, recovery actions are taken to notify the operator and insure data integrity. The CDT is structured so that redundant data is eliminated, and so records may be efficiently and dynamically added and deleted.
摘要:
A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. Telemetry data is communicated between a data producing device and a data receiving device. The telemetry data sent from the data producing device is identified using the identity identifier of the data producing device.
摘要:
A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. Telemetry data is communicated between a data producing device and a data receiving device. The telemetry data sent from the data producing device is identified using the identity identifier of the data producing device.
摘要:
First and second RFID edge servers can interact with RFID tag readers. The first and second RFID edge servers can arbitrate which of the first and second RFID edge servers will be active upon start up or edge server failure.