摘要:
Communications, such as emails or other information, in a work setting can be retained in a shared database that operates similar to an Internet social network. As work activities are performed, the content of the work activities can be associated with one or more shared databases based on the individual performing the activities, a common topic or theme associated with the activity and/or a manual entry. As various individuals review information contained in the shared database, notifications relating to who reviewed the content and a time of review can be sent to a contributor of the content to provide for accountability issues.
摘要:
As incoming communications are received, a priority or significance level can be assigned to each communication. A communication determined to have a high priority can be presented to a user at substantially the same time as receiving the communication. A communication having a low priority can be placed in a low priority folder or flagged differently from a high priority communication (e.g., different color-coding). Behavior of a user as it relates to a received communication can be observed for learning purposes or to modify one or more classifications or priority levels.
摘要:
Aspects of the subject matter described herein relate to workflows. In aspects, an activity of a workflow may request data and provide a logical handle. In response, distributed workflow components use the logical handle to determine whether the requested data is available locally or remotely. If the data is available remotely, the components may obtain the data for the requesting entity. In the process of obtaining the data, the data may be serialized and deserialized. After the data is available locally, it is provided to the requesting entity.
摘要:
A new approach for handling stream imperfections based on speculative execution involves the retraction of incorrect events facilitated using operators to remove speculatively produced incorrect output. Additionally, parameters are disclosed that define a spectrum of consistency levels. A first parameter, maximum blocking time, exposes a tradeoff between a degree of speculation and latency. A second parameter, the maximum time data is remembered before being purged from the system, exposes a tradeoff between state size and correctness. Varying these two parameters produces a spectrum of consistency levels (e.g., strong, middle, weak) which address the specific tradeoffs built into other systems. Retraction is accomplished using operators that include Select, AlterLifetime, Join, Sum, Align, and Finalize.
摘要:
Communications, such as emails or other information, in a work setting can be retained in a shared database that operates similar to an Internet social network. As work activities are performed, the content of the work activities can be associated with one or more shared databases based on the individual performing the activities, a common topic or theme associated with the activity and/or a manual entry. As various individuals review information contained in the shared database, notifications relating to who reviewed the content and a time of review can be sent to a contributor of the content to provide for accountability issues.
摘要:
A technique is described for guaranteeing recovery in a computer system comprising of recovery contracts with a plurality of obligations for a message exchange between a first component and a second component. Three forms of contract are described, governing interactions between three types of components. Each contract is bilateral, i.e. between a first component and a second component. The first and second components have mutual agreement on when the contract will be released to facilitate log truncation, and independent and/or autonomous recovery. The use of persistent and transactional components and the requirements for ensuring that it is possible to replay the components in a deterministic fashion, can result in a high cost or overhead in logging of nondeterministic events, including component interactions. An appreciation that this requirement may result in overly pessimistic logging has led to the definition of three additional component types, a functional component, a subordinate component and a read-only component.
摘要:
A computer may function as a broker that brokers execution of portions of a workflow. The broker computer may have a processor and memory configured to receive the workflow via a network. The workflow may have a corresponding SLA document that has rules governing how the workflow is to be executed. The broker computer may identify discretely executable sub-workflows of the workflow. The broker computer may also obtain information describing computing characteristics of each of a plurality of service providers (e.g., computation clusters, cloud services, etc.) connected with the broker computer via the network. The broker computer may select a set of the service providers by determining whether their respective computing characteristics satisfy the SLA. The broker computer may pass the discretely executable sub-workflows to the selected set of service providers. The workflow is thus executed, in distributed federated fashion, transparently to the user submitting the workflow.
摘要:
A single device that receives communications intended for a user having multiple contact addresses associated with different user roles is provided. The single device can receive communications intended for multiple telephone numbers, email aliases, screen names, aliases, other means of contact, or combinations thereof. Since a user engaged in a particular role might not desire to be interrupted with communications intended for a different role, the communications for the other roles can be maintained until the user is actively engaged in the role for which the communication was intended. In situations where there is an important communication sent to a non-active role, selective convergence between roles is initiated and the important communication is presented to the user.
摘要:
As incoming communications are received, a priority or significance level can be assigned to each communication. A communication determined to have a high priority can be presented to a user at substantially the same time as receiving the communication. A communication having a low priority can be placed in a low priority folder or flagged differently from a high priority communication (e.g., different color-coding). Behavior of a user as it relates to a received communication can be observed for learning purposes or to modify one or more classifications or priority levels.
摘要:
A streaming operator assignment system and method for determining a streaming operator assignment that minimizes overload in a data processing system. Embodiments of the streaming operator assignment system include an optimization goals definition module, which defines optimization goals in terms of fundamental quantities that system administrators and application writers want to control, such as minimizing the worst case latency over all periods of time, or minimizing how much the system is backlogged with work. Embodiments of the streaming operator assignment system also include an optimization goals solution module that optimizes and solves a selected optimization goal. A specialized optimization technique is used to find the best operator (or load) assignment using the optimization goals to measure of the value of the assignment. This technique minimizes an optimization goal by iterating over all possible operators assignments over all possible nodes to find the operator assignment that minimizes the desired optimization goal.