摘要:
In one embodiment, a system transfers data between source and target systems. The system receives a module including procedural logic for transforming source data of a source data model to a target data model to produce one or more target data objects for the target data model. The procedural logic is expressed by one or more elements of a domain specific language implemented by an underlying computer language. The one or more elements define mappings and structure for the one or more target data objects. The module is executed to produce the one or more target data objects for loading in the target system in accordance with the mappings and structure defined within the procedural logic by the one or more elements. Embodiments of the present invention further include a method and computer program product for transferring data between source and target systems in substantially the same manner described above.
摘要:
According to one embodiment of the present invention, a system determines groups of nodes within a network, each group forming a bi-connected component. The system identifies articulation nodes within the network, where each articulation node resides within each connection between a pair of nodes in the network. The system removes from the determined group each node that includes an articulation node between that node and both the source and target nodes to produce a resulting set of nodes. The system determines connections between the source and target nodes based on the resulting set of nodes. Embodiments of the present invention further include a method and computer program product for determining connections between network nodes in substantially the same manners described above.
摘要:
A system processes streaming data and includes at least one processor. The system may write streaming data received from a data source as messages in queues at a queuing cluster. The queuing cluster includes a coordinator node to direct the messages to non-coordinator nodes of the queuing cluster. The system may retrieve the data from the queues based on subscription of topics and store the retrieved data in a consumable repository.
摘要:
A method, computer program product, and infrastructure for accessing a remote application running on a system A by a system B, each being connected to an open network and located behind a firewall, are provided. The method, computer program product, and infrastructure provide for system A sending a first HTTP request to system B via the open network, blocking the first HTTP request from system A till an application request is available at system B, system B sending an HTTP response to system A via the open network, the HTTP response comprising the application request, system A processing the application request from system B to generate an application response, system A sending a second HTTP request to system B via the open network, the second HTTP request comprising the application response, and blocking the second HTTP request from system A till another application request is available at system B.
摘要:
Methods, systems and computer program products for concurrency control in a hierarchical arrangement of nodes of a data structure by traversing a single search path in a hierarchical arrangement of nodes of a data structure, recording a version number for each node in the search path, identifying at least one node in the search path to be updated, latching the at least one node, reading a version number of the latched at least one node and comparing the recorded version number of the latched at least one node to the read version number of the latched at least one node.
摘要:
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable access rules associated with a private domain of a social network, and identifying private data of the content. A potential share of the content outside of the private domain is detected and a search of the potential share to determine whether the potential share is associated with the private data is performed. The techniques may also include detecting a match between the potential share and the private data.
摘要:
Crawling a browser-accessible application by causing a target application and a bridge application to run concurrently in a browser-controllable player, and iteratively receiving from the bridge application current state information of the target application, storing the state information on a data storage device if the state information is not found on the data storage device, where the state information is stored as a descendant state of an initial state of the target application, and interacting with the target application in accordance with a predefined simulation algorithm, thereby effecting a new state of the target application, until a predefined termination condition is reached.
摘要:
A method, computer program product, and system for memory optimization by partitioning extraneous information from executable virtual machine code or interpreted code. The extraneous information may be stored separately, or accessed from the original code if needed for debugging or servicing the code in the field. This approach optimizes memory usage by reducing memory footprint while maintaining accessibility of the non-executable information for debugging and other processes necessary for servicing code in the field.
摘要:
The present invention provides a method and system for improving the client-Servlet communication in the World-Wide-Web (Web) without changing the existing communication protocol, and without changing the client. The Servlet identifies missing information not included in the initial client's web-browser request for retrieving the information desired, where the Servlet automatically opens another communication path for providing the missing information to the Servlet by making use of the HTTP-response functionality of the initial HTTP-request. The other communication path is supported by a further Servlet functionality component.
摘要:
A records management system classifies records according to a file plan. Record are declared, and then classified. Some records have in initially indeterminate classification and classification is deferred, either by request or due to a lack of sufficient information to classify the record according to the file plan. Unclassified records are placed into a temporary container. At some time while in the temporary container a classification event occurs with a given record which allows the records management system to classify the record and place it into a container corresponding to its classification.