Abstract:
A mechanism is provided for deciding whether to install a first application within one of a plurality of candidate environments. An environment comprising one or more other applications. The first application and a candidate environment are analyzed to determine whether there is the potential for the first application to interact in an unintended manner with an application in the candidate environment. If there is no such potential, then the environment is identified as a suitable environment into which to install the first application. An unintended interaction is when a rule would be broken by an interaction between the first application and an application in the candidate environment.
Abstract:
A first request for a bundle resource can be sent to a first location. A first response can be received that identifies a second location. The first response can be analyzed to identify the second location. A second request and a third request can be created for a metadata resource and for an artifact resource. The second request can be sent to the second location. The third request can be sent to a third location. A second response and a third response can be received. The second response can comprise the metadata resource. The third response can comprise the artifact resource. The second response can be evaluated to determine the metadata resource. The third response can be evaluated to determine the artifact resource. The bundle resource can be created.
Abstract:
Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent.