On-demand and incremental application adaptation
    1.
    发明申请
    On-demand and incremental application adaptation 有权
    按需和增量应用程序的适应

    公开(公告)号:US20050125510A1

    公开(公告)日:2005-06-09

    申请号:US10729300

    申请日:2003-12-05

    CPC classification number: G06F8/433 G06F17/30902

    Abstract: Components of an application that may be requested by a user in the future are identified and adapted for operation with a device of the user in response to a request for a component of the application by the user. Optionally, only the requested and identified components are adapted for operation with the requesting device, which may enable component adaptation within a specified maximum time period. A reachability analysis may be performed to identify components reachable from the requested component and components that are within a specified distance of the requested component may be identified or selected. The identified components may further be selected or identified based on historical request patterns relating to the application.

    Abstract translation: 响应于用户对应用的组件的请求,识别适合用户将来请求的应用的组件,以适应用户的设备的操作。 可选地,仅请求和识别的组件适于与请求设备一起操作,这可以使得在指定的最大时间段内的组件适配。 可以执行可达性分析以识别从所请求的组件可访问的组件,并且可以识别或选择在所请求组件的指定距离内的组件。 可以基于与应用相关的历史请求模式进一步选择或识别所识别的组件。

    Semantically consistent adaptation of software applications

    公开(公告)号:US20060130028A1

    公开(公告)日:2006-06-15

    申请号:US10998850

    申请日:2004-11-29

    CPC classification number: G06F8/71

    Abstract: The adaptation precedence of an application (or order of adaptation of various components) is given as a directed acyclic graph (DAG), with each vertex being an atomic unit of adaptation, or a component which comprises of atomic units of adaptation. Each such component has an associated DAG specifying the order of adaptation with vertices as sub-components. Relations among sub-components and associated actions are stored as a table. The relations between sub-components of different components follow a set of constraints in order to be compatible relations. A linear order from the partial order is created as represented by the DAG and follows that order for adaptation of each component. Each component x is adapted atomically and then the table of relations is updated appropriately. As and when a component y is to be adapted, the table is looked-up and it is determined which relations and actions are to be enforced upon y while its adaptation is being executed. A new version of the application is the output at the end of the adaptation, which is semantically consistent with the given relations and actions.

    Infrastructure-aware application development
    3.
    发明申请
    Infrastructure-aware application development 审中-公开
    基础架构感知应用程序开发

    公开(公告)号:US20050289502A1

    公开(公告)日:2005-12-29

    申请号:US10880124

    申请日:2004-06-29

    CPC classification number: G06F8/10

    Abstract: Constraints associated with hardware upon which the application is to be deployed are determined, and parameters associated with the determined constraints are recorded for later use. Parameters may be static or dynamic in nature. Conflicts between determined constraints having incompatible parameters are resolved using a “consistent union” approach.

    Abstract translation: 确定与要部署应用程序的硬件相关联的约束,并且记录与确定的约束相关联的参数供以后使用。 参数本质上可以是静态或动态的。 使用“一致的联合”方法解决确定的具有不兼容参数的约束之间的冲突。

    Lazy document and data validation
    4.
    发明申请
    Lazy document and data validation 有权
    懒惰文件和数据验证

    公开(公告)号:US20050138135A1

    公开(公告)日:2005-06-23

    申请号:US10727885

    申请日:2003-12-04

    CPC classification number: H04L67/06 H04L67/04 H04L67/2819 H04L67/289

    Abstract: Client-side scripts are repackaged on the server side to be sent to the client with the corresponding data element. They are packaged to appear no earlier than the program location of a first corresponding data element. The document is rendered as it arrives at the client. In parallel, execution of the scripts to validate corresponding data elements occurs no sooner than rendering of the data elements. Validation of the document is delayed until the document download (and validation) has been performed.

    Abstract translation: 客户端脚本在服务器端重新打包,并发送给具有相应数据元素的客户端。 它们被打包成不早于第一对应数据元素的程序位置出现。 该文档在到达客户端时呈现。 并行地,执行脚本来验证相应的数据元素,而不是渲染数据元素。 文档的验证将被延迟,直到执行文档下载(和验证)为止。

    System and method for downloading a document from a server computer to a client computer
    5.
    发明授权
    System and method for downloading a document from a server computer to a client computer 有权
    将文档从服务器计算机下载到客户端计算机的系统和方法

    公开(公告)号:US07451191B2

    公开(公告)日:2008-11-11

    申请号:US10727885

    申请日:2003-12-04

    CPC classification number: H04L67/06 H04L67/04 H04L67/2819 H04L67/289

    Abstract: A system and method downloads a document from a server computer to a client computer. The method and system comprises the steps of repackaging scripts in a document program at the server such that scripts are in a program location no earlier than the program location of a first corresponding data element and downloading the repackaged document program to the client. The method renders rendering the repackaged document at the client as it arrives until complete, and in parallel with the rendering step, schedules execution of the scripts by the client to validate corresponding data elements no sooner than the step of rendering. The method inputs user data for the document at the client as the step of rendering occurs.

    Abstract translation: 系统和方法将文档从服务器计算机下载到客户端计算机。 该方法和系统包括以下步骤:在服务器上重新打包文档程序中的脚本,使得脚本在不早于第一对应数据元素的程序位置的程序位置中并将重新包装的文档程序下载到客户端。 该方法使得重新打包的文档在客户端到达时直到完成,并且与呈现步骤并行,由客户端执行脚本来执行相应的数据元素,以便不迟于渲染步骤。 随着渲染步骤的发生,该方法在客户端输入文档的用户数据。

    Method and apparatus for security-aware elasticity of application and services
    6.
    发明授权
    Method and apparatus for security-aware elasticity of application and services 有权
    应用和服务的安全感知弹性的方法和装置

    公开(公告)号:US08793766B2

    公开(公告)日:2014-07-29

    申请号:US13419037

    申请日:2012-03-13

    CPC classification number: G06F21/604 G06F2209/5019

    Abstract: In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.

    Abstract translation: 在用于扩展/降低应用程序的安全性(非功能))组件的方法中,确定(a)每个非安全(功能)组件具有的多个交互的安全组件的交互类型和每种类型的交互的数量, 要求。 根据(a)和对应用程序的传入请求的预期数量确定(b)与涉及非安全组件的安全组件的请求类型和与其相互作用,以及(c)与 涉及非安全组件的安全组件,用于针对涉及非安全组件的安全组件的每种请求类型。 为每个安全组件确定涉及非安全组件的每种类型的请求所需的容量以及涉及非安全组件的每种类型的交互所需的容量。 将安全组件的能力改变为新能力,其中新能力基于(a),(c)和确定的能力。

    Method for monitoring data resources of a data processing network
    7.
    发明授权
    Method for monitoring data resources of a data processing network 有权
    监控数据处理网络数据资源的方法

    公开(公告)号:US07454496B2

    公开(公告)日:2008-11-18

    申请号:US10732736

    申请日:2003-12-10

    Applicant: Ashish Kundu

    Inventor: Ashish Kundu

    Abstract: A method monitors data resources of a data processing network on behalf of a new consumer. The method comprises determining monitoring requirements of the new consumer. The monitoring requirements include: a list of data resources monitored for the new consumer; metrics of the monitoring data for the new consumer; a data format for monitoring data provided to the new consumer; a time interval between periods of sending the monitoring data to the new consumer; and actions taken during failure of the data resource. The method also includes comparing the monitoring requirements of the new consumer with monitoring capabilities of a plurality of monitoring entities to identify at least one monitoring entity, including monitoring capabilities matching the monitoring requirements of the new consumer.

    Abstract translation: 一种方法代表新消费者监视数据处理网络的数据资源。 该方法包括确定新消费者的监控要求。 监测要求包括:监测新消费者的数据资源清单; 新消费者监控数据的指标; 用于监视提供给新消费者的数据的数据格式; 将监控数据发送给新消费者的时间间隔; 以及在数据资源故障期间采取的行动。 该方法还包括将新消费者的监测要求与多个监测实体的监测能力进行比较,以识别至少一个监测实体,包括与新消费者的监测要求相匹配的监测能力。

    Systems, methods and computer programs for monitoring distributed resources in a data processing environment
    8.
    发明申请
    Systems, methods and computer programs for monitoring distributed resources in a data processing environment 有权
    用于在数据处理环境中监视分布式资源的系统,方法和计算机程序

    公开(公告)号:US20050132041A1

    公开(公告)日:2005-06-16

    申请号:US10732736

    申请日:2003-12-10

    Applicant: Ashish Kundu

    Inventor: Ashish Kundu

    Abstract: Methods, apparatus and computer programs for monitoring resources within a data processing network. Monitoring entities can be selected, and a set of active monitoring functions can be modified, based on the requirements of consumers of monitored data. A first method involves monitoring resources on behalf of consumer entities within the network. A description of the consumer entity's monitoring requirements are published by the consumer entity and stored in a repository. The monitoring requirements of the consumer entity are compared with the monitoring capabilities of a plurality of monitoring entities, to identify a monitoring entity capable of satisfying the monitoring requirements of the consumer entity. An identified monitoring entity is selected, and a connection is established between the selected monitoring entity and the consumer entity. A second method involves modifying an active set of monitoring functions in response to changes to monitoring requirements of a currently active set of consumer entities.

    Abstract translation: 用于监视数据处理网络内的资源的方法,装置和计算机程序。 可以选择监控实体,并且可以根据监控数据的消费者的要求修改一组主动监控功能。 第一种方法涉及监视代表网络内的消费者实体的资源。 消费者实体的监控要求的描述由消费者实体发布并存储在存储库中。 将消费者实体的监测要求与多个监测实体的监测能力进行比较,以识别能够满足消费者实体的监测要求的监测实体。 选择已识别的监控实体,并且在所选择的监控实体和消费者实体之间建立连接。 第二种方法涉及响应于当前活动的消费者实体集合的监视要求的变化来修改活动的监视功能集合。

    Integrated metering of service usage for hybrid clouds
    9.
    发明授权
    Integrated metering of service usage for hybrid clouds 有权
    混合云服务使用的综合计量

    公开(公告)号:US09336061B2

    公开(公告)日:2016-05-10

    申请号:US13350752

    申请日:2012-01-14

    Abstract: An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider.

    Abstract translation: 一个实施例涉及一种混合云环境,其中云计算服务的用户被设置为消耗由多个云计算服务提供商中的每一个提供的云提供的服务。 在MCS组件处接收指定的事件数据,其中事件数据涉及与由一个或多个云服务提供商提供的消费服务相关的计量事件。 事件数据包括由一个或多个实体提供的事件数据,其主动地监视在一个或多个本地或远程云服务提供商位置处的计量事件。 事件数据从MCS组件发送到计量系统,并且计量系统从包含由一个或多个云服务提供商提供的服务的使用信息的事件数据生成报告,其中供应商的信息指定每种类型的数量和质量 的服务提供给用户。

    METHOD AND APPARATUS FOR SECURITY-AWARE ELASTICITY OF APPLICATION AND SERVICES
    10.
    发明申请
    METHOD AND APPARATUS FOR SECURITY-AWARE ELASTICITY OF APPLICATION AND SERVICES 有权
    用于安全性应用和服务弹性的方法和装置

    公开(公告)号:US20130247135A1

    公开(公告)日:2013-09-19

    申请号:US13419037

    申请日:2012-03-13

    CPC classification number: G06F21/604 G06F2209/5019

    Abstract: In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.

    Abstract translation: 在用于扩展/降低应用程序的安全性(非功能))组件的方法中,确定(a)每个非安全(功能)组件具有的多个交互的安全组件的交互类型和每种类型的交互的数量, 要求。 根据(a)和对应用程序的传入请求的预期数量确定(b)与涉及非安全组件的安全组件的请求类型和与其相互作用,以及(c)与 涉及非安全组件的安全组件,用于针对涉及非安全组件的安全组件的每种请求类型。 为每个安全组件确定涉及非安全组件的每种类型的请求所需的容量以及涉及非安全组件的每种类型的交互所需的容量。 将安全组件的能力改变为新能力,其中新能力基于(a),(c)和确定的能力。

Patent Agency Ranking