摘要:
A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.
摘要:
To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.
摘要:
A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.
摘要:
A method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.
摘要:
Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.
摘要:
A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.
摘要:
Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.
摘要:
For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.
摘要:
Embodiments of the present invention provide a method, system and computer program product for context sensitive cloning of a business object graph. In an embodiment of the invention, a method for context sensitive cloning of a business object graph is provided. The method includes selecting a business object of an application executing in memory of a computer for cloning and ascertaining a contemporaneous state of the selected business object. The method also includes applying a cloning rule to the state of the selected business object to determine a business object graph from amongst a set of pre-determined business object graphs to be used when cloning the selected business object. Finally, the method includes cloning the determined business object graph in the memory of the computer.
摘要:
Embodiments of the present invention provide a method, system and computer program product for context sensitive cloning of a business object graph. In an embodiment of the invention, a method for context sensitive cloning of a business object graph is provided. The method includes selecting a business object of an application executing in memory of a computer for cloning and ascertaining a contemporaneous state of the selected business object. The method also includes applying a cloning rule to the state of the selected business object to determine a business object graph from amongst a set of pre-determined business object graphs to be used when cloning the selected business object. Finally, the method includes cloning the determined business object graph in the memory of the computer.