REMOTE PRODUCT INVOCATION FRAMEWORK
    1.
    发明申请

    公开(公告)号:US20190065294A1

    公开(公告)日:2019-02-28

    申请号:US16170987

    申请日:2018-10-25

    IPC分类号: G06F9/54 G06F8/71 G06F9/50

    摘要: A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.

    Application-centric analysis of leak suspect operations

    公开(公告)号:US09678854B2

    公开(公告)日:2017-06-13

    申请号:US14713083

    申请日:2015-05-15

    IPC分类号: G06F11/00 G06F11/36

    摘要: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.

    REMOTE PRODUCT INVOCATION FRAMEWORK
    3.
    发明申请
    REMOTE PRODUCT INVOCATION FRAMEWORK 审中-公开
    远程产品协调框架

    公开(公告)号:US20170024265A1

    公开(公告)日:2017-01-26

    申请号:US15284308

    申请日:2016-10-03

    IPC分类号: G06F9/54 G06F9/44

    摘要: A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.

    摘要翻译: 用于远程产品调用的方法包括配置包括集成模块和端点/处理器模块的调用框架。 一旦配置,集成模块被配置为:接收源对象; 从所述源对象格式化数据用于期望的操作; 并且利用所述端点/处理程序模块来使用来自所述源对象的所述数据与执行所述期望操作的外部服务建立连接。 用于外部服务的远程调用的系统包括:生成包含用于执行远程操作的数据的源对象的调用实体; 以及被配置为接收源对象,解释源对象并将数据传递到打开与外部服务的连接并执行远程操作的端点/处理程序的集成模块。

    Cost optimized email attachment download in a mobile device
    4.
    发明授权
    Cost optimized email attachment download in a mobile device 有权
    成本优化的电子邮件附件下载在移动设备

    公开(公告)号:US09386092B1

    公开(公告)日:2016-07-05

    申请号:US14993688

    申请日:2016-01-12

    IPC分类号: G06F15/16 H04L29/08 H04W12/06

    摘要: A method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.

    摘要翻译: 一种减少无线订阅计划数据使用的方法。 将电子邮件和附件下载到第一收件人的第一设备。 附件由附件处理服务在电子邮件中标识,确保从第一设备的共享基于信用策略。 确定电子邮件和附件有多个收件人。 确定第二接收者的第二设备在第一设备附近。 基于从电子邮件的内容的哈希,附件的标识符和第二接收者的电子邮件ID计算的第二接收者的电子邮件的指纹,使用电子邮件指纹交换握手建立第二设备的验证 。 利用第二网络将附件从第一设备复制到第二设备。

    NON-INTRUSIVE, SEMANTICS-DRIVEN IMPACT ANALYSIS FOR BUSINESS APPLICATIONS
    5.
    发明申请
    NON-INTRUSIVE, SEMANTICS-DRIVEN IMPACT ANALYSIS FOR BUSINESS APPLICATIONS 有权
    针对业务应用的非侵入性,语义驱动型影响分析

    公开(公告)号:US20150269504A1

    公开(公告)日:2015-09-24

    申请号:US14494949

    申请日:2014-09-24

    IPC分类号: G06Q10/06

    CPC分类号: G06F17/30958 G06Q10/0635

    摘要: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.

    摘要翻译: 业务应用程序的影响分析可以包括接收业务应用系统的事件,其中事件指定对业务应用系统的工件的改变,以及确定事件应用于作为源节点的有向图的节点。 有向图表示业务应用系统。 有向图由通过链接连接的多个节点形成,其中每个节点表示业务应用系统的工件,并且每个链接指定指示由链接连接的节点之间的依赖关系的语义数据。 影响分析还包括通过第一链接确定使用处理器对连接到源节点的第一节点的工件评估数据,其中所述工件评估数据包括所述事件对所述第一节点的影响类型,以及所述第一节点的上下文 影响。

    Remote product invocation framework

    公开(公告)号:US11625290B2

    公开(公告)日:2023-04-11

    申请号:US16170987

    申请日:2018-10-25

    IPC分类号: G06F9/54 G06F9/50 G06F8/71

    摘要: A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation.

    Non-intrusive, semantics-driven impact analysis for business applications

    公开(公告)号:US09922136B2

    公开(公告)日:2018-03-20

    申请号:US14219205

    申请日:2014-03-19

    IPC分类号: G06F17/30 G06Q10/06

    CPC分类号: G06F17/30958 G06Q10/0635

    摘要: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.

    Intelligent cloning of a business object graph

    公开(公告)号:US09256851B2

    公开(公告)日:2016-02-09

    申请号:US14058268

    申请日:2013-10-20

    IPC分类号: G06Q10/06

    CPC分类号: G06Q10/067

    摘要: Embodiments of the present invention provide a method, system and computer program product for context sensitive cloning of a business object graph. In an embodiment of the invention, a method for context sensitive cloning of a business object graph is provided. The method includes selecting a business object of an application executing in memory of a computer for cloning and ascertaining a contemporaneous state of the selected business object. The method also includes applying a cloning rule to the state of the selected business object to determine a business object graph from amongst a set of pre-determined business object graphs to be used when cloning the selected business object. Finally, the method includes cloning the determined business object graph in the memory of the computer.

    INTELLIGENT CLONING OF A BUSINESS OBJECT GRAPH

    公开(公告)号:US20140188800A1

    公开(公告)日:2014-07-03

    申请号:US14058268

    申请日:2013-10-20

    IPC分类号: G06F17/30

    CPC分类号: G06Q10/067

    摘要: Embodiments of the present invention provide a method, system and computer program product for context sensitive cloning of a business object graph. In an embodiment of the invention, a method for context sensitive cloning of a business object graph is provided. The method includes selecting a business object of an application executing in memory of a computer for cloning and ascertaining a contemporaneous state of the selected business object. The method also includes applying a cloning rule to the state of the selected business object to determine a business object graph from amongst a set of pre-determined business object graphs to be used when cloning the selected business object. Finally, the method includes cloning the determined business object graph in the memory of the computer.