-
公开(公告)号:US10691474B2
公开(公告)日:2020-06-23
申请号:US15396948
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US11632397B2
公开(公告)日:2023-04-18
申请号:US16514607
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US11422791B2
公开(公告)日:2022-08-23
申请号:US17139533
申请日:2020-12-31
Applicant: International Business Machines Corporation
Inventor: Yingchun Guo , Jing Jing Wei , Yue Wang , Shao Jun Ding , Jian Nan Guo
Abstract: Approaches presented herein enable hot upgrading a microservices sequence in a cloud computing environment. More specifically, a next microservice of microservice subsequence in a running sequence is obtained, in response to a message to invoke the microservice or subsequence. The running microservice sequence includes at least one unexecuted microservice or subsequence that is to be hot upgraded. The running microservice sequence is generated based on a sequence that is to be hot upgraded which comprises an ordered list of microservices and/or subsequences. The approach may include determining the status of a next microservice or subsequence. The approach may further include invoking the next microservice or subsequence in the running sequence, in response to the status of the next microservice or subsequence being upgrade-complete.
-
公开(公告)号:US20190356698A1
公开(公告)日:2019-11-21
申请号:US16514607
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US20180188914A1
公开(公告)日:2018-07-05
申请号:US15396948
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
IPC: G06F3/0484 , G06F17/24 , G06F17/22
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US11621978B2
公开(公告)日:2023-04-04
申请号:US15850215
申请日:2017-12-21
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US20230095620A1
公开(公告)日:2023-03-30
申请号:US17490196
申请日:2021-09-30
Applicant: International Business Machines Corporation
Inventor: Yue Wang , Jing Jing Wei , YINGCHUN GUO , Shao Jun Ding , Jian Nan Guo
Abstract: Embodiments of the present disclosure relate to rollback of services with a global variable change. Embodiment techniques detect that at least two of a plurality of services in a transaction are executed to change a value of a first global variable. Tracing information is obtained to indicate a first order in which the at least two services change the value of the first global variable during execution of the plurality of services. In response to a failure of the transaction, a rollback execution plan for a plurality of compensating services is determined at least based on the tracing information, where the plurality of compensating services are configured to compensate for the plurality of services respectively. The plurality of compensating services subsequently executed according to the rollback execution plan.
-
公开(公告)号:US11029981B2
公开(公告)日:2021-06-08
申请号:US16849184
申请日:2020-04-15
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
IPC: G06F40/143 , G06F9/451 , G06F8/38 , G06F40/14
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US10949271B2
公开(公告)日:2021-03-16
申请号:US15465785
申请日:2017-03-22
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Xin Peng Liu , Ting Yin , Wu Mi Zhong
Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.
-
公开(公告)号:US11775398B2
公开(公告)日:2023-10-03
申请号:US17490196
申请日:2021-09-30
Applicant: International Business Machines Corporation
Inventor: Yue Wang , Jing Jing Wei , Yingchun Guo , Shao Jun Ding , Jian Nan Guo
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F2201/87
Abstract: Embodiments of the present disclosure relate to rollback of services with a global variable change. Embodiment techniques detect that at least two of a plurality of services in a transaction are executed to change a value of a first global variable. Tracing information is obtained to indicate a first order in which the at least two services change the value of the first global variable during execution of the plurality of services. In response to a failure of the transaction, a rollback execution plan for a plurality of compensating services is determined at least based on the tracing information, where the plurality of compensating services are configured to compensate for the plurality of services respectively. The plurality of compensating services subsequently executed according to the rollback execution plan.
-
-
-
-
-
-
-
-
-