Abstract:
Managing a service (408) is disclosed. A computer system (404) collects (700) information (424, 432) about use (426, 434) of a set of resources (410) by the service (408). Responsive to receiving (702) a request (446) to verify information (424, 432) about the use (426, 434) of the set of resources (410) by the service (408), the computer system (404) generates (704) a description (444) of the use (426, 434) of the set of resources (410) by the service (408) using the information (424, 432) collected. The computer system (404) then creates (706) a response (450) to the request (446) using the generated description (444) of the use (426, 434) of the set of resources (410) by the service (408) as proof of the validity of the information (424, 432).
Abstract:
A computer implemented method, data processing system, and computer usable program code are provided for instantiating a service on a network (100). A service infrastructure manager (524, 702) determines whether a service (718a, 718b, 718c) is available at a requested quality of service in response to receiving (802) a request for the service that specifies the quality of service. The service infrastructure manager (524, 702) performs (804) an analysis of components associated with the service (718a, 718b, 718c) to identify resources (716a, 716b, 716c) needed to create the service in response to the service (718a, 718b, 718c) being unavailable at the requested quality of service. Based on the analysis, the service infrastructure manager (524, 702) allocates resources (716a, 716b, 716c) to support the service (718a, 718b, 718c) and instantiates the service (718a, 718b, 718c) at the requested quality of service after the resources (716a, 716b, 716c) have been allocated.
Abstract:
A computer implemented method, apparatus, and computer usable program code for creating a composite service. Dependencies (500) are identified (802, 906) utilizing a set of active objects (406) used to manage services to form identified dependencies (500) in response to receiving a request (302) for the composite service. The identified dependencies (500) specify requirements of the composite service. The composite service has multiple components. Components are identified (906, 908) for the composite service using the identified dependencies (500) to form identified components. The composite service is created (910, 912) using the identified components.
Abstract:
A computer implemented method, data processing system, computer usable program code, and active repository are provided for management of a software service. A request (302) is received (702) to deploy the software service in a computer network (100). A dependency analysis is performed (704) for the requested software service to determine component software services and physical resources necessary to deploy and manage new software service as a composite in responsive to the software service being the new software service. An active object (406) is created (706) to manage the new software service using an active template (404) based on the analysis. The new software service is deployed (708) in the computer network (100) using the active object (406). The new software service is managed (710) using the active object (406).
Abstract:
A method, computer program product, and network data processing system (100) for identifying, locating, and deleting viruses is provided. In one embodiment, the network data processing system (100) includes a local server (104), several client data processing systems (108-112), and a bait server (150). The address of the bait server (150) is not published to the clients (108-112). Thus, any attempt to access the bait server (150) would indicate the presence of a virus on the client attempting access. The bait server (150) monitors itself (408) and, responsive to an attempt from a client to access the bait server (150), broadcasts an indication that a virus attack is underway to all devices within the network. The bait server (150) then ignores all further access requests by the offending client until it receives an indication that the offending client has been disinfected and directs the local server (104) to disconnects the offending client(s) from the network (412). The bait server (150) also notifies the local server and/or a network administrator of the problem and the identity of the offending client allowing appropriate action to be initiated to disinfect the offending client (410).
Abstract:
A system and method wherein a mobile user or a user interacting with a mobile program, can at any time initiate a program status request. The program status request initiates the sequence of events whereby the current location of the program is determined and/or the current user location is made available to the program without the necessity of either entity changing location. Further, the agent script for the program maintains a composite data structure which includes an input buffer for storing input variables, an output buffer for storing output values to be displayed to the user, a program state data structure, and an optional bag buffer for temporarily storing input variables which the program will need in the course of future execution. By maintaining such a composite data structure, it is assured that all necessary information can be provided at a program location regardless of whether the program or the user has relocated.
Abstract:
Each unit (502,504,508,510,512) in network (506) has wireless transmitter and wireless receiver. Data element is identified with identifier unique to communication between transmitting unit and other units. Multiaddressing of identified data element in wireless network for reception by units located inside radio range assigned to transmit unit, occurs without transmitting unit having knowledge of presence of other units. Process to make ready communication between applications between transmitting unit and one or more other units (502,504,508,510,512) in wireless network (506). each unit has wireless transmitter and wireless receiver. Identifier is created using current data and time, current clocking sequence, increased pointer value and unit identifier. Independent claims are included for device to prepare communication and manufacturing article to use in transmitter to prepare communication.
Abstract:
In a method for scaling up/down security (non-functional) components of an application, determine ( a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
Abstract:
A computer implemented method, apparatus, and computer usable program code for creating a composite service. Dependencies are identified utilizing a set of active objects used to manage services to form identified dependencies in response to receiving a request for the composite service. The identified dependencies specify requirements of the composite service. The composite service has multiple components. Components are identified for the composite service using the identified dependencies to form identified components. The composite service is created using the identified components.
Abstract:
A method for providing inter-application communication between a sending device and one or more receiving devices in a wireless network comprises the steps of: (i) at the sending device, tagging a data item with an identifier unique to an intended communication between the sending device and the one or more receiving devices; (ii) at the sending device, broadcasting the tagged data item in the wireless network; (iii) at a receiving device, receiving the broadcast data item when the receiving device is within a radio-range of the sending device; and (iv) at a receiving device, accepting the data item for processing when the identifier substantially matches an identifier expected by an application associated with the receiving device; wherein the sending device and the receiving device need not be aware of each other's presence.