Abstract:
The invention provides a Graphical User Interface (GUI) interface for building programs from web services. The interface to a web service is represented in a user menu preferably by an icon and text. A user drags and drops an icon representing a web service from the menu to a display area and interconnects the icon to other icons representing other program entities (preferably other web services). Preferably, a more detailed icon is created in the display area after the drag and drop. The completed set of interconnected icons in the display area are saved as a new program entity. The invention further includes visualization of the flow of information through the model in a test mode.
Abstract:
A system and method of performing cooperative non-repudiated message exchange from a first system to a second system in a computer network comprises checking for discrepancies between a current system time in the second system with an actual time; performing a time synchronization process to match the current system time with the actual time; exchanging public encryption keys between the first and second systems; sending a digitally signed message from the first system to the second system; decoding the digitally signed message; sending a digitally signed acknowledgment message from the second system to the first system; decoding the digitally signed acknowledgment message; and committing text of the digitally signed message to an official transcript on the first system.
Abstract:
A data storage library features multipurpose slots each configured to receive a media drive (operable to read/write data from/to media removably loaded into the media drive) a command relay port (operable to convey media transport signals from a host to a shared robotic media transport device), or various other modules. The robotic device is programmed to recognize whether each slot is empty or whether it is filled with a component such as a media drive or a command relay port, and to thereafter communicate with the occupant appropriately.
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication an d authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may furth er include a server for maintaining a list of clients connected to the peer-to- peer network in order to more efficiently facilitate peer-to-peer communications.
Abstract:
A system and method of performing cooperative non-repudiated message exchange from a first system to a second system in a computer network comprises checking for discrepancies between a current system time in the second system with an actual time; performing a time synchronization process to match the current system time with the actual time; exchanging public encryption keys between the first and second systems; sending a digitally signed message from the first system to the second system; decoding the digitally signed message; sending a digitally signed acknowledgment message from the second system to the first system; decoding the digitally signed acknowledgment message; and committing text of the digitally signed message to an official transcript on the first system.
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication and authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may further include a server for maintaining a list of clients connected to the peer-to-peer network in order to more efficiently facilitate peer-to-peer communications.
Abstract:
Addressing failure is handled in a nodal system of processor nodes, which comprise at least one processor and at least one interface to a network. Upon detection of a node address failure of a processor node for the network, such as lack of a node address, or presence of a duplicate address, the processor node is disabled from the network, thereby temporarily failing the processor node so that the system remains operational. An alternate node address stored in nonvolatile memory may be selected that avoids the node address failure.