Composite locking of objects in a database

    公开(公告)号:GB2342198B

    公开(公告)日:2003-10-22

    申请号:GB9821370

    申请日:1998-10-02

    Applicant: IBM

    Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.

    Composite locking of objects in a database

    公开(公告)号:GB2342198A

    公开(公告)日:2000-04-05

    申请号:GB9821370

    申请日:1998-10-02

    Applicant: IBM

    Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.

    Developing and testing of a telephony application by simulation of telephony hardware

    公开(公告)号:GB2334602A

    公开(公告)日:1999-08-25

    申请号:GB9803796

    申请日:1998-02-24

    Applicant: IBM

    Abstract: A system for developing and testing a telephony application on an interactive voice system without using associated telephony hardware. The telephony application normally sends and receives hardware signals to and from the system telephony hardware for communication with a telephone. In this invention a telephony emulator 26C intercepts the hardware signals from the voice application 20 and sends hack simulated hardware signals to the voice application. A graphical user interface 30 provides the user output in response to the telephony emulator means and accepts and passes on user input to the emulator.

Patent Agency Ranking