Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Object oriented message

Subclass of:

719 - Electrical computers and digital processing systems: interprogram communication or interprocess communication (ipc)

719313000 - INTERPROGRAM COMMUNICATION USING MESSAGE

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
719316000 Managed object system 73
Entries
DocumentTitleDate
20090064185High-Performance XML Processing in a Common Event Infrastructure - Delegation of processing functions to specialized appliances in an enterprise is provided. An appliance typically comprises a combination of hardware and resident firmware that addresses needs in a computing environment, such as by providing common message transformation, integration, security, filtering and other functions. Delegation is carried out by specifying at least one XML function for front-process offloading from a server to a corresponding appliance configured to receive messages pushed towards the server, communicating management directives to the appliance for configuring the appliance to perform the specified XML function(s) according to specific requirements dynamically specified by the server and communicating instructions to the appliance so that the appliance augments received event messages with intermediate processing information based upon the front-process offloading, as received event messages pass through the appliance.03-05-2009
20090193432SERVICE-ORIENTED ARCHITECTURE COMPONENT PROCESSING MODEL - A service-oriented architecture can include a service provider comprising a plurality of service objects, each service object comprising a self-describing, self-contained, platform independent, modular unit of application logic. The service oriented architecture further includes a service object among the plurality of service objects that is a service implementation having a pre-ordained message processing system. The service implementation can respond to client requests at different levels of granularity and can use a common transfer object message format that separates a business object into its constituent parts. The common set of operations can include at least the Read, Create, Update, Delete, and Execute functions.07-30-2009
20090193434ISOLATION OF USER-INTERACTIVE COMPONENTS - The isolation of user-interactive components form the logical components of an exemplary computing application environment is provided. In an illustrative implementation, an exemplary computing application environment comprises one or more user interface (UI) elements that run on an exemplary user-interface processing thread and application logic that illustratively operatively runs asynchronously on at least one other processing thread. In an illustrative implementation an isolation boundary is provided between an exemplary user interface and the application logic of the exemplary computing application environment. In the illustrative implementation, the isolation boundary can comprise an asynchronous view contract comprising a channel between an exemplary view layer of an exemplary user interface (e.g., one or more user-interactive components) and application logic.07-30-2009
20090193433INTEGRATING OPERATIONAL AND BUSINESS SUPPORT SYSTEMS WITH A SERVICE DELIVERY PLATFORM - A service-oriented approach provides for an integration of components that would otherwise be considered different and unrelated components, such as runtime, business support systems (BSS), operational support systems (OSS), and third party components. Such integration allows messages to be transformed and passed between components as necessary to perform a particular task. For example, a BPEL workflow can be initiated upon receiving a user request through a network and gateway layer which will direct provisioning, activation, and processing via these various components. Identities can be managed across these various layers to provide for seamless end-to-end integration.07-30-2009
20100083280MOBILE CLIENT APPLICATION FOR MANAGING DISPLAY OF MESSAGES TO USERS - A mobile phone messaging system and method for managing display of messages to mobile phone users. A mobile client application operates at user's mobile phone. Mobile content providers manage the display of messages and related interactions throughout a specific period of time (e.g., daily, weekly, bi-weekly). Phone wakeup time data and message identifying data are transmitted from a mobile content provider server to a mobile phone. The wakeup time data and message identifying data are stored in the phone. The wakeup times are also added to a registry at the phone that facilitates launching of applications at the times indicated in the registry. At the specified wakeup times, the mobile client application determines the message identifying data associated with the wakeup time, connects to the mobile content provider server, and provides the message identifying data. The provider responds with a specific message and the mobile client application displays the message.04-01-2010
20120180074CONSERVING MEMORY BY USING OBJECTS THAT ARE SELECTABLY MUTABLE DURING RUNTIME - Techniques are disclosed for providing support for objects that are selectably mutable during runtime. In one embodiment, an application programming interface (API) is provided that includes procedures for sealing and unsealing an object during runtime. Applications may use the API to prevent the object from being inadvertently modified, without having to create defensive copies of the object. Accordingly, processing and/or memory costs associated with executing the application may be reduced.07-12-2012
20080256555DEVELOPING CONTROLS FOR OUTLOOK ADD-INS - The forms hosting system allows a developer to design custom Outlook form regions containing standard and custom managed controls using popular development tools. The forms hosting system provides a runtime wrapper that appears to Outlook as a normal ActiveX control. When Outlook invokes the runtime wrapper control, the runtime wrapper control loads the managed controls defined by the developer. The runtime wrapper control translates messages received from Outlook into messages understood by the managed controls.10-16-2008
20100043014MEDIA DATA USAGE MEASUREMENT AND REPORTING SYSTEMS AND METHODS - An audience measurement system for gathering data reflecting usage of media data by a user by means of a user system. The user system preprocesses the gathered data into micro-level report objects.02-18-2010
20100043013METHOD AND SYSTEM FOR INVOLKING AND OPERATING A REMOTE APPLICATION WITHIN A DIFFERENT SYSTEM/APPLICATION IN MEDICAL IMAGING - A method and system for process/data sharing. A trigger response unit, corresponding to a first application residing in a first system, is deployed in a second system. The trigger response unit detects information embedded in trigger data, representing the first application with associated data, when the trigger data is activated in a second system. Based on the information detected, a launching request is generated and sent to the first system to launch an instance of the first application in the first system with respect to the associated data. The second system receives, via a remote access protocol, a dynamic graphical representation of the first application launched in the first system based on the launching request. The associated data is manipulated in the second system using the first application launched in the first system via the dynamic graphical representation of the first application displayed in the second system.02-18-2010
20100064296GENERATING INFORMATION ON APPLICATION TASKS FOR COMPONENT OBJECTS GROUPED IN A COMPOSITE OBJECT - Provided are a method, system, and article of manufacture for generating information on application tasks for component objects grouped in a composite object. A composite object in a computer readable medium is comprised of component objects, wherein different application tasks are used to process the component objects. Metadata associates the application tasks for the component objects grouped in the composite object with the composite object. An operation is performed on the composite object by processing the metadata indicating the application tasks for the component objects grouped in the composite object on which the operation is performed.03-11-2010
20090025012MASTER DATA COMPLETION FOR INCOMING XML-MESSAGES - A method and system for collaboration in an inventory supply network. Received messages prompt a call to an independent master data competition module. Missing data is resolved independently from the calling service class. The resolve message is then passed to a business object layer to process the message.01-22-2009
20090235279PROCESSING APPARATUS AND METHOD - A processing apparatus for processing elements, which are contained in a message received via a network, by an application is provided. The apparatus includes a selection unit configured to select, in accordance with the number of elements contained in the received message, whether conversion of an element to a form processable by the application is carried out in response to or prior to a request from the application, a storage unit configured to store an element, which is converted to a form processable by the application, in response to a request from the application, a read-out unit configured to read an element, which has been requested by the application, out of the storage unit, and a conversion unit configured to convert an element to a form processable by the application in response to and prior to a request from the application in accordance with the selection.09-17-2009
20090013331TOKEN PROTOCOL - The invention provides a method of transmitting tokens over a link between processors, the link comprising a one-line and a zero-line wherein a logical transition on the one-line indicates a logic-one and a logical transition on the zero-line indicates a logic zero. The method comprises: transmitting a first portion of a token; and transmitting a second portion of the token to ensure the total number of logic-one bits in the token is even and the total number of logic-zero bits in the token is zero, such that the link returns to a quiescent state at the end of the token.01-08-2009
20080295113MANAGING MEMORY RESIDENT OBJECTS TO OPTIMIZE A RUNTIME ENVIRONMENT11-27-2008
20100211961DATA BUS BETWEEN MIDDLEWARE LAYERS - A system/method is introduced that integrates middleware components without canonicalization of data at runtime, where the system/method receives inputs identifying at least a first and second middleware to be made interoperative (via a communication path between an in-port corresponding to the first middleware and an out-port corresponding to the second middleware), receives an incoming message at the in-port, handles the received message as a plurality of parts and where, for each part, a data-object is created based on an identified type factory, with the in-port populating the data-object with values from corresponding part of the message and passing the populated data object from the in-port corresponding to the first middleware to the out-port corresponding to the second middleware.08-19-2010
20110185368System and Method for Routing Information - In one example, a process manager is configured to receive events created by elements from other parts of enterprise software and to route the events to listeners within the enterprise software, and an evaluator is queried by the process manager and configured to determine the relationships between the event and the listeners in the enterprise software. In some embodiments, new listeners are added to the enterprise software without a significant change to the process manager.07-28-2011
20110296438CREATING AN OBJECT IN AN OBJECT-ORIENTED PROGRAMMING PLATFORM - An application programming interface is provided in an object-oriented programming platform for developing applications. A method comprises, in response to a first message received at a first object that contains one or more properties, creating a second object that responds to a second message sent thereto responsive to sending of the first message to the first object and returning the second object. By returning, for example, key-value collection proxies by specific key-value coding methods a read-only or a read-write access may be allowed to a collection of a container object's related objects. A specific implementation of one object's class may change over time without requiring changes in another object's implementation.12-01-2011
20110231861CANCELLATION OF CONCURRENT WORKER OBJECTS - A method of performing a cancellation of concurrent worker objects includes creating a plurality of concurrent worker objects with a manager object. At least one cancellation object is generated with the manager object. The at least one cancellation object includes a cancel method and a register method that support concurrent calls. A callback function is registered by calling the register method with one of the concurrent worker objects. A cancellation of the concurrent worker objects is requested by calling the cancel method with the manager object.09-22-2011
20090249360INTEGRATING ENTERPRISE SUPPORT SYSTEMS - Facilitating the exchange of information among applications (e.g., business support systems or operational support systems or a combination thereof) may involve receiving a data object from a first application, using a first controller to route the received data object to a first transformer, using the first transformer to transform the data object from a first format used by the first application into a common format object, publishing the common format object to a communication channel, receiving a request from a subscribing application to subscribe to the communication channel, using a second controller to route the common format object to a second transformer, using the second transformer to transform the common format object into a data object in a second format used by the subscribing application, and sending the data object in the second format to the subscribing application.10-01-2009
20090064186MOBILE DEVICE WITH TWO OPERATING SYSTEMS AND METHOD FOR SHARING HARDWARE DEVICE BETWEEN TWO OPERATING SYSTEMS THEREOF - A mobile device and a method for sharing a hardware device thereof are provided. Two operation systems are executed on the present mobile device simultaneously, and an embedded controller is configured to communicate among the two operation systems and a shared hardware device of the mobile device. When one of the operation systems encodes an operating command into a uniform message and transmits the uniform message to the embedded controller, the uniform message is decoded into the operating command by the embedded controller such that the hardware device operates according to the decoded operating command. On the other hand, when the embedded controller receives input data from the hardware device, the embedded controller encodes the input data into the uniform message and transmits the uniform message to one of the operation systems. The operation system receiving the uniform message decodes the uniform message into the input data.03-05-2009
20120110596Method for Giving Message Prompt When Mobile Terminal Accesses Mobile Internet Website and Mobile Terminal - A method for giving a message prompt when a mobile terminal accesses a mobile Internet website and the mobile terminal are disclosed in the present disclosure. The method comprises the following steps of: A. receiving a message of browsing a mobile Internet webpage from a user, and triggering a corresponding message prompt event as needed; and B. parsing the message prompt event to obtain a corresponding prompt message, and displaying the prompt message. Because the present disclosure provides a new function of giving a corresponding message prompt when the mobile terminal accesses a mobile Internet website (e.g., prompting the user of the website traffic, the fee charging information, advertisement information, and etc.), the user can timely know conditions of his or her mobile terminal accessing the Internet, which is very convenient for the user.05-03-2012
20110197204Processing Data Communications Messages With Input/Output Control Blocks - Processing data communications messages with an Input/Output Control Block (‘IOCB’) ring that includes a number of IOCBs characterized by a priority and arranged in sequential priority for serial operation, where processing the messages includes depositing message data in one or more IOCBs according to depositing criteria; processing, by a message processing module associated with an IOCB having a priority less than the present value of a state counter, the message data in the IOCB while a message processing module associated with an IOCB having a next priority waits; increasing, upon completion of processing the message data of the IOCB having a priority less than the present value of the state counter, the present value of the state counter to a value greater than the next priority; and processing, by the message processing module associated with the IOCB having the next priority, the message data in the IOCB.08-11-2011
20080250426SYSTEMS AND METHODS FOR INTERFACING MULTIPLE TYPES OF OBJECT IDENTIFIERS AND OBJECT IDENTIFIER READERS TO MULTIPLE TYPES OF APPLICATIONS - A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application.10-09-2008
20100064297Configuring And Providing Enhanced Access To Profibus Device Diagnostic Data - A method and system are disclosed for providing enhanced user access to Profibus device diagnostic data and cyclic data in a distributed control system. After receiving input parameter data originating from a Profibus device message, the I/O module assembly performs steps for processing, maintaining and providing the input parameter data to a requesting control processor. The processing step includes extracting parameter values from a received Profibus device message. The extracted parameter values are then deposited in a repository on the I/O module assembly. The parameter values include both input and diagnostic parameter values. The diagnostic parameter values are provided to a workstation executing a Profibus device commissioning/configuring application in the form of data bits. The application generates a set of diagnostic text messages, based upon current values of diagnostic data bits representing diagnostic statuses of the Profibus device, by applying a configurable set of diagnostic message definitions to the diagnostic parameter data bits.03-11-2010
20080244615Method, Apparatus, System, Medium, and Signals for Supporting a Multiple-Party Communication on a Plurality of Computer Servers - Systems, apparatus and methods related to multiple-party communications conducted between client computers in a computer network. For example, a method and apparatus for supporting multiple-party communications in a computer network including a first server, at least a first client computer in communication with the first server, and a second server are disclosed. The method involves receiving a first input message at the first server, the first input message representing user input received at the first client computer. The method further involves producing a first output message representing the user input provided by the first input message, and transmitting the first output message to the first client computer and to the second server.10-02-2008
20100083279REMOTE OBJECT DATA PROPERTY REPLICATION METHOD AND SYSTEM - In one embodiment, a method is provided that includes designating a visual representation of an object in a display screen of a human machine interface, accessing any properties, connections, and text associated with the object in response to a trigger event, and creating an identical copy in response to the trigger event, wherein the identical copy includes any properties, connections and text associated with the object. An interface system that includes a machine readable medium having programming code implementing the method. An industrial automation device is also provided.04-01-2010
20130024874DATA DISTRIBUTION SYSTEM BASED ON THE EXCHANGE OF ASYNCHRONOUS MESSAGES - A data distribution system based on the exchange of asynchronous messages in publication/subscription mode, for the exchange of data according to various qualities of service between a transmitter running a data supplying application and one receiver running a data receiving application is disclosed, which transmitter and receiver are interconnected by a communication network, via communication objects. Communication objects provide one programming interface to exchange messages. In one aspect, a communication object is broken down into a number of components comprising a type-1 component comprising the programming interface, and at least one type-2 component adapted to control information related to the type-1 component and providing the operations responsible for functionalities reconfigurable during runtime, which communication object has a mechanism for providing runtime reconfiguration requests to the at least one type-2 component, so as to allow for the reconfiguration during runtime of a functionality associated with the communication object.01-24-2013
20080282260DYNAMIC DISPATCH FOR CLASSES AND INTERFACES - Dynamic dispatch for classes and interfaces is encapsulated in a class-less scripting language. A plurality of mechanisms are employed to facilitate dynamic polymorphism. One or more target language constructs such as dictionary objects, prototype objects and/or derived types are utilized to capture class and interface method implementations. These constructs are subsequently referenced at runtime to invoke appropriate code.11-13-2008
20080209440DISTRIBUTED MESSAGING SYSTEM SUPPORTING STATEFUL SUBSCRIPTIONS - A distributed messaging system supporting stateful subscriptions is provided. A stateful publish-subscribe system extends the functionality of the content-based approach to include more general state-valued expressions. Stateful subscriptions may refer to one or more message histories and may include more complex expressions. Therefore, subscribers may receive different information than that provided in the published messages. A plurality of broker machines is provided to deliver messages sent by publishing clients toward subscribing clients based upon the contents of the messages and stateful transformations requested by the subscribing clients. Subscription specifications are analyzed by a compiler and converted into a collection of transform objects and view objects. The messaging system builds a structure containing all transform objects and view objects needed for all intermediate and subscribed views of all subscriptions. This messaging system uses this structure to allocate transform objects and view objects to broker machines in the overlay network.08-28-2008
20080276251Method and system for page exception programming utilizing metadata - A method and system for automatically generating page exception programming based on user-defined rules is disclosed. A page specific metadata in a PDL file can be evaluated against specific rules to automatically create page exception programming. An embedded PDL device control instructions can also be evaluated and converted into page exception programming thereby producing an integrating representation of all page exception programming for a print job. The PDL page extracted as an exception page can then be displayed on a graphical user interface which provides an operator to confirm pages for editing.11-06-2008
20080216092SYSTEM AND METHOD FOR OPPORTUNISTIC IMAGE SHARING - A system for requesting data from another includes means for automatically appending a request for certain information to an outgoing message. In one embodiment, an e-mail editor provides the sender-user with an option for causing the email to include a request for missing or desired contact information, such as a picture. The appended request may be in the form of an added e-mail header, e.g. “I need your picture.” On the receiving side of the email, the incoming messages may be parsed for such requests. Any requests that are found in incoming email may be remembered by the receiving system using a dedicated data structure or some indications (e.g. flags) in an existing data structure. When email is composed on the receiving system, the “remembered” request information may be used to facilitate responses to pending requests. In this manner, email correspondents may opportunistically use their email traffic to maintain updated information regarding each other.09-04-2008
20100005478METHOD AND APPARATUS FOR DISTRIBUTED APPLICATION CONTEXT AWARE TRANSACTION PROCESSING - A method and apparatus for applying a uniform processing policy within a distributed computer network. A message is received at a termination point from an application used by a user. At the termination point tagging information is attached to the message, the tagging information indicating which processes the message should undergo, and with which parameters or configurations. The message is then processed in the distributed network according to the tagging information so that uniform processing is assured. If required, a response message is generated, and is assigned substantially the same tagging information as the original message.01-07-2010
20090037932MECHANISM FOR BROADCASTING SYSTEM MANAGEMENT INTERRUPTS TO OTHER PROCESSORS IN A COMPUTER SYSTEM - A computer system includes a system memory, a plurality of processor cores, and an input/output (I/O) hub that may communicate with each of the processor cores. In response to detecting an occurrence of an internal system management interrupt (SMI), each of the processor cores may save to a system management mode (SMM) save state in the system memory, information corresponding to a source of the internal SMI. In response to detecting the internal SMI, each processor core may further initiate an I/O cycle to a predetermined port address within the I/O hub. The I/O hub may broadcast an SMI message to each of the processor cores in response to receiving the I/O cycle. Each of the processor cores may further save to the SMM save state in the system memory, respective internal SMI source information in response to receiving the broadcast SMI message.02-05-2009
20080244616System and method for message lifetime management - A system and method for message lifetime management. According to an embodiment of the invention, a front-end application process identifies during a user interface interaction cycle of the front-end application process at least one stateful message reported to the front-end application process by a back-end service process during a prior user interface interaction cycle of the front-end application process, the at least one stateful message having been stored in a message buffer by the front-end application process, queries the back-end service process to determine whether the at least one stateful message is currently valid, and removes the at least one stateful message from the message buffer if it is determined not to be currently valid.10-02-2008
20080282261APPLICATION MODULE FOR MANAGING INTERACTIONS OF DISTRIBUTED MODALITY COMPONENTS - A method for managing application modalities using dialogue states can include the step of asserting a set of activation conditions associated with a dialogue state of an application. Each of the activation conditions can be linked to at least one programmatic action, wherein different programmatic actions can be executed by different modality components. The application conditions can be monitored. An application event can be detected resulting in an associated application condition being run. At least one programmatic action linked to the application condition can be responsively initiated.11-13-2008
20090193435CONVERTER FOR CONVERTING COMMUNICATION METHOD AND/OR COMMUNICATION PROTOCOL - A communication converter for converting a communication method and/or a communication protocol in order to enable communication between a medical device and a medical support control device for controlling the medical device, comprising: a storage unit for storing a command list for the medical device; an obtainment unit for obtaining data transmitted from the medical device; a message creation unit for determining whether or not each command included in the data is registered in the command list, and for creating a first or second message on the basis of a result of the determination; and an output unit for outputting the first or second message to the medical support control device.07-30-2009
20080271051Component-Oriented Application Servers - The invention relates to a process for component-oriented application servers and thus to the field of distributed applications. This invention expands component-oriented application servers in such a way that the components of an application implemented on this type of application server can provide graphic surfaces. This expansion is an additional function because network communication capabilities can be used without limitations, precisely as in non-expanded components. This makes it possible to assemble distributed applications entirely out of uniform components, while the advantages of application servers remain entirely available.10-30-2008
20100146520EVENT FILTERING AT A PERFORMANCE-BASED INTERFACE - Architecture that facilitates performance enhancement in message-based computing across a performance-based interface. When a request from a source is transmitted across the interface to a destination, a filter component in communication with the destination dynamically allows only one or more relevant responses from the destination to transition the interface to the source. This mechanism achieves an even tighter filtering of events while at the same time giving developers more flexibility over the events they choose to register, thereby enhancing the performance of message-based computing architectures by reducing unnecessary computation.06-10-2010
20090031325Direct Memory Access Transfer completion Notification - Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.01-29-2009
20090138895SUBSCRIPTIONS FOR ROUTING INCOMING MESSAGES TO PROCESS INSTANCES IN A PROCESS EXECUTION ENGINE - An orchestration engine may execute multiple, concurrently running instances of a process model, where each of the instances of the process model includes one or more receiving objects. A messaging endpoint may be shared by the instances of the process model and may be configured to receive messages. A subscription handler may handle multiple subscriptions for the instances and may be configured to define a first subscription for a first instance of the multiple instances, where the first subscription includes a correlation expression, an association with the messaging endpoint, and an association with a first receiving object within the first instance. The subscription handler also may associate the first subscription with the first instance and initialize the first subscription associated with the first instance. A routing manager may route received messages that match the first subscription to the first receiving object.05-28-2009
20090138894Automatic Object Instantiation - A method and apparatus for converting a function call to a method call. In one embodiment, the method comprises receiving a call on a method and determining whether the call is an object method call. In response to a determination that the call is not the object method call, the method comprises instantiating a new object to convert the call into the object method call.05-28-2009
20080256554METHOD AND MODULES FOR GENERATING CLIENT-SERVER APPLICATIONS - A multi-model-view-controller (MMVC) design pattern for generating client-server applications, which overcomes the disadvantages of the MVC design pattern. In an application generated according to the MMVC design pattern initial data is provided by the server model via the controller to the client model. Subsequent data is requested from the server model by the controller and passed to the client model. The initial and subsequent data are fetched according to predetermined rules. The predetermined rules can be based on personal details of the user, such as identity or role, on the server or client computing platforms, on the application, or other factors.10-16-2008
20090037933METHOD AND APPARATUS FOR ACCESSING A COMPATIBLE LIBRARY FOR AN EXECUTABLE - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer-usable program code for accessing a compatible library. The process receives a file name associated with a library reference. The library reference is included in an executable, and indicates a library used for executing the executable. The process receives environmental variable information in response to identifying an unavailable library in a secondary memory. The unavailable library is associated with the file name. The process accesses the compatible library from a shared library segment using the file name in response to receiving the environmental variable information. The compatible library is associated with the file name. The process utilizes the compatible library to execute the executable.02-05-2009
20090199210Transaction management in a web service messaging environment - A method and apparatus for managing database transactions in a web service messaging environment. In one embodiment, the method includes receiving a web service call indicating a beginning of a database transaction from a client, and creating a database transaction in response to this web service call. The method further includes receiving subsequent web service calls from the client, and for each subsequent web service call, associating a corresponding web service call with the database transaction, and performing the corresponding web service call. Afterwards, the database transaction is terminated upon committing or rolling back data resulting from the subsequent web service calls.08-06-2009
20090064184PRE-POPULATION OF META DATA CACHE FOR RESOLUTION OF DATA MARSHALING ISSUES - In a data processing system, objects (in the object oriented sense of the word) are instantiated through the use of transmitted data which is marshaled and demarshaled through the use of protocols that acquire meta data for the transmitted data through the use of an already existing cache of such meta data which has proper content meeting version requirements as specified by an implementation key associated with the object. This eliminates the need for call back requests that may or may not succeed because of the presence of a firewall in a yet-to-be-established connection. A tool is provided for structuring the data, first on disk and then later in a more readily available portion of an active memory.03-05-2009
20090144751AUTOMATIC DISCOVERY OF THE JAVA CLASSLOADER DELEGATION HIERARCHY - A computer implemented method, data processing system, and computer program product for automatic discovery of the Java classloader delegation hierarchy. One or more classloaders are instrumented with byte code instrumentation code such that a delegation event is received each time a classloader delegates a resource finding method to a parent classloader of the classloader. From each delegation event received, the classloader that generated the delegation event and a parent classloader to which the classloader directly delegates the resource finding method is determined. Based on the delegation events received, the classloaders to which a current classloader in the one or more classloaders can directly delegate are determined. The order of delegation to the classloaders may then be determined.06-04-2009
20090007141MESSAGE PASSING WITH A LIMITED NUMBER OF DMA BYTE COUNTERS - A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.01-01-2009
20090249359APPARATUS AND METHODS FOR WIDGET INTERCOMMUNICATION IN A WIRELESS COMMUNICATION ENVIRONMENT - The described aspects relate to methods and apparatus for widget intercommunication in a wireless communication environment. In particular the described aspects relate to dynamically exchanging content between application graphical user interface widgets executed on a widget runtime model.10-01-2009
20090249358Managing Consistent Interfaces for Kanban Business Objects Across Heterogeneous Systems - A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a kanban and/or a kanban control cycle business object.10-01-2009
20080313649Efficient web services application status self-control system on image-forming device - Techniques and systems for controlling resources used by a device's web services applications are disclosed. In one technique, web services applications release their allocated resources and enter a “sleep mode” after being inactive for a specified period of time. In one technique, a device maintains a shared pool of memory resources. The pool contains data structures that web services applications are likely to re-use. Before allocating a new instance of a needed data structure from free memory, a web services application first determines whether the shared pool already contains a currently unused but allocated instance of a data structure of the needed type, and, if the shared pool does, then the web service application uses that instance, overwriting existing data in the instance as needed. Web services applications return such data structures to the shared pool when those web services applications are finished using those data structures.12-18-2008
20080313648PROTECTION AND COMMUNICATION ABSTRACTIONS FOR WEB BROWSERS - Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.12-18-2008
20080307434Method and Apparatus for Data Transfer Across a Network - Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within an object. Objects within the request can be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request can be used to provide greater security. For example a store may be able to interpret the request, but credit details may be separately encrypted such that only a bank can decrypt that subcomponent of the request.12-11-2008
20080307433Locking or Loading an Object Node - A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a lock group such that nodes of the lock group are locked together. Identification of a first group of the nodes to form the lock group is received. The method includes storing the object with the first group of the nodes forming the lock group. A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a load group such that nodes of the load group are loaded together. Identification of a first group of the nodes to form the load group is received. The method includes storing the object with the first group of the nodes forming the load group.12-11-2008
20080307432METHOD AND APPARATUS FOR EXCHANGING DATA USING DATA TRANSFORMATION - A computer implemented method, apparatus, and computer-usable program product for exchanging data using data transformation are provided. A first data binding component receives data from a function selector. A set of data bindings capable of invocation by the first data binding component is available. The function selector determines a content type associated with the data. The first data binding component receives the data and the content type from the function selector. The first data binding component invokes a data binding corresponding to the content type from the set of data bindings to transform the data into a data object. The data object has an object name. A target application is determined based on the object name, and the data object is then routed to a target application.12-11-2008
20100229183FRAMEWORK DEVICE OF MOBILE TERMINAL AND METHOD FOR PROVIDING INTEROPERABILITY BETWEEN COMPONENTS - The present invention relates to a framework device of a mobile terminal and a component interoperability guaranteeing method, and is configured by a hardware component generated by a developer and hardware middleware to be linked by a software (or another hardware) component. Therefore, in the exemplary embodiment of the present invention, hardware dependent parts in the hardware component are provided to the hardware middleware through setting parameters so that the hardware middleware is linked with the corresponding hardware component. The hardware middleware receives a request message according to the general inter-ORB protocol (GIOP) transmission system used for the basic communication system of the framework, parses the request message, and converts and transmits data to the corresponding hardware component. The hardware component (hardware logic) to which the request message is transmitted uses data to perform its unique function, and the result is configured as a response message by the hardware middleware and is then transmitted to the software component.09-09-2010
20100242052Method, System and Device for Managing Customer Premises Equipment - In a method for managing a Customer Premises Equipment (CPE), an Auto-Configuration Server (ACS) designates a first designated instance number for a first instance object. A message is then sent to the CPE. The message carries the first designated instance number for the first instance object and is adapted to notify the CPE to take the first designated instance number as an instance number for the first instance object.09-23-2010
20090328063INTER-FRAME MESSAGING BETWEEN DIFFERENT DOMAINS - Cross-domain communication between a parent web page hosted in a parent domain and a child web page hosted in a different child domain is provided. Upon downloading the parent page and child page into a client's web browser, an IFM-channel connection can be established within the browser between the parent page and child page, which can be used to bidirectionally communicate text-based messages containing commands and HTML content directly between the parent page and child page. Additionally, an XML-channel connection can be established within the browser between the parent page and child page, which can be used to bidirectionally communicate text-based messages containing HTTP commands and XML content directly between the parent page and child page. This cross-domain communication of messages takes place completely within the browser.12-31-2009
20090328065METHOD AND SYSTEM FOR DELEGATED JOB CONTROL ACROSS A NETWORK - A method for job delegation including receiving a job from a user by a first management object, identifying a target system for the job using a data model in the first management object and a job delegation policy, where the data model comprises an object representing the target system, and determining a first nexthop for the target system, where the first nexthop is a second management object. The method also includes placing the job on a queue corresponding to the second management object, where the queue is located in the first management object, receiving the job by the second management object, locating the target system and a driver corresponding to the target system using the second management object, and executing the job using the driver corresponding to the target system.12-31-2009
20090328064COM OBJECT AND MANAGED CODE OBJECT INTEROPERABILITY - Communicating between managed add-ins and COM hosts. A computing environment includes host objects which may be one of a COM object or a managed code object. The computing environment further includes add-in objects implemented in managed code. Add-in object can provide additional functionality to the host objects. A method includes acts for communicating between add-in objects and host objects. The method includes determining that a first host object to be communicated with is a COM object of a COM host. As a result of determining that a host object to be communicated with is a COM object, incoming and outgoing communications from a managed code add-in are routed through an interop proxy. The interop proxy is implemented in managed code with a managed code add-in. The interop proxy is configured to translate managed code invocations to COM code invocation, and to translate COM code invocations to managed code invocations.12-31-2009
20090328062SCALABLE AND EXTENSIBLE COMMUNICATION FRAMEWORK - An extensible communication framework is presented that provides a standard, reusable implementation of common code for adding new modes of communication to a unified communications application. The framework loosely couples the signaling and media plane of unified communications to enable the two planes to be separated onto different computer systems or processes and to allow application writers to extend only the portion where they want to add new functionality. Thus, the extensible communication framework provides flexibility without excessive complexity.12-31-2009
20100299677Article of manufacture for programmatically describing web service-driven applications - To programmatically describe the abstract behavior of a web-service driven application (WSDA), a class which is used to model an Interface Definition Language (IDL) extension component is provided. Nested within the modeled IDL extension component are subcomponents, each of which references an IDL component which describes a set of operations and message types exposed by the WSDA. To programmatically describe the concrete behavior of the WSDA, a class which is used to model an additional IDL extension component is provided. The additional IDL extension component describes an executable instance of the WSDA and is associated with the IDL extension component that programmatically describes the abstract behavior of the WSDA. Nested within the IDL extension component that describes the executable instance of the WSDA are subcomponents, each of which references an IDL component that describes an executable web service exposed by the WSDA.11-25-2010
20100306787Enhancing Service Reuse Through Extraction of Service Environments - For each of a plurality of existing services of a service-oriented architecture, a corresponding environment is defined. Information representative of the defined corresponding environments is stored together with descriptions of the existing services. At least two of the existing services are composed to provide new functionality, based upon the descriptions of the at least two existing services and the information representative of the defined corresponding environments for the at least two existing services.12-02-2010
20110010724COMMUNICATION BRIDGE - Presented is a method and system for providing a communication bridge between two computer technologies. The method includes defining interfaces for the two computer technologies, wherein each interface includes certain parameters, generating classes that contain methods in the two computer technologies, based on the parameters included in the interfaces, publishing the interfaces for invocation of methods between the two computer technologies.01-13-2011
20110041139APPARATUS AND METHOD FOR INTER-OBJECT COMMUNICATION - A partnership object is created to manage interactions between objects in an object oriented computing environment. An interaction license is issued by a licensing framework executing on a computing device to each of a group of objects indicating that the group of objects is authorized to form partnerships, where the group of objects interact by requesting formation of the partnerships using the provided interaction licenses. A first object requests to interact with a second object. A partnership object is created and each of the first and second objects is provided with a reference to the partnership object. The request from the first object may include identifiers of licenses associated with the first and second object and the partnership object may be created only if both licenses are validated. The first object then is able to interact with the second object by using the reference to the partnership object.02-17-2011
20100153969COMMUNICATION INTERFACE SELECTION ON MULTI-HOMED DEVICES - Configurable selection of communication interfaces on a multi-homed computing device. Application programs executing on the computing device define preferences, policies, and/or restrictions for use of the various communication interfaces. Responsive to a request from one of the application programs to communicate with a destination computing device, a list of the communication interfaces is created based on the preferences defined by the application program. The application program iteratively attempts to establish a connection to the destination computing device using each of the communication interfaces on the list.06-17-2010
20110078703HTTP Request Preservation - The present disclosure involves systems, software, and computer implemented methods for preserving a Hypertext Transfer Protocol (HTTP) request. One process includes operations for receiving an HTTP request and generating request and response objects representing the HTTP request. Multiple child threads are generated and then executed at content providers to render content in response to the HTTP request. A first portion of the rendered content is transmitted, but the request and response objects are stored in memory and made accessible to content providers associated with pending child threads. The content providers associated with the pending child threads utilize the request and response objects to render a second portion of the content.03-31-2011
20100131962Software application action monitoring - A system and method for collecting runtime resource information generated by an active software application is provided and includes identifying an occurrence of a function event generated for a software application operating on a predetermined platform, determining a duration of a monitored function called in response to the function event, comparing the duration with a threshold to determine if the duration exceeds the threshold, wherein if the duration is greater than or equal to the threshold then collecting runtime resource information responsive to the monitored function and processing the runtime resource information responsive to the monitored function.05-27-2010
20090260019Web Content Customization via Adaptation Web Services - A user agent in a Web access device transmits an HTTP request for Web content to an origin server. The request contains a set of capabilities of the Web access device. A content authoring mechanism and adaptation determination service on the origin server process the request to determine what transformation is required to make the requested content fit the capabilities of the Web access device. The adaptation determination service invokes a niche transformation service that performs, in response to the content and the capabilities, the necessary transformation. The transformed Web content is transmitted to the user agent.10-15-2009
20090320045SERVER COMPUTER COMPONENT - An interface for interfacing between a receiving component of a server application and a remote application, the receiving component being operable to receive serialised objects from the remote application via the interface, the interface comprising: means for ascertaining if a piece of code associated with the received object is locally stored and directly available to the server application; and means for locally storing the associated piece of code in the event that it is not already locally stored and directly available to the server application.12-24-2009
20110083137APPLICATION COOPERATION METHOD, SYSTEM, COMPUTER-READABLE MEDIUM, AND INFORMATION PROCESSING APPARATUS - An application cooperation method comprises: a holding step of holding correspondence between functions provided by applications and operation categories which categorize operation contents for the object by the functions provided by the applications; an acquisition step of acquiring an object managed by a first application, and acquiring an operation authority of a user for the object managed by the first application; an object information management step of storing and managing, as object information, the object and the operation authority for the object acquired in the acquisition step in the storage unit; and a determination step of determining whether or not operation categories held in the holding step in correspondence with functions of a second application which processes the object managed as the object information in the object information management step are permitted for the operation authority for the object managed as the object information.04-07-2011
20100313208METHOD AND APPARATUS FOR IMPLEMENTING ATOMIC FIFO - Techniques for implementing an atomic FIFO queue and system for processing queue elements are described herein. According to one embodiment, in a first thread of execution, new data is atomically merged with existing data of an object via an atomic instruction associated with hardware that executes the first thread. An attempt is made to acquire ownership of the object (exclusive access). If successful, the object is enqueued on an atomic FIFO queue as a continuation element for further processing. Otherwise, another thread of execution is safely assumed to have acquired ownership and taken responsibility to enqueue the object. A second thread of execution processes the atomic FIFO queue and assumes ownership of the continuation elements. The second thread invokes a function member of the continuation element with a data member of the continuation element, the data member including the newly merged data. Other methods and apparatuses are also described.12-09-2010
20090254921SYNCHRONIZING BUSINESS TRANSACTION RECORDS FROM ASYNCHRONOUS MESSAGES RECEIVED OUT OF SEQUENCE - A method for processing business transaction orders received asynchronously. The method includes receiving a first message for a business object, the business object comprising an order between a first party and a second party, and storing the business object including a first entity within a data store. The method further includes receiving a second message for the business object including a second entity, and storing the second entity with the business object. Respective chronological indicators for the first entity and the second entity are examined. Based on the chronological indicators, object attribute metadata describing a current status of the business object is updated, and the business object is processed in accordance with the updated object attribute metadata.10-08-2009
20090241125DATA MANIPULATION COMMAND METHOD AND SYSTEM - A data manipulation method and system. The method includes receiving and storing by a computing system, configuration data and a first list comprising first group of data objects. The computing system generates a second list associated with the first list. The second list comprises a second group of data objects associated with the first group of data objects. The computing system compares the first group to the second group to determine if any attribute values associated with the first group are equal to any associated attribute values associated with the second group. The computing system generates a third list based on the comparing and the configuration data. The third list comprises a third group of data objects associated with the first group and of data objects. The computing system stores the third list.09-24-2009
20080320493SYSTEM AND METHOD FOR USING A MOBILE AGENT OBJECT TO COLLECT DATA - Method and system for collecting and filtering messages received at an event source platform and delivering the filtered messages to a collection host platform. According to one embodiment, the system uses a mobile agent object to filter messages received at an event source platform. The mobile agent object determines a filtered set of messages that match predetermined parameters and then delivers the filtered messages to a collection host platform for storage or redirection.12-25-2008
20090049455COMMAND INTERFACE SYSTEMS AND METHODS - Apparatus, systems, and methods are disclosed that operate within a memory to execute internal commands, to suspend the execution of commands during a transfer period, and to execute external commands following the transfer period. Additional apparatus, systems, and methods are disclosed.02-19-2009
20110047557METHOD AND APPARATUS FOR EXPEDITED SERVICE INTEGRATION USING ACTION TEMPLATES - An approach is provided for expedited service integration using action plugin templates. Context information and a target object are determined. A plugin based on a template configured for a service provider is received. A plugin action is determined using the target object and context information. Execution of the plugin on the target object is initiated to perform the plugin action.02-24-2011
20110167432Web Services Layer Synchrony in Relation to the Business Layer Synchrony - A web services system provides web services interfaces to applications having native interfaces with different types of synchrony. The web services interfaces can have the same or different type of synchrony than the underlying application. The web services layer translates a web services request from a client to corresponding function calls to applications. Upon receiving a response from an application, the web services layer translates the response back to a web services format and forwards it to the client. A naming convention is used to define the names of the data types and operations in the web services interface corresponding with data types and functions of the application. A function prefix can be used to specify a namespace in the web services interface unique to the application. A web services namespace is assigned to tokens so that requests for asynchronous web services are diverted to a general web services routine.07-07-2011
20100023951Method and apparatus for data transfer between isolated execution contexts - An approach for making an object owned by a first application that executes in a first isolated execution context accessible to a second application that executes in a second isolated execution context is described herein. According to this approach the object is associated with the first isolated execution context. A request is received to render the object accessible to the second application. Ownership of the object is transferred to the second application by changing the isolated execution context that is associated with the object to the second isolated execution context, thereby rendering the object accessible to the second application.01-28-2010
20100017808METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR APPLICATION NAME AND CLIENT ID PAIRING IN A MESSAGE CONNECTION - Methods, systems and computer program products for application name and client ID pairing in a message connection. An exemplary embodiment includes a method for pairing an application name and a client ID in a messaging broker infrastructure, the method including running a messaging system associated with the messaging broker infrastructure running a monitoring application configured to monitor a connection to the messaging broker, creating a connection to the messaging broker, identifying a class name and the client ID associated with an application, converting the class name to an application name and publishing a pairing of the application name and the client ID on the messaging infrastructure.01-21-2010
20090172696SERVICE-BASED CONTENT MANAGEMENT - The present invention leverages and modifies service-oriented architecture and concepts to provide an enterprise content management (ECM) system as a service. This allows organizations (potential customers) to be provided with a service as opposed to purchasing a software product. In the present invention, it is disclosed how to build a reusable enterprise content management ECM as an asset being a brick for business service using SOA methodology. To achieve these goals, this invention has, among other things/components: (1) abstracts the generic portion of individual ECM; (2) introduces a new unique component to allow configuring the data modeling part and workflow of each individual ECM; (3) provides a common UI for the content edit and view; and (4) provides a plug-in component for bulk content processing.07-02-2009
20120151499SYSTEM AND METHOD FOR FACILITATING THE EXCHANGE OF INFORMATION AMONG APPLICATIONS - Facilitating the exchange of information among applications (e.g., business support systems or operational support systems or a combination thereof) may involve receiving a data object from a first application, using a first controller to route the received data object to a first transformer, using the first transformer to transform the data object from a first format used by the first application into a common format object, publishing the common format object to a communication channel, receiving a request from a subscribing application to subscribe to the communication channel, using a second controller to route the common format object to a second transformer, using the second transformer to transform the common format object into a data object in a second format used by the subscribing application, and sending the data object in the second format to the subscribing application.06-14-2012
20120210335METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR A CLIENT APPLICATION PROGRAMMING INTERFACE (API) IN A SERVICE ORIENTED ARCHITECTURE - Described herein are embodiments of a system, method and computer program product for a client application-programming interface (API) in a service oriented architecture (SOA). In one aspect, a system is described comprised of an application client having application code, one or more service interfaces, and a processor. An enterprise service bus (ESB) having a service registry connects one or more service implementations with the application client through the ESB. The processor is configured to execute the application code to invoke at least one of the one or more service interfaces and request at least one of the one or more service implementations via a request message. In one aspect, the request message comprises application code language based objects requesting a service. The processor is further configured to dynamically create a service instance for the service message. The service instance comprises the service message formatted for transport in the ESB and an endpoint reference for the one of the one or more service implementations as determined by the service registry.08-16-2012
20110107351CAUSE-CHAIN ANALYSIS USING OBJECTS - Identification of the root cause of a change in the system, as well as any side-effects (“ancillary changes”) caused by the change via an object attribute. A change resulting from a request in a system, whether originating from a user, service, or workflow, has an associated request object that captures the details of the change. An ancillary change resulting from the prior change is correlated to the prior change through a parent attribute on the request object that identifies the prior change as the immediate parent. Thus, all downstream ancillary changes resulting from a request can be correlated back to the root request (change) via the parent attributes of the ancillary changes.05-05-2011
20110099558SECURE SERVICE ORIENTED ARCHITECTURE - A system, method and media for a service oriented architecture. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects and objects of the invention can be obtained from a review of the specification, the figures and the claims.04-28-2011
20090133040Systems and Methods for Providing Wake On LAN (WoL) Support - A system includes a management controller coupled to and configured to manage a plurality of information handling systems. Each of the information handling systems may include a network interface device configured to receive wake-up messages remotely via a network. The management controller is operable to receive a wake-up message remotely via the network; identify a particular one of the information handling systems to be awakened from a non-awake state based on an address included in the wake-up message; and forward the wake-up message to the particular information handling system to cause the particular information handling system to awaken. The network interface device of the particular information handling system may remain unpowered while the wake-up message is received and forwarded by the management controller.05-21-2009
20120222047Monitoring a Software System Using an Interpretation Rule of an Ontology - Monitoring a software system based on a service oriented architecture (SOA). The method may involve system components communicating with each other via sending messages. The method may include receiving a monitoring message by a monitoring component where the monitoring message may be sent from a system component of the software system. The method may further include providing an ontology including at least one interpretation rule for the message by the monitoring component. The method may also include reacting of the monitoring component in accordance with the at least one interpretation rule.08-30-2012
20100205613Method, Apparatus, and System for Applying Timed Operations to Non-Timed Functions - An encapsulation module encapsulates a function in a timed method adapter. A caller calls the timed method adapter in place of the function. The timed method adapter calls a set invoker. The set invoker saves an argument, calls an invoke thread, and returns to the timed method adapter. The invoke thread invokes the function and passes the function an object and the argument. The timed method adapter further waits for an execution result from the function and monitors for an expiration of a timeout. If the function returns the execution result before expiration of the timeout, the timed method adapter returns the execution result to the caller. If the timeout expires before the function returns the execution result, the timed method adapter directs the invoke thread to cancel the function and returns a timeout exception to the caller.08-12-2010
20120137306SYSTEM AND METHOD FOR A PROCESS BROKER AND BACKEND ADAPTER BASED PROCESS INTEGRATION - Embodiments of the present invention may provide a local process integration component to facilitate process integration. The local process integration component may include an adapter, a process broker and a process broker handler. The process broker may collaborate with the business logic and adapter to perform business-centric integration logic. The architecture is based on is a toolkit and generator approach. For inbound communication, the adapter is responsible for control flow while the process broker handler provides generic services. For outbound communication, the process broker is responsible for control flow while the process broker handler provides generic services. The control flow orchestration is uniformed by code generation.05-31-2012
20100011376INVOCATION CHANNEL - Creating interoperability between a calling entity and an external service includes configuring an invocation channel using codeless process, designating the external service, passing source data from the calling entity to the invocation channel, the invocation channel formatting the data, invoking a connection to the external service, and passing the data over the connection to the external service.01-14-2010
20090019454Apparatus and Method for Inter-Object Communication - An apparatus and method for managing inter-object communication are provided. With the apparatus and method, objects obtain licenses to interact with one another via a licensing framework. When an object wishes to enter into an interaction with another object, the first object sends its license to the second object. The second object then sends a request to the framework requesting that a partnership between the objects be generated. The partnership request includes an identification of the two objects' licenses. The objects' licenses are then validated and, assuming the licenses are valid, a partnership object is created. References to the partnership object are forwarded to the objects which then use the reference to the partnership object to communicate with the other object in the partnership rather than a direct reference to the other partner object. When one object of the partnership lapses, by failure of a module with which the object is associated, for example, a lapse event is posted to the licensing framework. In response to the lapse event, the licensing framework determines the partnerships of the lapsed object. The partner objects of the partnerships in which the lapsed object was active are identified and informed of the lapse of the object. The partnership objects are then torn down and resources reclaimed.01-15-2009
20090013332Special "Legacy Board" device - A unique display device called a “Legacy Board”. The device is used in remembering and memorializing the lives of loved ones. The device is related to apparatus and methods to hold a collection of family pictures, documents, artwork and other memorabilia and is used to showcase occasions such as births, baptisms, birthdays, graduations, engagements, reunions, weddings, anniversaries, death and memorials. The device is comprised of a base foam backboard; a predetermined placement template on the backboard with which to place the family collection onto the board; a means to removably attach the collection objects to the board; and a group of pre-cut openings, that correspond and match the placement template in order to reveal the items of the collection, through one or more sheets of flexible, thin and transparent or translucent material which feature stylish artwork images with/without text. The device may be framed or unframed.01-08-2009
20120324478Applying Timed Operations to Non-Timed Functions - For applying timed operations to non-timed functions, a computer causes the computer to discover, by parsing source code, a caller calling a function. The function does not perform timed operations. The computer further encapsulates the function in a timed method adapter and calls the timed method adapter in place of the function from the caller, passing the timed method adapter an object and an argument for the function. The computer further calls an invoke thread from the set invoker and returns from the set invoker to the timed method adapter. The computer waits for an execution result from the function at the timed method adapter, monitoring for an expiration of a timeout, and invokes the function from the invoke thread, passing the function the object and the argument.12-20-2012
20120331483MANAGING EVENTS GENERATED FROM BUSINESS OBJECTS - A method for managing events generated from business objects in a business transactions environment is provided in the illustrative embodiments. A first event being raised by a business object in a plurality of business objects configured in a business entity is detected. The business entity executes in the data processing system and provides a function for processing a request. A determination is made whether a second event has been detected prior to the first event and during the processing of the request. In response to the determining being affirmative, first event data associated with the first event is combined with second event data stored from the second event. The combining results in consolidated event data. The consolidated event data is published in response to the request upon completing the processing of the request.12-27-2012
20080229330Method and Apparatus for Implementing Container Managed Batch Jobs in an Enterprise Java Bean Environment - An improved method, apparatus, and computer instructions for creating and running batch jobs in an object oriented environment, such as a J2EE environment. A request to execute a batch job is received. A deployment descriptor file is processed to identify a batch bean to be invoked. This batch job session bean processes the request, parses deployment descriptor file that comprises definitions of relationships between other helper classes, entity and session beans. The identified batch bean is invoked to execute the batch job step in the order described in the deployment descriptor applying checkpoints at intervals specified in the descriptor.09-18-2008
20130014129APPLICATION MODULE FOR MANAGING INTERACTIONS OF DISTRIBUTED MODALITY COMPONENTS - A method for managing application modalities using dialogue states can include the step of asserting a set of activation conditions associated with a dialogue state of an application. Each of the activation conditions can be linked to at least one programmatic action, wherein different programmatic actions can be executed by different modality components. The application conditions can be monitored. An application event can be detected resulting in an associated application condition being run. At least one programmatic action linked to the application condition can be responsively initiated.01-10-2013
20130014128WEB CONTENT CUSTOMIZATION VIA ADAPTATION WEB SERVICES - A user agent in a Web access device transmits an HTTP request for Web content to an origin server. The request contains a set of capabilities of the Web access device. A content authoring mechanism and adaptation determination service on the origin server process the request to determine what transformation is required to make the requested content fit the capabilities of the Web access device. The adaptation determination service invokes a niche transformation service that performs, in response to the content and the capabilities, the necessary transformation. The transformed Web content is transmitted to the user agent.01-10-2013
20080250425SYSTEMS AND METHODS FOR INTERFACING MULTIPLE TYPES OF OBJECT IDENTIFIERS AND OBJECT IDENTIFIER READERS TO MULTIPLE TYPES OF APPLICATIONS - A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application.10-09-2008
20080250424Seamless Window Implementation for Windows Presentation Foundation based Applications - Described are systems and methods for implementing seamless window support for applications, such as applications based on Windows® Presentation Foundation (WPF). Seamless support for WPF applications can be implemented by remoting information associated with structural representation of the applications from a remote server to a remote client. The structural representation may be replicated at the client in accordance with the structural information. The replicated structural representation is utilized to render visual content associated with the application by local rendering mechanisms at the client.10-09-2008
20080222652Method and Apparatus for Data Transfer Across a Network - Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within a object (such as a comparison with parameters of the request to determine whether the request can be satisfied). Objects within the request can be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request can be used to provide greater security. For example a store may be able to interpret the request, but credit details may be separately encrypted such that only a bank can decrypt that subcomponent of the request.09-11-2008
20080222651MULTIPLE MESSAGE SOURCE ELECTRONIC DATA INTERCHANGE (EDI) ENVELOPER WITH BATCHING SUPPORT - Embodiments of the present invention address deficiencies of the art in respect to EDI enveloping and provide a method, system and computer program product for multiple message source EDI enveloping with batching support. In one embodiment of the invention, a method for multi-format EDI enveloping can include receiving messages from multiple concurrent message sources, transforming the received messages into an EDI format, inserting the transformed messages into a minimal number of envelopes, and forwarding the envelopes as an EDI interchange to designated trading partners.09-11-2008
20130097616CORBA EMBEDDED INTER-ORB PROTOCOL (EIOP) - A non-transient computer-readable storage medium that stores computer program code is provided. When this code is loaded into a computer system and executed thereon, it causes the computer to compile an interface definition language (IDL) configured to provide a custom inter-orb protocol (custom IOP), configure a message header for a message in accordance with to a specification in the IDL for at least a custom-IOP message header, and define a custom-IOP message header to replace the corresponding Common Object Resource Broker Architecture (CORBA) General Inter-Orb (GIOP) message header, wherein the custom-IOP message header requires fewer bits overall than the corresponding GIOP message header by changing or eliminating at least a portion of the fields in the corresponding GIOP message header.04-18-2013
20130179903COORDINATING POWER STATES IN A HYBRID INFORMATION HANDLING DEVICE - Systems, methods and products directed toward coordinating power states in a hybrid information handling device are described herein. One aspect includes a method including: providing a primary operating environment and a secondary operating environment in an information handling device; ascertaining a trigger event for switching between the primary operating environment and the secondary operating environment; providing power state transitioning responsive to the trigger event; and placing one of the primary operating environment and the secondary operating environment in a working state while one of the primary operating environment and the secondary operating environment is in a sleeping state. Other embodiments are described herein.07-11-2013
20100319005Consensus Based Distributed Task Execution - Computer-implemented methods, systems, and computer-readable storage media are disclosed to coordinate a plurality of devices in performing a task. A particular computer-implemented method includes storing updated status information at a device where the updated status information reflects a change in a vote for a task state of one or more of a plurality of devices. A first updated status message is sent to one or more of the plurality of devices where the first updated status message communicates the updated status information. A task consensus at the device is updated when the updated status information indicates that at least a predetermined quantity of the plurality of devices agrees on the task status.12-16-2010

Patent applications in class Object oriented message

Patent applications in all subclasses Object oriented message