Patent application number | Description | Published |
20110145801 | USING APPROPRIATE LEVEL OF CODE TO BE EXECUTED IN RUNTIME ENVIRONMENT USING METADATA DESCRIBING VERSIONS OF RESOURCES BEING USED BY CODE - A method, system and computer program product for using an appropriate level of code to be executed in a runtime environment. Code in a non-Java format is translated into a Java source file. During the translation process, metadata is generated from a configuration file where the metadata includes version information of the resources (e.g., JSTL) being used by the code written in the non-Java format. A determination is made as to whether to recompile the non-Java code based on software components, referred herein as “listener components,” determining whether the versions of the resources being used by the non-Java code performs acceptably well in the runtime environment. If a listener component determines that a version of a resource being used is not acceptable, then the non-Java code is recompiled with a newer version of the resource. In this manner, an appropriate level of code is executed by the runtime environment. | 06-16-2011 |
20110219077 | DIRECT LINKED TWO WAY FORMS - A method for managing a two-way form over a direct link is provided. The method includes establishing a communicative link between two communications clients each separately executing in memory by a processor of a corresponding one of two computers. The method also includes managing a two-way form rendered as individual instances of the two-way form each in a corresponding content browser executing in a corresponding one of the two computers. Finally, the method includes exchanging synchronization information for the two-way form over the communicative link. In one aspect of the embodiment, the method also includes prompting in one of the individual instances of the two-way form for verification of an update to a field providing in another of the individual instances of the two-way form. In another aspect of the embodiment, the method includes recording a verification of the update to the field in an audit trail. | 09-08-2011 |
20120005663 | DYNAMIC DETERMINATION OF APPLICATION SERVER RUNTIME CLASSLOADING - Embodiments of the present invention provide a method, system and computer program product for dynamic selection of a runtime classloader for a generated class file. In an embodiment of the invention, a method for dynamic selection of a runtime classloader for a generated class file is provided. The method includes extracting meta-data from a program object directed for execution in an application server and determining from the meta-data a container identity for a container in which the program object had been compiled. The method also includes selecting a container according to the meta-data. Finally, the method includes classloading the program object in the selected container. | 01-05-2012 |
20120159439 | USING APPROPRIATE LEVEL OF CODE TO BE EXECUTED IN RUNTIME ENVIRONMENT USING METADATA DESCRIBING VERSIONS OF RESOURCES BEING USED BY CODE - A method for using an appropriate level of code to be executed in a runtime environment. Code in a non-Java format is translated into a Java source file. During the translation process, metadata is generated from a configuration file where the metadata includes version information of the resources (e.g., JSTL) being used by the code written in the non-Java format. A determination is made as to whether to recompile the non-Java code based on software components, referred herein as “listener components,” determining whether the versions of the resources being used by the non-Java code performs acceptably well in the runtime environment. If a listener component determines that a version of a resource being used is not acceptable, then the non-Java code is recompiled with a newer version of the resource. In this manner, an appropriate level of code is executed by the runtime environment. | 06-21-2012 |
20120159466 | DYNAMIC DETERMINATION OF APPLICATION SERVER RUNTIME CLASSLOADING - Embodiments of the present invention provide a method, system and computer program product for dynamic selection of a runtime classloader for a generated class file. In an embodiment of the invention, a method for dynamic selection of a runtime classloader for a generated class file is provided. The method includes extracting meta-data from a program object directed for execution in an application server and determining from the meta-data a container identity for a container in which the program object had been compiled. The method also includes selecting a container according to the meta-data. Finally, the method includes classloading the program object in the selected container. | 06-21-2012 |
Patent application number | Description | Published |
20090300096 | Client-Side Storage and Distribution of Asynchronous Includes in an Application Server Environment - A process for facilitating distribution of asynchronous content by a result server includes subscribing at least one client in response to subscription requests for the asynchronous content received at the result server from the at least one client. The process further includes publishing the asynchronous content. The publishing leads to dissemination of the asynchronous content from the result server to the subscribed clients, and removal of the asynchronous content from the result server. The process further includes receiving a subscription request from additional client(s). The process further includes polling the subscribed clients for the asynchronous content and sending the asynchronous content to the additional client(s) upon receipt of the asynchronous content from any client belonging to the subscribed clients. | 12-03-2009 |
20090300345 | Concept for Client Identification and Authorization in an Asynchronous Request Dispatching Environmnet - The present invention provides client and server identity validation in an asynchronous request dispatching environment with client-side aggregation. An application server receives an asynchronous include request from a client. A first unique identifier associating the client with the asynchronous include is generated and sent to a results server. A second unique identifier identifying the results server is generated and sent to the application server. Results of the asynchronous include are stored in the results server. The application server sends the first and second unique identifiers to the client, which polls the results server and sends the second unique identifier to the results server. The results server uses the second unique identifier to verify the identity of the client. The results server sends the first unique identifier to the client. The client uses the first unique identifier to validate the identity of the results server. | 12-03-2009 |
20090307304 | Method for Server Side Aggregation of Asynchronous, Context - Sensitive Request Operations in an Application Server Environment - Process, apparatus and program product for processing a request at an application server are provided. The process includes initiating one or more asynchronous operations in response to the request received by the application server. The process further includes generating a response content that includes one or more placeholders. Thereafter, one or more placeholders mark a location of content corresponding to each of the one or more asynchronous operations. The process further includes aggregating content received from a completed asynchronous operation by filling the content in the corresponding placeholder. The process further includes sending a partial response content with content up to the first unfilled placeholder. | 12-10-2009 |
20100011421 | ENABLING AUTHENTICATION OF OPENID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE - A method, system and computer program product for enabling authentication of an OpenID user when a requested identity provider is unavailable. A relying party receives a login request from the OpenID user, where the login request includes a username. The relying party reads a list of trusted identity providers that are associated with the received username and selects one of those identity providers. The relying party generating an OpenID identifier using an identification (e.g., Uniform Resource Locator) of the selected identity provider and the username. The relying party transmits an authentication request (request to authenticate the OpenID user) to the selected identity provider using the formed OpenID identifier. If the selected identity provider is unavailable, then the relying party selects another identity provider from the list of identity providers that are associated with the received username and repeats the above process. | 01-14-2010 |
20110131329 | APPLICATION PROCESSING ALLOCATION IN A COMPUTING SYSTEM - A method for allocating processing of an application performed by a computing system made up of a plurality of interconnected physical computing devices includes executing an application on a first application server associated with the computing system, the application having a number of modular software components; while executing the application, measuring processing resources consumed by one of the modular software components; and in response to one of the modular software components consuming an amount of processing resources defined by a criterion, deploying the one of the modular software components to a second application server associated with the computing system. | 06-02-2011 |
20110258441 | Secure Access to a Virtual Machine - A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user. | 10-20-2011 |
20120005598 | AUTOMATIC CO-BROWSING INVITATIONS - Embodiments can include instructions or steps, which when carried out, detect that copy operations are being performed on website data displayed to a user. Further to this detection, a co-browsing query for display to a user may be generated, an instruction to associate a co-browsing invitation with website data copied by the user may also be generated and a co-browsing invitation and pasted website data may be sent to an invitee. | 01-05-2012 |
20120173872 | Secure Access to a Virtual Machine - A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user. | 07-05-2012 |
20120210407 | ENABLING AUTHENTICATION OF OpenID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE - A method and computer program product for enabling authentication of an OpenID user when a requested identity provider is unavailable. A relying party receives a login request from the OpenID user, where the login request includes a username. The relying party reads a list of trusted identity providers that are associated with the received username and selects one of those identity providers. The relying party generating an OpenID identifier using an identification (e.g., Uniform Resource Locator) of the selected identity provider and the username. The relying party transmits an authentication request (request to authenticate the OpenID user) to the selected identity provider using the formed OpenID identifier. If the selected identity provider is unavailable, then the relying party selects another identity provider from the list of identity providers that are associated with the received username and repeats the above process. | 08-16-2012 |
20130198400 | Cognitive Dynamic Allocation in Caching Appliances - An approach is provided in which a caching appliance receives a data packet over a network connection utilizing a network protocol. The caching appliance selects a storage area based upon the network protocol and stores the data packet in the selected storage area. In one embodiment, the caching appliance identifies a service level that corresponds to the network protocol and selects the storage area based upon the identified service level. | 08-01-2013 |
20130307871 | Integrating Remote Content with Local Content - Integrating remote content with local content includes operating an application on a mobile device using local content stored on the mobile device, retrieving remote content with an overlay component of the application, and displaying the local content and the remote content simultaneously in a display of the mobile device. | 11-21-2013 |
20130307872 | Integrating Remote Content with Local Content - Integrating remote content with local content includes operating an application on a mobile device using local content stored on the mobile device, retrieving remote content with an overlay component of the application, and displaying the local content and the remote content simultaneously in a display of the mobile device. | 11-21-2013 |
20130311599 | Updating Web Resources - Updating web resources includes extracting web resources from an application to local files in response to an initial start-up of the application, downloading updates to the web resources to the local files from an external server; and running the application using contents from the local files. | 11-21-2013 |
20130311613 | Updating Web Resources - Updating web resources includes downloading an application to a client device, extracting web resources from the application to local files, and querying an external server for web resource updates specific to at least one operating condition of the client device. | 11-21-2013 |
20130311615 | Updating Web Resources - Updating web resources includes downloading an application to a client device, extracting web resources from the application to local files, and querying an external server for web resource updates specific to at least one operating condition of the client device. | 11-21-2013 |
20130311985 | Updating Web Resources - Updating web resources includes extracting web resources from an application to local files in response to an initial start-up of the application, downloading updates to the web resources to the local files from an external server; and running the application using contents from the local files. | 11-21-2013 |
Patent application number | Description | Published |
20140201702 | Automatic Identification of Affected Product Assets with Work Items - A work description for a computing system or environment is automatically associated with the affected source components, such as source code modules, web pages, icons, etc., by analyzing the textual description for a change to produce keywords, concepts, and metadata from the textual description; analyzing the source components in a component repository against the keywords, the concepts, and the metadata; identifying source code areas within the source components for changing according to the keywords, concepts, and metadata; and producing a report indicating the source areas for changing. The analysis may employ pattern matching, deep semantic relationship detection, shallow semantic relationship detection, scoring, weighting, logic matching, and other natural language processing techniques. | 07-17-2014 |